• #0 (no title)
  • #0 (no title)
  • About
  • Facebook
  • Twitter
  • RSS
(As ISO 9001:2015 Certified Publications)
    • Quick Search
    • Advanced Search
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription

Back to Journal

Home»Articles»Mobile Cloud Computing: A Literature Survey

JournalCover

Asian Journal of Engineering and Applied Technology (AJEAT)

Editor Dr. Seshadri Ramkumar
Print ISSN : 2249-068X
Frequency : Quarterly

Mobile Cloud Computing: A Literature Survey

Author : Lakshna Arun and T.N.Ravi
Volume 7 No.2 July-December 2018 pp 80-85

Abstract

Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.

Keywords

Mobile Cloud Computing, Mobile Environments, Mobile Networks

Full Text:

References

[1] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Ganiand R. Buyya,“Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges”,Communications Surveys and Tutorials, IEEE,Vol. 16, No. 1, pp. 337-368, 2014.
[2] Qian (Andy) Wang,“Mobile Cloud Computing”, A Thesis Submitted to the College of Graduate Studies and Research in Partial Fulfillment of the Requirements, Feb. 2011.
[3] H. Suo, Z. Liu, J. Wan andK. Zhou,“Security and privacy in mobile cloud computing”,In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, IEEE, pp. 655-659, 2013.
[4] D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, Secure data processing framework for mobile cloud computing,In Computer Communications Workshops (infocomwkshps), 2011 IEEE Conference, IEEE, pp. 614-618, 2011.
[5] R. Buyya, J. Broberg, and A. M. Goscinski, “Cloud computing: Principles and paradigms”, Vol. 87, John Wiley and Sons, 2010.
[6] H. T. Dinh, C. Lee, D. Niyato, andP. Wang,“A survey of mobile cloud computing: architecture, applications, and approaches”, Wireless communications and mobile computing, Vol. 13, No. 18, pp. 1587-1611, 2013.
[7] A. N. Bahar, M. A. Habib, andM. M. Islam, 2013. Security architecture for mobile cloud computing. International Journal, Vol. 3, No. 3, pp. 2305-1493.
[8] Zhou, Bowen, and RajkumarBuyya, “Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions”, ACM Computing Surveys (CSUR), Vol. 51, No. 1, pp. 13, 2018.
[9] Wilczyński, Andrzej and Joanna Kołodziej, “Virtualization Model for Processing of the Sensitive Mobile Data”, Modeling and Simulation in HPC and Cloud Systems, Springer, Cham, pp. 121-133, 2018.
[10] Tseng, Fan-Hsun, et al,“Application-oriented offloading in heterogeneous networks for mobile cloud computing”, Enterprise Information Systems, Vol. 12, No. 4, pp. 398-413, 2018.
[11] Sajjad, Maryam, et al, “Classification and Mapping of Adaptive Security for Mobile Computing”, IEEE Transactions on Emerging Topics in Computing, 2018.
[12] Flores, Huber, et al, “Evidence-Aware Mobile Cloud Architectures”, Mobile Big Data, Springer,Cham., pp. 65-84, 2018.
[13] He, Qian, et al, “Lightweight attribute-based encryption scheme for mobile cloud assisted cyber-physical systems”,Computer Networks, 2018.
[14] Orsini, Gabriel, Dirk Bade, and Winfried Lamersdorf, “Generic context adaptation for mobile cloud computing environments”, Journalof Ambient Intelligence and Humanized Computing, Vol. 9, No. 1, pp. 61-71, 2018.
[15] C. M. Geeta, et al, “Data Auditing and Security in Cloud Computing: Issues, Challenges, and Future Directions”,International Journal of Computer (IJC), Vol. 28, No. 1, pp. 8-57, 2018.
[16] Yang, Li, et al, “A remotely keyed file encryption scheme under mobile cloud computing”, Journal of Network and Computer Applications, 2018.
[17] Li, Dazhi, Minglu Li and Jianhua Liu, “Evolutionary trust scheme of certificate game in mobile cloud computing”, Soft Computing, Vol. 22, No. 7, pp. 2245-2255, 2018.
[18] Liu, Yi, et al, “Secure and fine-grained access control on e-healthcare records in mobile cloud computing”, Future Generation Computer Systems, Vol. 78, pp. 1020-1026, 2018.
[19] Zuo, Cong, et al, “CCA-secure ABE with outsourced decryption for fog computing”, Future Generation Computer Systems, Vol. 78, pp. 730-738, 2018.
[20] Wei, Fushan, Ruijie Zhang and Chuangui Ma, “A Provably Secure Anonymous Two-Factor Authenticated KeyExchange Protocol for Cloud Computing”, FundamentaInformaticae, Vol. 157, No. 1-2, pp. 201-220, 2018.
[21] Chattaraj, Durbadal, MonalisaSarma and Ashok Kumar Das, “A new two-server authentication and key agreement protocol for accessing secure cloud services”, Computer Networks, Vol. 131, pp. 144-164, 2018.
[22] Jiang, Yinhao, et al, “Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing”, Future Generation Computer Systems, Vol. 78, pp. 720-729, 2018.
[23] [23] Ceselli, Alberto, et al, “Optimized assignment patterns in Mobile Edge Cloud networks”, Computers and Operations Research, 2018.
[24] Xu, Li, et al, “A shareable keyword search over encrypted data in cloud computing”, The Journal of Supercomputing, Vol. 74, No. 3, pp. 1001-1023, 2018.
[25] Angin, Pelin, Bharat Bhargava and RohitRanchal, “A Self-Protecting Agent Based Model for High-Performance Mobile-Cloud Computing”, Computers and Security, 2018.
[26] Hazra, Animesh, SoumyaGhosh and SampadJash, “A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques”, Advanced Computational and Communication Paradigms, Springer, Singapore, pp. 605-615, 2018.
[27] Shen, Yiran, et al, “Privacy-preserving sparse representation classification in cloud-enabled mobile applications”, Computer Networks, Vol. 133, pp. 59-72, 2018.
[28] Xue, Yuan, et al, “RootAgency: A digital signature-based root privilege management agency for cloud terminal devices”, Information Sciences, Vol. 444, pp. 36-50, 2018.
[29] Li, Jing, et al, “Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption”, Soft Computing, Vol. 22, No. 3, pp. 707-714, 2018.
[30] Wu, Wei, et al, “Towards secure and cost-effective fuzzy access control in mobile cloud computing”, Soft computing, Vol.21, No. 10, pp. 2643-2649, 2017.
[31] F. Lordan, J. Jensen, and R. M. Badia, “Towards Mobile Cloud Computing with Single Sign-on Access”, Journal of Grid Computing, pp. 1-20, 2017.
[32] K. S. Arvind and R. Manimegalai, “Secure data classification using superior naive classifier in agent-based mobile cloud computing”,Cluster Computing, Vol. 20, No. 2, pp. 1535-1542, 2017.
[33] Khan, Suleman, et al, “Towards port-knocking authentication methods for mobile cloud computing”, Journal of Network and Computer Applications, Vol. 97, pp. 66-78, 2017.
[34] Odelu, Vanga, et al, “Provably secure authenticated key agreement scheme for distributed mobile cloud computing services”, Future Generation Computer Systems, Vol. 68, pp. 74-88, 2017.
[35] Gope, Prosanta and Ashok Kumar Das, “Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services”, IEEE Internet of Things Journal, Vol. 4, No. 5, pp. 1764-1772, 2017.
[36] Babu, V. Suresh and Maddali MVM Kumar, “An Efficient and Secure Data Storage Operations in Mobile Cloud Computing”,IJSRSET, Vol. 4, No. 1, pp. 1385-1390, 2018.
[37] Li, Jin, et al, “Secure attribute-based data sharing for resource-limited users in cloud computing”, Computers and Security, Vol. 72, pp. 1-12, 2018.

Asian Journal of Engineering and Applied Technology is a peer-reviewed International research journal aiming at promoting and publishing original high quality research in all disciplines of engineering and applied technology. All research articles submitted to AJEAT should be original in nature, never previously published in any journal or presented in a conference or undergoing such process across the world. All the submissions will be peer-reviewed by the panel of experts associated with particular field. Submitted papers should meet the internationally accepted criteria and manuscripts should follow the style of the journal for the purpose of both reviewing and editing.

AJEAT is covering all aspects of Engineering and Applied Technology areas. Topics include, but are not limited to:

Aerospace engineering
Agricultural engineering
Architectural engineering
Bioengineering and biomedical engineering
Chemical engineering
Civil engineering
Computer engineering
Computer science and information science
Electrical engineering and electronics engineering
Environmental engineering

Industrial engineering
Metallurgical engineering
Ceramic engineering
Materials science
Metallurgy
Mechanical engineering
Nuclear engineering
Petroleum engineering
Plastics engineering and polymer science
Textile & Fashion Technology

Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.

Editor-in-Chief
Dr. Seshadri Ramkumar
Department of Environmental Toxicology, Texas Tech University, Texas
[email protected]
Editorial Advisory Board
Dr. Kamarul Ariffin Bin Noordin
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Benjamin T.F. Chung
Department of Mechanical Engineering, University of Akron, Akron, USA
[email protected]
Dr. Mohd Faiz Bin Mohd Salleh
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Suhana Binti Mohd Said
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Norrima Binti Mokhtar
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Mohamadariff
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]

2016

2015

2014

  • Results
  • Asian Review of Mechanical Engineering (ARME)
  • career

2013

  • Home
  • Shop
  • My Account
  • Logout
  • Contact us
  • The Asian Review of Civil Engineering (TARCE)

2012

  • Asian Journal of Electrical Sciences(AJES)
  • Asian Journal of Computer Science and Technology (AJCST)
  • Asian Journal of Information Science and Technology (AJIST)
  • Asian Journal of Engineering and Applied Technology (AJEAT)
  • Asian Journal of Science and Applied Technology (AJSAT)
  • Asian Journal of Managerial Science (AJMS)
  • Asian Review of Social Sciences (ARSS)

2011

2010

    Table of Contents

    Editorial Note

    Editorial Dr. Seshadri Ramkumar

    Editor-in-Chief
    Dr. Seshadri Ramkumar
    Department of Environmental Toxicology, Texas Tech University, Texas
    [email protected]
    Editorial Advisory Board
    Dr. Kamarul Ariffin Bin Noordin
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Benjamin T.F. Chung
    Department of Mechanical Engineering, University of Akron, Akron, USA
    [email protected]
    Dr. Mohd Faiz Bin Mohd Salleh
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Suhana Binti Mohd Said
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Norrima Binti Mokhtar
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Mohamadariff
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]

    Articles

Advanced Search

You can submit your research paper to the journal in just a few clicks. Please follow the steps outlined below: 1. Register your details and select to be an Author 2. Log in with your user name and password 3. ‘Start a new submission’ and follow these 5 steps:

[gravityform id="1" name="Registration" title="false" description="false"]

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue. Sed non rutrum mauris. Maecenas in dolor est. Donec eget sagittis mi. Sed non leo eu odio mollis pulvinar vitae et leo. Integer eu feugiat tortor. Duis massa purus, eleifend id erat eget, hendrerit semper risus. Suspendisse cursus varius dapibus

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue.

Subscription

Subscription (for 12 issues):
Rs. 5000; Overseas - USD 500;
Cheque drawn in favour of "Informatics Publishing Limited"
Click here to download online subscription form

Download

DD Mailing Address

Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet.

BACK TO TOP

Outstanding Scholars

The Journals honor Outstanding Scholars in various fields. Scholar of the Month should have contributed to their field and to the larger community. Recipients will be nominated by the Advisory Board and approved by the Editor-in-Chief of the allied journals published by The Research Publication. Scholar of the Month will be displayed in the web portal of the concerned journal.

Please send your brief write up to [email protected]

Editors and Reviewers

The Research Publication is seeking qualified researchers to join its editorial team as Associate Editor, Editorial Advisory Board Member, and Reviewers.
Kindly send your details to [email protected]

Call For Papers

Authors are requested to submit their papers electronically to [email protected] with mentioning the journal title.

Mailing Address

The Research Publication 1/611, Maruthi Nagar, Rakkipalayam Post, Coimbatore – 641 031, Tamil Nadu, India Phone No.: 0422 2461001

  • About
  • Editorial Policy
  • Author Guidelines
  • Contact us
  • Copyright
  • Facebook
  • Twitter
  • RSS

© 2015 The Research Publication. All rights reserved.

The Research Publication
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription