Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 12
Page No. 4396 - 4402

Investigation of Security and Privacy Methods for Public Mobile Cloud Computing

Authors : Ali Salah Hashim and and Wid Akeel Awadh

References

Abolfazli, S., Z. Sanaei, A. Gani, F. Xia and L.T. Yang, 2014. Rich mobile applications: Genesis, taxonomy and open issues. J. Netw. Comput. Appl., 40: 345-362.
CrossRef  |  Direct Link  |  

Ahmed, E., A. Gani, M. Sookhak, S.H.A. Hamid and F. Xia, 2015. Application optimization in mobile cloud computing: Motivation, taxonomies and open challenges. J. Netw. Comput. Appl., 52: 52-68.
Direct Link  |  

Ahmed, E., A. Gani, M.K. Khan, R. Buyya and S.U. Khan, 2015. Seamless application execution in mobile cloud computing: Motivation, taxonomy and open challenges. J. Netw. Comput. Appl., 52: 154-172.
CrossRef  |  Direct Link  |  

Akherfi, K., M. Gerndt and H. Harroud, 2016. Mobile cloud computing for computation offloading: Issues and challenges. Appl. Comput. Inf., 14: 1-16.
Direct Link  |  

Alizadeh, M., S. Abolfazli, M. Zamani, S. Baharun and K. Sakurai, 2016. Authentication in mobile cloud computing: A survey. J. Network Comput. Appl., 61: 59-80.
Direct Link  |  

Anwar, S., Z. Inayat, M.F. Zolkipli, J.M. Zain and A. Gani et al., 2017. Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. J. Netw. Comput. Appl., 93: 259-279.
CrossRef  |  Direct Link  |  

Aslam, S., Saif ul Islam, A. Khan, M. Ahmed, A. Akhundzada and M.K. Khan, 2017. Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges. J. Network Comput. Applic., 100: 80-94.
CrossRef  |  Direct Link  |  

Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Proc. Technol., 12: 529-534.
CrossRef  |  Direct Link  |  

Bhattacharya, A. and P. De, 2017. A survey of adaptation techniques in computation offloading. J. Netw. Comput. Appl., 78: 97-115.
CrossRef  |  Direct Link  |  

Donald, A.C., S.A. Oli and L. Arockiam, 2013. Mobile cloud security issues and challenges: A perspective. Intl. J. Electron. Inf. Technol., 3: 1-6.

Gani, A., G.M. Nayeem, M. Shiraz, M. Sookhak and M. Whaiduzzaman et al., 2014. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Netw. Comput. Appl., 43: 84-102.
CrossRef  |  Direct Link  |  

Ghomi, E.J., A.M. Rahmani and N.N. Qader, 2017. Load-balancing algorithms in cloud computing: A survey. J. Netw. Comput. Appl., 88: 50-71.
CrossRef  |  Direct Link  |  

Gustafsson, B. and A. Orrgren, 2012. Cloud computing: The adoption of cloud computing for small and medium enterprises. BA Thesis, Jonkoping University, Jonkoping, Sweden.

Hashem, I.A.T., I. Yaqoob, N.B. Anuar, S. Mokhtar and A. Gani et al., 2015. The rise of big data on cloud computing: Review and open research issues. Inf. Syst., 47: 98-115.
CrossRef  |  Direct Link  |  

Ibukun, E. and O. Daramola, 2015. A systematic literature review of mobile cloud computing. Intl. J. Multimedia Ubiquitous Eng., 10: 135-152.
CrossRef  |  

Khan, M.A., M.M. Rahman, M. Tania, N.F. Shoshee and A. Xu et al., 2013. Antioxidative Potential of Duranta Repens (Linn.) Fruits Against H2O2 Induced Cell Death In Vitro. Afr. J. Traditional Complementary Altern. Med., 10: 436-441.
Direct Link  |  

Khan, S., M. Shiraz, L. Boroumand, A. Gani and M.K. Khan, 2017. Towards port-knocking authentication methods for mobile cloud computing. J. Netw. Comput. Appl., 97: 66-78.
CrossRef  |  Direct Link  |  

Liaqat, M., V. Chang, A. Gani, S.H.A. Hamid and M. Toseef et al., 2017. Federated cloud resource management: Review and discussion. J. Netw. Comput. Appl., 77: 87-105.
CrossRef  |  Direct Link  |  

Liu, J., E. Ahmed, M. Shiraz, A. Gani and R. Buyya et al., 2015. Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions. J. Network Comput. Appl., 48: 99-117.
CrossRef  |  Direct Link  |  

Madni, S.H.H., M.S.A. Latiff and Y. Coulibaly, 2016. Resource scheduling for Infrastructure as a Service (IaaS) in cloud computing: Challenges and opportunities. J. Netw. Comput. Appl., 68: 173-200.
CrossRef  |  Direct Link  |  

Mircea, M. and A.I. Andreescu, 2011. Using cloud computing in higher education: A strategy to improve agility in the current financial crisis. Commun. IBIMA., 2011: 1-15.
CrossRef  |  Direct Link  |  

Mollah, M.B., M.A.K. Azad and A. Vasilakos, 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl., 84: 38-54.
Direct Link  |  

Rassan, I.A. and H. Al Shaher, 2013. Securing mobile cloud using finger print authentication. Intl. J. Netw. Secur. Its Appl., 5: 41-53.
CrossRef  |  Direct Link  |  

Rehman, M.H.U., C.S. Liew, T.Y. Wah and M.K. Khan, 2017. Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges and future research directions. J. Netw. Comput. Appl., 79: 1-24.
CrossRef  |  Direct Link  |  

Saggi, M.K. and A.S. Bhatia, 2015. A review on mobile cloud computing: Issues, challenges and solutions. Intl. J. Adv. Res. Comput. Commun. Eng., 4: 29-34.
CrossRef  |  

Shaukat, U., E. Ahmed, Z. Anwar and F. Xia, 2016. Cloudlet deployment in local wireless networks: Motivation, architectures, applications and open challenges. J. Netw. Comput. Appl., 62: 18-40.
CrossRef  |  Direct Link  |  

Shuja, J., A. Gani, M.H.U. Rehman, E. Ahmed and S.A. Madani et al., 2016. Towards native code offloading based MCC frameworks for multimedia applications: A survey. J. Netw. Comput. Appl., 75: 335-354.
Direct Link  |  

Singh, A. and K. Chatterjee, 2017. Cloud security issues and challenges: A survey. J. Netw. Comput. Appl., 79: 88-115.
CrossRef  |  Direct Link  |  

Sookhak, M., H. Talebian, E. Ahmed, A. Gani and M.K. Khan, 2014. A review on remote data auditing in single cloud server: Taxonomy and open issues. J. Network Comput. Appl., 43: 121-141.
Direct Link  |  

Stajano, F., M. Spencer, G. Jenkinson and Q. Stafford-Fraser, 2014. Password-Manager Friendly (PMF): Semantic annotations to improve the effectiveness of password managers. Proceedings of the 2014 International Conference on Passwords, December 8-10, 2014, Springer, Trondheim, Norway, ISBN:978-3-319-24191-3, pp: 61-73.

Sun, H., K. Sun, Y. Wang and J. Jing, 2015. Trustotp: Transforming smartphones into secure one-time password tokens. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, ACM, Denver, Colorado, USA., ISBN:978-1-4503-3832-5, pp: 976-988.

Vaezpour, S.Y., R. Zhang, K. Wu, J. Wang and G.C. Shoja, 2016. A new approach to mitigating security risks of phone clone co-location over mobile clouds. J. Netw. Comput. Appl., 62: 171-184.
Direct Link  |  

Zhang, Q., L. Cheng and R. Boutaba, 2010. Cloud computing: State-of-the-art and research challenges. J. Internet Serv. Applic., 1: 7-18.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved