Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Survey on Security Issues in Mobile Cloud Computing and Prevention Measures

Version 1 : Received: 5 December 2019 / Approved: 6 December 2019 / Online: 6 December 2019 (10:49:43 CET)

A peer-reviewed article of this Preprint also exists.

Neware R., Ulabhaje K., Karemore G., Lokhande H., Dandige V. (2020) Survey on Security Issues in Mobile Cloud Computing and Preventive Measures. In: Elçi A., Sa P., Modi C., Olague G., Sahoo M., Bakshi S. (eds) Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 767. Springer, Singapore. Neware R., Ulabhaje K., Karemore G., Lokhande H., Dandige V. (2020) Survey on Security Issues in Mobile Cloud Computing and Preventive Measures. In: Elçi A., Sa P., Modi C., Olague G., Sahoo M., Bakshi S. (eds) Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 767. Springer, Singapore.

Abstract

Mobile Cloud Computing(MCC) is a recent technology used by various users worldwide. In 2015, more than 240 million users used mobile cloud computing which gives a profit of $5.2 billion to service providers. MCC is a combination of Mobile computing and cloud computing. By the combination of these two, it gives various challenges like network access, elasticity, management, availability, security, privacy, etc. Here security issues are considered because both the security issues of mobile computing and cloud computing are considered as important like data security, virtualization security, partitioning security, Mobile cloud application security, Mobile device security. This paper gives a detailed study of security issues in mobile cloud computing and its prevention measures.

Keywords

mobile computing; cloud computing; security; virtualisation; privacy; authentication; storage

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.