Open Access   Article Go Back

Mobile Cloud Computing: Security Levels, Challenges and Applications

Nidhi Rajak1 , Diwakar Shukla2

  1. Department of Computer Science and Applications , Dr.Harisingh Gour Central University, Sagar :M.P., India.
  2. Department of Computer Science and Applications , Dr.Harisingh Gour Central University, Sagar :M.P., India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 717-720, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.717720

Online published on May 31, 2018

Copyright © Nidhi Rajak, Diwakar Shukla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nidhi Rajak, Diwakar Shukla, “Mobile Cloud Computing: Security Levels, Challenges and Applications,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.717-720, 2018.

MLA Style Citation: Nidhi Rajak, Diwakar Shukla "Mobile Cloud Computing: Security Levels, Challenges and Applications." International Journal of Computer Sciences and Engineering 6.5 (2018): 717-720.

APA Style Citation: Nidhi Rajak, Diwakar Shukla, (2018). Mobile Cloud Computing: Security Levels, Challenges and Applications. International Journal of Computer Sciences and Engineering, 6(5), 717-720.

BibTex Style Citation:
@article{Rajak_2018,
author = {Nidhi Rajak, Diwakar Shukla},
title = {Mobile Cloud Computing: Security Levels, Challenges and Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {717-720},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2049},
doi = {https://doi.org/10.26438/ijcse/v6i5.717720}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.717720}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2049
TI - Mobile Cloud Computing: Security Levels, Challenges and Applications
T2 - International Journal of Computer Sciences and Engineering
AU - Nidhi Rajak, Diwakar Shukla
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 717-720
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
466 262 downloads 185 downloads
  
  
           

Abstract

Due to the advancement of mobile technology and its low cost, mobile telephony has been penetrated at large level. Smartphone users are growing with a rapid pace and the number of new research dimension has been emerged in mobile computing. Mobile Cloud Computing (MCC) is one of the burning areas of research in computer science. it is basically the combination of cloud computing and mobile computing. Availability of high speed internet and enhancement in the battery life of mobile devices, the usage of internet over mobile phone has been increased. In this study, a brief definition of cloud computing, mobile computing and mobile cloud computing is presented. After that a deliberated discussions on MCC architecture, different security levels, and challenges of MCC are covered. At last some applications are discussed where MCC is commonly used.

Key-Words / Index Term

Cloud Computing, Mobile Computing, Mobile Cloud Computing, Security and Challenges of MCC

References

[1] Cloud Security Alliances(CSA): Security for critical area of focus in Cloud Computing, http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf 2011.
[2] Dipali S. Yadav and Kanchan Doke.: Mobile Cloud Computing Issues and Solutions Framework.International Research Journal of Engineering and Technology. Vol.3, pp.1115-1118, (2016).
[3] Mobile Cloud Computing: Architecture, Algorithms and Applications, Debasis Dey, CRC Press, Taylor and Fracise Group, Edition ,2016
[4] http://www.mobilecloudcomputingforum.com/.
[5] White Paper, Mobile Cloud Computing Solution Brief. AEPONA, 2010
[6] R.Buyya, J.Broberg and A.M.Goscinski, Cloud Computing : Principles and Paradigm , John Wiley & Sons, Hoboken, NJ, 2010
[7] K.B.Moses.: Mobile communication evolution. International Journal of Modern Education and Computer Science. Vol.1, pp.25-33, 2014.
[8] Atta ur Rehman Khan, Mazliza Othman, Sajjad Ahmad Madani and Samee Ullah Khan.: A Survey of Mobile Cloud Computing Application Models. IEEE Communications Surveys & Tutorials. Vol.16(1), pp.393-413, 2014.
[9] Prashant Pranav and Naela Rizvi.: Security in Mobile Cloud Computing : A Review. International Journal of Computer Science and Information Technologies. Vol.7(1), pp.34-39 , 2016.
[10] Poonam S.Sharma and Sneha U.Bohra. :Mobile Cloud Computing :Its Challenges and Solutions. International Journal of Computer Science and Mobile Computing. Vol.4, issue 5,, pp.287-293, 2015.
[11] H. T. Dinh, C. Lee, D. Niyato, and P. Wang .:A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches. Wireless Communications and Mobile Computing, Vol.13, issue 18, pp.1587–1611, 2013
[12] VarshneyU.: Pervasive Healthcare and Wireless Health Monitoring. Journal on Mobile Networks and Applications. Vol.12(2-3), pp.113-127,2007.
[13] Li Z,Wang C, Xu, R.: Computation offloading to save energy on handheld device: a partition scheme. In proceeding of the 2001 international conference on compiler, architecture, and synthesis for embedded system(CASES),.pp.238-246, 2001