
Asian Journal of Engineering and Applied Technology (AJEAT)
Mobile Cloud Computing: A Literature Survey
Author : Lakshna Arun and T.N.RaviVolume 7 No.2 July-December 2018 pp 80-85
Abstract
Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.
Keywords
Mobile Cloud Computing, Mobile Environments, Mobile Networks
References
[1] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Ganiand R. Buyya,“Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges”,Communications Surveys and Tutorials, IEEE,Vol. 16, No. 1, pp. 337-368, 2014.
[2] Qian (Andy) Wang,“Mobile Cloud Computing”, A Thesis Submitted to the College of Graduate Studies and Research in Partial Fulfillment of the Requirements, Feb. 2011.
[3] H. Suo, Z. Liu, J. Wan andK. Zhou,“Security and privacy in mobile cloud computing”,In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, IEEE, pp. 655-659, 2013.
[4] D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, Secure data processing framework for mobile cloud computing,In Computer Communications Workshops (infocomwkshps), 2011 IEEE Conference, IEEE, pp. 614-618, 2011.
[5] R. Buyya, J. Broberg, and A. M. Goscinski, “Cloud computing: Principles and paradigms”, Vol. 87, John Wiley and Sons, 2010.
[6] H. T. Dinh, C. Lee, D. Niyato, andP. Wang,“A survey of mobile cloud computing: architecture, applications, and approaches”, Wireless communications and mobile computing, Vol. 13, No. 18, pp. 1587-1611, 2013.
[7] A. N. Bahar, M. A. Habib, andM. M. Islam, 2013. Security architecture for mobile cloud computing. International Journal, Vol. 3, No. 3, pp. 2305-1493.
[8] Zhou, Bowen, and RajkumarBuyya, “Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions”, ACM Computing Surveys (CSUR), Vol. 51, No. 1, pp. 13, 2018.
[9] Wilczyński, Andrzej and Joanna Kołodziej, “Virtualization Model for Processing of the Sensitive Mobile Data”, Modeling and Simulation in HPC and Cloud Systems, Springer, Cham, pp. 121-133, 2018.
[10] Tseng, Fan-Hsun, et al,“Application-oriented offloading in heterogeneous networks for mobile cloud computing”, Enterprise Information Systems, Vol. 12, No. 4, pp. 398-413, 2018.
[11] Sajjad, Maryam, et al, “Classification and Mapping of Adaptive Security for Mobile Computing”, IEEE Transactions on Emerging Topics in Computing, 2018.
[12] Flores, Huber, et al, “Evidence-Aware Mobile Cloud Architectures”, Mobile Big Data, Springer,Cham., pp. 65-84, 2018.
[13] He, Qian, et al, “Lightweight attribute-based encryption scheme for mobile cloud assisted cyber-physical systems”,Computer Networks, 2018.
[14] Orsini, Gabriel, Dirk Bade, and Winfried Lamersdorf, “Generic context adaptation for mobile cloud computing environments”, Journalof Ambient Intelligence and Humanized Computing, Vol. 9, No. 1, pp. 61-71, 2018.
[15] C. M. Geeta, et al, “Data Auditing and Security in Cloud Computing: Issues, Challenges, and Future Directions”,International Journal of Computer (IJC), Vol. 28, No. 1, pp. 8-57, 2018.
[16] Yang, Li, et al, “A remotely keyed file encryption scheme under mobile cloud computing”, Journal of Network and Computer Applications, 2018.
[17] Li, Dazhi, Minglu Li and Jianhua Liu, “Evolutionary trust scheme of certificate game in mobile cloud computing”, Soft Computing, Vol. 22, No. 7, pp. 2245-2255, 2018.
[18] Liu, Yi, et al, “Secure and fine-grained access control on e-healthcare records in mobile cloud computing”, Future Generation Computer Systems, Vol. 78, pp. 1020-1026, 2018.
[19] Zuo, Cong, et al, “CCA-secure ABE with outsourced decryption for fog computing”, Future Generation Computer Systems, Vol. 78, pp. 730-738, 2018.
[20] Wei, Fushan, Ruijie Zhang and Chuangui Ma, “A Provably Secure Anonymous Two-Factor Authenticated KeyExchange Protocol for Cloud Computing”, FundamentaInformaticae, Vol. 157, No. 1-2, pp. 201-220, 2018.
[21] Chattaraj, Durbadal, MonalisaSarma and Ashok Kumar Das, “A new two-server authentication and key agreement protocol for accessing secure cloud services”, Computer Networks, Vol. 131, pp. 144-164, 2018.
[22] Jiang, Yinhao, et al, “Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing”, Future Generation Computer Systems, Vol. 78, pp. 720-729, 2018.
[23] [23] Ceselli, Alberto, et al, “Optimized assignment patterns in Mobile Edge Cloud networks”, Computers and Operations Research, 2018.
[24] Xu, Li, et al, “A shareable keyword search over encrypted data in cloud computing”, The Journal of Supercomputing, Vol. 74, No. 3, pp. 1001-1023, 2018.
[25] Angin, Pelin, Bharat Bhargava and RohitRanchal, “A Self-Protecting Agent Based Model for High-Performance Mobile-Cloud Computing”, Computers and Security, 2018.
[26] Hazra, Animesh, SoumyaGhosh and SampadJash, “A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques”, Advanced Computational and Communication Paradigms, Springer, Singapore, pp. 605-615, 2018.
[27] Shen, Yiran, et al, “Privacy-preserving sparse representation classification in cloud-enabled mobile applications”, Computer Networks, Vol. 133, pp. 59-72, 2018.
[28] Xue, Yuan, et al, “RootAgency: A digital signature-based root privilege management agency for cloud terminal devices”, Information Sciences, Vol. 444, pp. 36-50, 2018.
[29] Li, Jing, et al, “Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption”, Soft Computing, Vol. 22, No. 3, pp. 707-714, 2018.
[30] Wu, Wei, et al, “Towards secure and cost-effective fuzzy access control in mobile cloud computing”, Soft computing, Vol.21, No. 10, pp. 2643-2649, 2017.
[31] F. Lordan, J. Jensen, and R. M. Badia, “Towards Mobile Cloud Computing with Single Sign-on Access”, Journal of Grid Computing, pp. 1-20, 2017.
[32] K. S. Arvind and R. Manimegalai, “Secure data classification using superior naive classifier in agent-based mobile cloud computing”,Cluster Computing, Vol. 20, No. 2, pp. 1535-1542, 2017.
[33] Khan, Suleman, et al, “Towards port-knocking authentication methods for mobile cloud computing”, Journal of Network and Computer Applications, Vol. 97, pp. 66-78, 2017.
[34] Odelu, Vanga, et al, “Provably secure authenticated key agreement scheme for distributed mobile cloud computing services”, Future Generation Computer Systems, Vol. 68, pp. 74-88, 2017.
[35] Gope, Prosanta and Ashok Kumar Das, “Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services”, IEEE Internet of Things Journal, Vol. 4, No. 5, pp. 1764-1772, 2017.
[36] Babu, V. Suresh and Maddali MVM Kumar, “An Efficient and Secure Data Storage Operations in Mobile Cloud Computing”,IJSRSET, Vol. 4, No. 1, pp. 1385-1390, 2018.
[37] Li, Jin, et al, “Secure attribute-based data sharing for resource-limited users in cloud computing”, Computers and Security, Vol. 72, pp. 1-12, 2018.