Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Security Threats and Different Challenges of Mobile Cloud Computing

Author : Pinakshi De 1

Date of Publication :7th March 2016

Abstract: Mobile devices are becoming an essential part of our daily life due to most efficient and effective communication tools without time and space boundation. Everyone has a mobile, tablet, tablet with calling facility i.e. Fablet. Cloud Computing (CC) has been widely recognized as the next generation’s computing infrastructure with the rapid growth of mobile applications and the support of Cloud Computing for a variety of services, the Mobile Cloud Computing (MCC) is introduced as an integration of Cloud Computing into the Mobile Environment. Mobile Cloud Computing is gaining stream. MCC is referred to as the infrastructure where both the data storage and the data processing happen outside the mobile device. In MCC environment, Cloud Computing, Mobile Computing and Application face several challenges like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) migration issues, Low Bandwidth, EnergyEfficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have discussed about several challenges and issues related to the Mobile Cloud Computing. This paper gives information about Mobile Cloud Computing Application, Security and Issues.

Reference :

    1. Hoang T. Dinh, Chonho Lee, Dusit Niyato and Ping Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Wirel. Commun. Mob. Comput. , 2011
    2. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Accepted in Wireless Communications and Mobile Computing – Wiley.
    3. A. N. Khana, M. L. M. Kiaha, S. U. Khanb and S. A. Madanic, "Towards secure mobile cloud computing: A survey", Future Generation Computer Systems, vol. 29, Issue 5, (2013)July
    4. M. R. Prasad, J. Gyani and P. R. K. Murti, "Mobile Cloud Computing: Implications and Challenges", Journal of Information Engineering and Applications, vol. 2, no. 7, (2012).
    5. R. Buyya, C. Yeo and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” in10th IEEE International Conference on High Performance Computing and Communications, (HPCC ’08), Pages 5–13, 2008.
    6. D. Comer, Internetworking with TCP/IP, Volume I, Principles, Protocols, and Architecture. Prentice hall Englewood Cliffs, NJ, 1995, vol. 3.
    7. W. Jia, H. Zhu, Z. Cao, L. Wei, X. Lin, “SDSM: a secure data service mechanism in mobile cloud computing,” in: Proc. IEEEConference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China,Apr. 2011.
    8. J. Yang, H. Wang, J. Wang, C. Tan, D. Yu1, “Provable data possession of resource constrained mobile devices in cloud computing,” Journal of Networks 6 (7) (2011) 1033– 1040.
    9. M. Satyanarayanan et al., “The Case for VM-based Cloudlets in Mobile Computing,” IEEE Pervasive Computing, vol. 8, no. 4, 2009, pp. 14–23.
    10. R. Buyya, C. Yeo and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering ITservices as computing utilities,” in10th IEEE International Conference on High Performance Computing andCommunications, (HPCC ’08), Pages 5–13, 2008
    11. H. Flores and S. N. Srirama, “Mobile cloud middleware,” Journal of Systems and Software, http://dx.doi.org/10.1016/j.jss.2013.09.012
    12. Forman GH, Zahorjan J (1994) The challenges of mobile computing. Computer 27(4):38–47.
    13. D. Popa, M. Cremene, M. Borda and K. Boudaoud, "A security framework for mobile cloud applications", 11th Roedunet International Conference (RoEduNet), (2013)January 17-19.
    14. S. O. Kuyoro, F. Ibikunle and O. Awodele, "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks (IJCN), vol. 3, Issue 5, (2011).
    15. D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing", International Conference on Computer Science and Electronics Engineering (ICCSEE), (2012)March 23-25.
    16. S.C. Hsueh, J.Y. Lin, M.Y. Lin, “Secure cloud storage for conventional data archive of smart phones,” in: Proc. 15th IEEE Int. Symposium on Consumer Electronics, ISCE ’11, Singapore, June 2011.
    17. D. Comer, Internetworking with TCP/IP, Volume I, Principles, Protocols, and Architecture. Prentice hall Englewood Cliffs, NJ, 1995, vol. 3.
    18. C. Shi et al., “Cosmos: Computation Offloading as a Service for Mobile Devices,” Proc. ACM MobiHoc 2014, Philadelphia, PA, Aug. 11–14, 2014
    19. K. Kumar and Y.-H. Lu, “Cloud computing for mobile users: Can offloading computation save energy?” Computer, vol. 43, pp. 51–56, 2010.
    20. Z. Sanaei, S. Abolfazli, A. Gani, and R. H. Khokhar, “Tripod of requirements in horizontal heterogeneous mobile cloud computing,” in Proc. 1st InternationalConference on Computing, Information Systems,and Communications (CISCO’12), Singapore, May 2012.
    21. A. Miettinen and J. Nurminen, “Energy efficiency of mobile clients in cloud computing,” in Proc. 2nd USENIX Conference on Hot Topics in Cloud Computing, Boston, MA, Jun. 2010, pp. 4–11.
    22. Hong JI, Landay JA (2011) An infrastructure approach to context-aware computing. Int J Hum-Comput Int 16(2): 287–303.
    23. Noble BD, Satyanarayanan M (1999) Experience with adaptive mobile applications in Odyssey. Mobile Netw Appl 4(4):245–254.
    24. Ou S, Yang K, Liotta A, Hu L (2007) Performance analysis of offloading systems in mobile wireless environments. In: IEEE international conference on communications, pp 1821–1806
    25. A Survey of Mobile Cloud Computing Application Models Atta ur Rehman Khan, Mazliza Othman, Sajjad Ahmad Madani, IEEE Member, and Samee Ullah Khan, IEEE Senior Member IEEE communications, Surveys and tutorials, vol.16, No.1 First quarter 2014.
    26. Ou S, Yang K, Liotta A (2006) “An adaptive multiconstraint partitioning algorithm for offloading in pervasive systems.” In: IEEE international conference on pervasive computing and communications, pp 116–125.
    27. Z. Li, C. Wang, and R. Xu, “Computation Offloading to Save Energy on Handheld Devices: A Partition Scheme,”Proc. Int’l Conf. Compilers, Architectures and Synthesis for Embedded Systems, Nov. 2001.
    28. E. Cuervo et al., “Maui: Making Smartphones Last Longer with Code Offload,” Proc. ACM MobiSys 2010, San Francisco, CA, June 15–18, 2010.
    29. B.-G. Chun et al., “Clonecloud: Elastic Execution between Mobile Device and Cloud,” Proc. ACM EuroSys2011, Salzburg, Austria, Apr. 10–13, 2011
    30. S. Kosta et al., “Thinkair: Dynamic Resource Allocation and Parallel Execution in the Cloud for Mobile Code Offloading,” Proc. IEEE INFOCOM, Orlando, FL, Mar. 25–30, 2012
    31. M. S. Gordon et al., “Comet: Code Offload by Migrating Execution Transparently,” Proc. USENIX 2012, Boston, MA, June 13–15, 2012.
    32. Y. Zhang, H. Liu, L. Jiao, and X. Fu, “To offload or not to offload: an efficientcode partition algorithm for mobile cloud computing,” in IEEE CloudNet, 2012.
    33. K. Kumar and Y. Lu, “Cloud computing for mobile users: Can offloading computation save energy?” Computer, vol. 43, no. 4, pp. 51–56, 2010.
    34. S.C. Hsueh, J.Y. Lin, M.Y. Lin, “Secure cloud storage for conventional data archive of smart phones,” in: Proc. 15th IEEE Int.Symposium on Consumer Electronics, ISCE ’11, Singapore, June 2011.
    35. Chun, B.G., Ihm, S., Maniatis, P., Naik, M., Patti, A. CloneCloud: elastic execution between mobile device and cloud. In: Proceedings of the 6. European Conference on Computer Systems. 2011, p. 301–314.
    36. M. Cooney. (2011, Oct) Gartner: The top 10 strategic technology trends for 2012. [Online]. Available: http://www.networkworld.com/ news/2011/101811-gartnertechnology-trends-252100.html.
    37. I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared,” in Proceedings of Workshop on Grid Computing Environments (GCE), pp. 1, January 2009.

Recent Article