Towards secure mobile cloud computing: A survey

被引:198
作者
Khan, Abdul Nasir [1 ]
Kiah, M. L. Mat [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A.
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 05期
关键词
Cloud computing; Mobile cloud computing; Virtualization; Security; Privacy;
D O I
10.1016/j.future.2012.08.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectations. According to the recent survey conducted by the International Data Corporation, most IT Executives and CEOs are not interested in adopting such services due to the risks associated with security and privacy. The security threats have become a hurdle in the rapid adaptability of the mobile cloud computing paradigm. Significant efforts have been devoted in research organizations and academia to build secure mobile cloud computing environments and infrastructures. In spite of the efforts, there are a number of loopholes and challenges that still exist in the security policies of mobile cloud computing. This literature review: (a) highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, (b) identifies the potential problems, and (c) provides a taxonomy of the state of the art. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1278 / 1299
页数:22
相关论文
共 70 条
[51]  
Rimal Bhaskar Prasad, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P44, DOI 10.1109/NCM.2009.218
[52]   The Reservoir model and architecture for open federated cloud computing [J].
Rochwerger, B. ;
Breitgand, D. ;
Levy, E. ;
Galis, A. ;
Nagin, K. ;
Llorente, I. M. ;
Montero, R. ;
Wolfsthal, Y. ;
Elmroth, E. ;
Caceres, J. ;
Ben-Yehuda, M. ;
Emmerich, W. ;
Galan, F. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (04)
[53]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[54]  
Shao J., 2009, P 12 INT C PRACT THE
[55]  
Sheng Xiao, 2010, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), P378, DOI 10.1109/MDM.2010.73
[56]  
Song Wang, 2010, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), P381, DOI 10.1109/MDM.2010.82
[57]   Virtual Infrastructure Management in Private and Hybrid Clouds [J].
Sotomayor, Borja ;
Montero, Ruben S. ;
Llorente, Ignacio M. ;
Foster, Ian .
IEEE INTERNET COMPUTING, 2009, 13 (05) :14-22
[58]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[59]  
Wang L., 2008, INT C IEEE 2008
[60]   Cloud Computing: a Perspective Study [J].
Wang, Lizhe ;
von Laszewski, Gregor ;
Younge, Andrew ;
He, Xi ;
Kunze, Marcel ;
Tao, Jie ;
Fu, Cheng .
NEW GENERATION COMPUTING, 2010, 28 (02) :137-146