Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CSA.2013.161guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems

Published: 14 December 2013 Publication History

Abstract

The concepts of Cloud computing are naturally meshed with mobile devices to enable on-the-go functionalities and benefits. The mobile cloud computing is emerging as one of the most important branches of cloud computing and it is expected to expand the mobile ecosystems. As more mobile devices enter the market and evolve, certainly security issues will grow as well. Also, enormous growth in the variety of devices connected to the Internet will further drive security needs. Understanding the true potential of mobile cloud computing and identifying issues with mobile cloud security, privacy, feasibility and accessibility remain a major concern for both the customers and the enterprises. This paper covers the mobile cloud security issues and challenges by looking at the current state of cloud security breaches, vulnerabilities of mobile cloud devices, and how to address those vulnerabilities in future work in aspect of mobile device management and mobile data protection. Also, it highlights on usage of SCWS (Smart Card Web Services) rivalry to intensify security of mobile cloud computing.

Cited By

View all
  1. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      CSA '13: Proceedings of the 2013 International Conference on Computer Sciences and Applications
      December 2013
      845 pages
      ISBN:9780769551258

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 14 December 2013

      Author Tags

      1. cloud computing
      2. html5
      3. malware
      4. mobile cloud computing
      5. mobile data protection
      6. mobile device management
      7. mobile security and threats
      8. scws
      9. smartphones

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)A Novel Query Method for Spatial Data in Mobile Cloud Computing EnvironmentWireless Communications & Mobile Computing10.1155/2018/10592312018Online publication date: 1-Jan-2018
      • (2018)Energy-Optimal Uplink Scheduling in Mobile Cloud SystemsWireless Personal Communications: An International Journal10.1007/s11277-018-5830-2102:1(125-148)Online publication date: 1-Sep-2018
      • (2017)Data security in mobile cloud computing paradigmThe Journal of Supercomputing10.1007/s11227-016-1945-y73:6(2558-2631)Online publication date: 1-Jun-2017
      • (2016)Authentication in mobile cloud computingJournal of Network and Computer Applications10.1016/j.jnca.2015.10.00561:C(59-80)Online publication date: 1-Feb-2016
      • (2014)Multi-clouds Mobile Computing for the Secure Storage of DataProceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing10.1109/UCC.2014.68(495-496)Online publication date: 8-Dec-2014

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media