CFP last date
20 December 2024
Reseach Article

Analysis of Security Frameworks for Mobile Cloud

Published on February 2015 by Samith K S, Vinitha A.v
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 1
February 2015
Authors: Samith K S, Vinitha A.v
d76f0a57-4246-47a2-8aa1-0659fbae0645

Samith K S, Vinitha A.v . Analysis of Security Frameworks for Mobile Cloud. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 1 (February 2015), 35-39.

@article{
author = { Samith K S, Vinitha A.v },
title = { Analysis of Security Frameworks for Mobile Cloud },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 1 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 35-39 },
numpages = 5,
url = { /proceedings/icaccthpa2014/number1/19434-6013/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Samith K S
%A Vinitha A.v
%T Analysis of Security Frameworks for Mobile Cloud
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 1
%P 35-39
%D 2015
%I International Journal of Computer Applications
Abstract

The concept of Mobile Cloud Computing is relatively new in the research. It brings various advantages for mobile devices since it enables the use of Cloud resources and services. This paper gives a survey of MCC security frameworks, which helps general readers have an overview of the MCC. The issues, existing solutions, and approaches are presented. The paper is organized as follows. In the next section, we will go through some papers and get a brief idea about MCC, which helps general readers have an overview of the MCC. The issues, existing solutions, and what is actually going on in the current cloud based mobile security research and analyze two frameworks for security of mobile cloud computing.

References
  1. Popa ,D. Cremene, M. Borda, M. Boudaoud, K. 2013. A security framework for mobile cloud applications. Roedunet International Conference (RoEduNet), 1-4.
  2. ZHOU Lian-chi, XIU Chun-di. 2012. Cloud Security Service Providing Schemes Based on Mobile Internet Framework. International Conference onComputer Science and Electronics Engineering (ICCSEE), 307-311.
  3. Xuesen Lin. 2011. Survey on Cloud Based Mobile Security and A New Framework for improvement. IEEE International Conference on Information and Automation (ICIA), 710-715.
  4. HuiSuo, Zhuohua Liu, Jiafu Wan, Keliang Zhou. 2013. Security and Privacy in Mobile Cloud Computing. 9th InternationalWireless Communications and Mobile Computing Conference (IWCMC), 655-659.
  5. Hoang, T. Dinh, Chonho Lee, DusitNiyato, and Ping Wang. 2011. A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches. Accepted in Wireless Communications and Mobile Computing – Wiley.
  6. X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong. 2009. Securing Elastic Applications on Mobile Devices. In CCSW'09.
  7. M. Satyanarayanan. 2010. Mobile computing: the next decade. in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS).
  8. Jon Oberheide, Evan Cooke, Farnam Jahanian. 2008. CloudAV: N-version antivirus in the network cloud. Proceedings of the 17th conference on Security symposium .
  9. ENISA. 2009. Cloud Computing Benefits, risks and recommendations for information security.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Cloud Computing Security Frameworks Security.