Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 12
Page No. 4396 - 4402

Investigation of Security and Privacy Methods for Public Mobile Cloud Computing

Authors : Ali Salah Hashim and and Wid Akeel Awadh

Abstract: trusted information systems. Advantages such as accessibility, availability, reduce the costs of information systems and centralization processes are lead to increase the importance of adopts the mobile cloud computing by the organizations. To gain the full benefits of mobile cloud computing, the public deployment approach would be adopted. The security and privacy challenges of the public mobile cloud computing are still and issues due to data gathering via. wireless network. This study aims to investigate the security and privacy methods that could be utilized to enhance the protections performance of the services and data of public mobile cloud computing. The document analysis based on the systematic review of literature is conducted to address the main aim of this study. The data source of this study is databases of three high impact journals, Science Direct, Web of Science and Scopus. By using systematic taxonomy search on the published articles in last 5 yeasr, 25 related works are retrieved. The findings of this study are constructed based on the critical review of the retrieved related works. The significant results show that the security methods should be utilized at three layers of public mobile cloud computing, cloud layer, wireless connection layer and mobile device layer. The privacy methods are only involve the mobile device layer of public mobile cloud computing. The main security methods of mobile cloud computing are the data encryption, antivirus, firewall, offloading, port-knocking, transfer scheduling, speed data transfer and effective throughput transfer channels. The most useful privacy methods of mobile cloud computing are the QR verification and SMS confirmation. Despite the importance of the security and privacy of mobile cloud computing, to the best of our knowledge, there is not any systematic or comprehensive review were conducted in this domain to clarify the various security and privacy methods based on the architecture of the public mobile cloud computing. This would represent a research contribution. However, the main contribution of this study is the suggested model of the privacy and security of public cloud computing based on the reviewed articles.

How to cite this article:

Ali Salah Hashim and and Wid Akeel Awadh, 2018. Investigation of Security and Privacy Methods for Public Mobile Cloud Computing. Journal of Engineering and Applied Sciences, 13: 4396-4402.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved