Security and privacy challenges in mobile cloud computing: Survey and way ahead

被引:165
作者
Mollah, Muhammad Baqer [1 ]
Azad, Md. Abul Kalam [1 ]
Vasilakos, Athanasios [2 ]
机构
[1] Jahangirnagar Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, Lulea, Sweden
关键词
Mobile computing; Cloud computing; Computational offloading; Virtualization; Security and privacy; INTRUSION DETECTION; DATA-STORAGE; AUTHENTICATION; EFFICIENT; ENCRYPTION; MANAGEMENT; INTERNET; SCHEME; USERS; ARCHITECTURE;
D O I
10.1016/j.jnca.2017.02.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.
引用
收藏
页码:38 / 54
页数:17
相关论文
共 162 条
[1]
Ab Rahman N. H., 2016, CONCURR COMPUT PRACT
[2]
On Protecting Data Storage in Mobile Cloud Computing Paradigm [J].
Abdalla, Al-kindy Athman ;
Pathan, Al-Sakib Khan .
IETE TECHNICAL REVIEW, 2014, 31 (01) :82-91
[3]
Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges [J].
Ahmed, Ejaz ;
Gani, Abdullah ;
Khan, Muhammad Khurram ;
Buyya, Rajkumar ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 52 :154-172
[4]
Al-Mutawa M., 2014, Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, P51, DOI [DOI 10.1145/2642687, DOI 10.1145/2642687.2642696]
[5]
AMCC: Ad-hoc based Mobile Cloud Computing Modeling [J].
AL-Rousan, Mohammad ;
AL-Shara, Elham ;
Jararweh, Yaser .
10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 :580-585
[6]
Alam Shahid., 2014, P 7 INT C SECURITY I, P473
[7]
SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[8]
Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[9]
Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[10]
Alizadeh M, 2013, INT WIREL COMMUN, P660, DOI 10.1109/IWCMC.2013.6583636