Towards secure mobile cloud computing: A survey

被引:198
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A.
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 05期
关键词
Cloud computing; Mobile cloud computing; Virtualization; Security; Privacy;
D O I
10.1016/j.future.2012.08.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectations. According to the recent survey conducted by the International Data Corporation, most IT Executives and CEOs are not interested in adopting such services due to the risks associated with security and privacy. The security threats have become a hurdle in the rapid adaptability of the mobile cloud computing paradigm. Significant efforts have been devoted in research organizations and academia to build secure mobile cloud computing environments and infrastructures. In spite of the efforts, there are a number of loopholes and challenges that still exist in the security policies of mobile cloud computing. This literature review: (a) highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, (b) identifies the potential problems, and (c) provides a taxonomy of the state of the art. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1278 / 1299
页数:22
相关论文
共 70 条
[1]  
[Anonymous], REV DIFFIE HELLMAN A
[2]  
[Anonymous], 2009, HOTCLOUD
[3]  
[Anonymous], 2011, FORCE COM APEX CODE
[4]  
[Anonymous], 2009, HotOS
[5]  
[Anonymous], WIRELESS CO IN PRESS
[6]  
[Anonymous], 2011, GOOGLE APP ENGINE
[7]  
AREF WG, 1990, PROCEEDINGS OF THE NINTH ACM SIGACT-SIGMOD-SIGART SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, P265, DOI 10.1145/298514.298579
[8]  
Armbrust M, 2009, UCBEECS200928
[9]  
Barkhuus L., 2003, P 9 IFIP TC13 INT C, P709
[10]  
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216