Mobile Cloud Computing: A Literature Survey

Authors

  • Lakshna Arun Research Scholar, Department of Computer Science, Periyar E.V.R College, Tiruchirappalli, Tamil Nadu, India
  • T. N. Ravi Assistant Professor, Department of Computer Science, Periyar E.V.R College, Tiruchirappalli, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajeat-2018.7.2.1003

Keywords:

Mobile Cloud Computing, Mobile Environments, Mobile Networks

Abstract

Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.

References

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, "Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges", Communications Surveys and Tutorials, IEEE, vol. 16, no. 1, pp. 337-368, 2014.

Q. Wang, "Mobile Cloud Computing", A Thesis Submitted to the College of Graduate Studies and Research in Partial Fulfillment of the Requirements, Feb. 2011.

H. Suo, Z. Liu, J. Wan, and K. Zhou, "Security and privacy in mobile cloud computing", In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, IEEE, pp. 655-659, 2013.

D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, "Secure data processing framework for mobile cloud computing", In Computer Communications Workshops (infocomwkshps), 2011 IEEE Conference, IEEE, pp. 614-618, 2011.

R. Buyya, J. Broberg, and A. M. Goscinski, "Cloud computing: Principles and paradigms", vol. 87, John Wiley and Sons, 2010.

H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture, applications, and approaches", Wireless communications and mobile computing, vol. 13, no. 18, pp. 1587-1611, 2013.

A. N. Bahar, M. A. Habib, and M. M. Islam, "Security architecture for mobile cloud computing", International Journal, vol. 3, no. 3, pp. 2305-1493, 2013.

B. Zhou and R. Buyya, "Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions", ACM Computing Surveys (CSUR), vol. 51, no. 1, pp. 13, 2018.

A. Wilczyński and J. Kołodziej, "Virtualization Model for Processing of the Sensitive Mobile Data", Modeling and Simulation in HPC and Cloud Systems, Springer, Cham, pp. 121-133, 2018.

F.-H. Tseng et al., "Application-oriented offloading in heterogeneous networks for mobile cloud computing", Enterprise Information Systems, vol. 12, no. 4, pp. 398-413, 2018.

M. Sajjad et al., "Classification and Mapping of Adaptive Security for Mobile Computing", IEEE Transactions on Emerging Topics in Computing, 2018.

H. Flores et al., "Evidence-Aware Mobile Cloud Architectures", Mobile Big Data, Springer, Cham, pp. 65-84, 2018.

Q. He et al., "Lightweight attribute-based encryption scheme for mobile cloud assisted cyber-physical systems", Computer Networks, 2018.

A. Orsini, G. Ceselli, and W. Lamersdorf, "Generic context adaptation for mobile cloud computing environments", Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 1, pp. 61-71, 2018.

C. M. Geeta et al., "Data Auditing and Security in Cloud Computing: Issues, Challenges, and Future Directions", International Journal of Computer (IJC), vol. 28, no. 1, pp. 8-57, 2018.

L. Yang et al., "A remotely keyed file encryption scheme under mobile cloud computing", Journal of Network and Computer Applications, 2018.

D. Li et al., "Evolutionary trust scheme of certificate game in mobile cloud computing", Soft Computing, vol. 22, no. 7, pp. 2245-2255, 2018.

Y. Liu et al., "Secure and fine-grained access control on e-healthcare records in mobile cloud computing", Future Generation Computer Systems, vol. 78, pp. 1020-1026, 2018.

C. Zuo et al., "CCA-secure ABE with outsourced decryption for fog computing", Future Generation Computer Systems, vol. 78, pp. 730-738, 2018.

F. Wei, R. Zhang, and C. Ma, "A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing", Fundamenta Informaticae, vol. 157, no. 1-2, pp. 201-220, 2018.

D. Chattaraj et al., "A new two-server authentication and key agreement protocol for accessing secure cloud services", Computer Networks, vol. 131, pp. 144-164, 2018.

Y. Jiang et al., "Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing", Future Generation Computer Systems, vol. 78, pp. 720-729, 2018.

A. Ceselli et al., "Optimized assignment patterns in Mobile Edge Cloud networks", Computers and Operations Research, 2018.

L. Xu et al., "A shareable keyword search over encrypted data in cloud computing", The Journal of Supercomputing, vol. 74, no. 3, pp. 1001-1023, 2018.

P. Angin et al., "A Self-Protecting Agent Based Model for High-Performance Mobile-Cloud Computing", Computers and Security, 2018.

A. Hazra et al., "A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques", Advanced Computational and Communication Paradigms, Springer, Singapore, pp. 605-615, 2018.

Y. Shen et al., "Privacy-preserving sparse representation classification in cloud-enabled mobile applications", Computer Networks, vol. 133, pp. 59-72, 2018.

Y. Xue et al., "RootAgency: A digital signature-based root privilege management agency for cloud terminal devices", Information Sciences, vol. 444, pp. 36-50, 2018.

J. Li et al., "Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption", Soft Computing, vol. 22, no. 3, pp. 707-714, 2018.

W. Wu et al., "Towards secure and cost-effective fuzzy access control in mobile cloud computing", Soft computing, vol.21, no. 10, pp. 2643-2649, 2017.

F. Lordan, J. Jensen, and R. M. Badia, "Towards Mobile Cloud Computing with Single Sign-on Access", Journal of Grid Computing, pp. 1-20, 2017.

K. S. Arvind and R. Manimegalai, "Secure data classification using superior naive classifier in agent-based mobile cloud computing", Cluster Computing, vol. 20, no. 2, pp. 1535-1542, 2017.

S. Khan et al., "Towards port-knocking authentication methods for mobile cloud computing", Journal of Network and Computer Applications, vol. 97, pp. 66-78, 2017.

V. Odelu et al., "Provably secure authenticated key agreement scheme for distributed mobile cloud computing services", Future Generation Computer Systems, vol. 68, pp. 74-88, 2017.

P. Gope and A. K. Das, "Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services", IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1764-1772, 2017.

V. S. Babu and M. M. Kumar, "An Efficient and Secure Data Storage Operations in Mobile Cloud Computing", IJSRSET, vol. 4, no. 1, pp. 1385-1390, 2018.

J. Li et al., "Secure attribute-based data sharing for resource-limited users in cloud computing", Computers and Security, vol. 72, pp. 1-12, 2018.

Downloads

Published

20-08-2018

How to Cite

Arun, L., & Ravi, T. N. (2018). Mobile Cloud Computing: A Literature Survey. Asian Journal of Engineering and Applied Technology, 7(2), 80–85. https://doi.org/10.51983/ajeat-2018.7.2.1003