A Comprehensive Analysis of Security Challenges in Mobile Cloud Computing

Gururaj H. L.*
Department of Computer Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jcc.10.2.20419

Abstract

The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scalability, and heterogeneity. Security threats have become obstacles in the rapid adaptability of the mobile cloud computing paradigm, and there is a significant risk associated with migrating storage and data processing from mobiles to clouds. User privacy and the integrity of data and applications are key concerns that most cloud providers prioritize. This paper reviews the concept of mobile cloud computing and the security issues inherent within the context of mobile applications and cloud computing. It analyzes and compares various possible approaches proposed by researchers to address security and privacy issues in MCC. Despite widespread adoption, challenges like interoperability and standardization persist. Ongoing efforts focus on establishing common protocols, while research explores integrating technologies like edge computing and AI to enhance mobile cloud capabilities. This paper examines the dynamic landscape of MCC, addressing security concerns and exploring advancements and challenges, contributing to ongoing discussions on optimization, security, and the future of mobile cloud computing. As the field continues to evolve, researchers are actively working on developing comprehensive frameworks that not only address current security challenges but also anticipate and mitigate emerging threats in the ever-changing landscape of mobile cloud computing.

Keywords

Cloud Computing, Mobile Cloud Computing (MCC), Mobile Cloud Computing Architecture, Security Issues.

How to Cite this Article?

Gururaj, H. L. (2023). A Comprehensive Analysis of Security Challenges in Mobile Cloud Computing. i-manager's Journal on Cloud Computing, 10(2), 35-42. https://doi.org/10.26634/jcc.10.2.20419

References

[7]. Donald, A. C., Oli, S. A., & Arockiam, L. (2013). Mobile cloud security issues and challenges: A perspective. International Journal of Engineering and Innovative Technology, 3(1), 401.
[8]. Gayathri, M. R., & Srinivas, P. K. (2014). A survey on mobile cloud computing architecture, applications and challenges. International Journal of Scientific Research Engineering & Technology, 3(6), 1013-1021.
[13]. Porras, J., Riva, O., & Darø Kristensen, M. (2009). Dynamic resource management and cyber foraging. Middleware for Network Eccentric and Mobile Applications, (pp.349-368).
[14]. Shahzad, A., & Hussain, M. (2013). Security issues and challenges of mobile cloud computing. International Journal of Grid and Distributed Computing, 6(6), 37-50.
[16]. Yadav, D. S., & Doke, K. (2016). Mobile cloud computing issues and solution framework. International Research Journal of Engineering and Technology (IRJET), 3(11), 1115-1118.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.