Towards secure mobile cloud computing: A survey

被引:198
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A.
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 05期
关键词
Cloud computing; Mobile cloud computing; Virtualization; Security; Privacy;
D O I
10.1016/j.future.2012.08.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectations. According to the recent survey conducted by the International Data Corporation, most IT Executives and CEOs are not interested in adopting such services due to the risks associated with security and privacy. The security threats have become a hurdle in the rapid adaptability of the mobile cloud computing paradigm. Significant efforts have been devoted in research organizations and academia to build secure mobile cloud computing environments and infrastructures. In spite of the efforts, there are a number of loopholes and challenges that still exist in the security policies of mobile cloud computing. This literature review: (a) highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, (b) identifies the potential problems, and (c) provides a taxonomy of the state of the art. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1278 / 1299
页数:22
相关论文
共 70 条
[11]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P45, DOI 10.1145/225058.225080
[12]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[13]   Meetings through the cloud: Privacy-preserving scheduling on mobile devices [J].
Bilogrevic, Igor ;
Jadliwala, Murtuza ;
Kumar, Praveen ;
Walia, Sudeep Singh ;
Hubaux, Jean-Pierre ;
Aad, Imad ;
Niemi, Valtteri .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) :1910-1927
[14]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[15]  
Buyya R., 2006, FUTURE GENER COMP SY, V26, P1189
[16]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[17]   Energy-aware High Performance Computing - A Taxonomy Study [J].
Cai, Chang ;
Wang, Lizhe ;
Khan, Samee U. ;
Tao, Jie .
2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, :953-958
[18]  
Canepa H., 2010, P 1 ACM WORKSH MOB C
[19]  
Chen E.Y., 2010, World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a, P1, DOI [DOI 10.1109/WOWMOM.2010.5534992, 10.1109/WOWMOM.2010.5534992]
[20]   Authentication in the Clouds: A Framework and its Application to Mobile Users [J].
Chow, Richard ;
Jakobsson, Markus ;
Masuoka, Ryusuke ;
Molina, Jesus ;
Niu, Yuan ;
Shi, Elaine ;
Song, Zhexuan .
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, :1-6