Security and privacy challenges in mobile cloud computing: Survey and way ahead
The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here,...
Saved in:
| Published in: | Journal of network and computer applications Vol. 84; pp. 38 - 54 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier Ltd
15.04.2017
|
| Subjects: | |
| ISSN: | 1084-8045, 1095-8592, 1095-8592 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues. |
|---|---|
| AbstractList | The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues. |
| Author | Vasilakos, Athanasios Mollah, Muhammad Baqer Azad, Md. Abul Kalam |
| Author_xml | – sequence: 1 givenname: Muhammad Baqer surname: Mollah fullname: Mollah, Muhammad Baqer email: m.m.baqer@ieee.org organization: Department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh – sequence: 2 givenname: Md. Abul Kalam surname: Azad fullname: Azad, Md. Abul Kalam email: makazad@juniv.edu organization: Department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh – sequence: 3 givenname: Athanasios surname: Vasilakos fullname: Vasilakos, Athanasios email: athanasios.vasilakos@ltu.se organization: Department of Computer Science, Electrical and Space Engineering at the Luleå University of Technology, Sweden |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62082$$DView record from Swedish Publication Index |
| BookMark | eNp9kMtOwzAQRS0EElD4AVb5ABLGTuI6iE3FW0LqosDWcsbT4iq1Kycp6t-TqogFi67uLO4ZXZ1zduyDJ8auOGQcuLxZZkuPJhPAxxmIDIAfsTMOVZmqshLHu1sVqYKiPGXnbbsEAFlU-Rmbzgj76LptYrxN1tFtDG4T_DJNQ35BbeJ8sgq1ayjBJvQ2wbBa953zi9tk1scN7cFvM-QXGXvBTuamaenyN0fs4-nx_f4lfZs-v95P3lLM83GX1kqiMYgSeQ3SgMwFDePLquRk89LmYm4JLRUltxZkLapakVCV5FKoooZ8xK73f9tvWve1HpavTNzqYJx-cJ8THeJCN12vpQAlhrrY1zGGto00_wM46J1BvdQ7g3pnUIPQg8EBUv8gdJ3pXPBdNK45jN7tURocbBxF3aIjj2RdJOy0De4Q_gPsTo9P |
| CitedBy_id | crossref_primary_10_1155_2021_8848032 crossref_primary_10_1007_s11042_020_10117_y crossref_primary_10_1016_j_jnca_2020_102710 crossref_primary_10_1109_TETC_2018_2791459 crossref_primary_10_1145_3427376 crossref_primary_10_1016_j_iot_2018_11_003 crossref_primary_10_1016_j_compeleceng_2019_106504 crossref_primary_10_1016_j_compeleceng_2022_107692 crossref_primary_10_1007_s11831_021_09573_y crossref_primary_10_1108_ICS_11_2021_0182 crossref_primary_10_3390_su15097569 crossref_primary_10_1002_spe_2851 crossref_primary_10_1109_COMST_2023_3239579 crossref_primary_10_1016_j_csi_2021_103538 crossref_primary_10_1109_ACCESS_2018_2820162 crossref_primary_10_1007_s40747_021_00399_6 crossref_primary_10_4102_sajim_v24i1_1426 crossref_primary_10_1002_spe_2850 crossref_primary_10_1109_TSC_2022_3155447 crossref_primary_10_1109_ACCESS_2024_3438618 crossref_primary_10_3390_s19224905 crossref_primary_10_1007_s10586_022_03585_4 crossref_primary_10_4018_JOEUC_20211101_oa11 crossref_primary_10_1016_j_jnca_2018_06_003 crossref_primary_10_1109_ACCESS_2022_3174554 crossref_primary_10_1371_journal_pone_0252244 crossref_primary_10_3390_s18061676 crossref_primary_10_1109_JSYST_2019_2896064 crossref_primary_10_1002_ett_4108 crossref_primary_10_1016_j_jksuci_2019_05_007 crossref_primary_10_1109_MCC_2018_011791715 crossref_primary_10_1002_ett_3773 crossref_primary_10_1002_ett_4587 crossref_primary_10_1016_j_future_2018_04_023 crossref_primary_10_1007_s43762_022_00051_0 crossref_primary_10_1002_dac_5237 crossref_primary_10_1109_JIOT_2021_3119517 crossref_primary_10_1088_1742_6596_1018_1_012006 crossref_primary_10_3390_electronics10151811 crossref_primary_10_1007_s13204_021_02070_5 crossref_primary_10_1109_COMST_2019_2916180 crossref_primary_10_1109_JIOT_2024_3385095 crossref_primary_10_3390_en13164117 crossref_primary_10_1016_j_jnca_2021_103152 crossref_primary_10_1007_s11235_019_00575_7 crossref_primary_10_1016_j_comcom_2022_01_005 crossref_primary_10_1109_ACCESS_2020_3037108 crossref_primary_10_1016_j_sysarc_2018_05_007 crossref_primary_10_1109_TETC_2018_2865345 crossref_primary_10_1007_s12652_020_02842_x crossref_primary_10_1109_TII_2020_3031440 crossref_primary_10_26634_jcc_5_1_15448 crossref_primary_10_1111_exsy_12753 crossref_primary_10_1515_auto_2022_0023 crossref_primary_10_3390_s25030670 crossref_primary_10_1007_s11036_022_01933_7 crossref_primary_10_1109_TEM_2021_3116204 crossref_primary_10_4018_JOEUC_20211101_oa1 crossref_primary_10_1109_TITS_2023_3295818 crossref_primary_10_1007_s11042_020_09516_y crossref_primary_10_1016_j_aej_2024_10_116 crossref_primary_10_1007_s00500_019_03787_w crossref_primary_10_1016_j_simpat_2022_102491 crossref_primary_10_1109_ACCESS_2021_3138219 crossref_primary_10_1093_comjnl_bxz165 crossref_primary_10_1016_j_future_2018_08_029 crossref_primary_10_4018_IJISP_2022010116 crossref_primary_10_1016_j_future_2018_01_026 crossref_primary_10_26634_jcc_10_2_20419 crossref_primary_10_3233_JIFS_219424 crossref_primary_10_1016_j_jnca_2019_102469 crossref_primary_10_26634_jes_11_1_19136 crossref_primary_10_1007_s12083_018_0705_6 crossref_primary_10_2196_16399 crossref_primary_10_1016_j_future_2017_11_024 crossref_primary_10_3390_fi12090157 crossref_primary_10_1109_ACCESS_2020_3022661 crossref_primary_10_1109_JSYST_2021_3072793 crossref_primary_10_1007_s11036_019_01263_1 crossref_primary_10_1016_j_jisa_2020_102582 crossref_primary_10_1109_ACCESS_2021_3053233 crossref_primary_10_1016_j_vehcom_2022_100529 crossref_primary_10_1109_TC_2025_3543682 crossref_primary_10_3390_s23063254 crossref_primary_10_1108_ICS_02_2023_0015 crossref_primary_10_26599_TST_2023_9010080 crossref_primary_10_1016_j_jnca_2019_02_003 crossref_primary_10_3390_info16050394 crossref_primary_10_1007_s11227_022_04411_9 crossref_primary_10_1016_j_jnca_2020_102642 crossref_primary_10_1109_ACCESS_2020_3022957 crossref_primary_10_3390_s23218720 crossref_primary_10_1109_COMST_2020_3012961 crossref_primary_10_3390_s22010108 crossref_primary_10_1108_ITP_12_2019_0630 crossref_primary_10_1016_j_jisa_2020_102590 crossref_primary_10_1145_3555802 crossref_primary_10_1109_TNSE_2020_2976697 crossref_primary_10_3390_info10080259 crossref_primary_10_1155_2021_5542852 crossref_primary_10_1016_j_cose_2025_104339 crossref_primary_10_1007_s11276_018_1704_5 crossref_primary_10_1109_ACCESS_2024_3371488 crossref_primary_10_1109_ACCESS_2018_2865539 crossref_primary_10_1109_ACCESS_2020_3009876 crossref_primary_10_1109_TCC_2020_2968320 crossref_primary_10_1002_cpe_6070 crossref_primary_10_1631_FITEE_1800343 crossref_primary_10_1007_s11277_019_06872_3 crossref_primary_10_1016_j_rineng_2025_103934 crossref_primary_10_1155_2019_4520685 crossref_primary_10_1109_TCE_2019_2902412 crossref_primary_10_1109_JSYST_2020_2979006 crossref_primary_10_1080_15623599_2025_2533392 crossref_primary_10_3390_fi14010011 crossref_primary_10_3390_s20102798 crossref_primary_10_1109_JIOT_2022_3161950 crossref_primary_10_1049_cmu2_12327 crossref_primary_10_1109_JSYST_2020_2998721 crossref_primary_10_1109_ACCESS_2020_2971024 crossref_primary_10_1007_s10796_025_10579_1 crossref_primary_10_1016_j_csi_2021_103518 crossref_primary_10_1109_ACCESS_2024_3381616 crossref_primary_10_1145_3529753 crossref_primary_10_4018_IJSESD_292078 crossref_primary_10_3390_smartcities5030043 crossref_primary_10_1109_JIOT_2021_3057653 crossref_primary_10_1145_3442181 crossref_primary_10_1155_2018_1827074 crossref_primary_10_1007_s10660_022_09615_y crossref_primary_10_1186_s13677_022_00339_w crossref_primary_10_1002_spy2_70001 crossref_primary_10_1108_JHTT_07_2018_0049 crossref_primary_10_1049_iet_sen_2018_5294 crossref_primary_10_1145_3243929 |
| Cites_doi | 10.1016/j.jnca.2015.03.001 10.1109/UMEDIA.2010.5544470 10.1109/UCC.2014.68 10.1016/j.future.2012.08.003 10.1109/MSP.2011.940269 10.1007/s10723-015-9352-9 10.1109/CloudCom.2014.116 10.1109/Trustcom.2015.485 10.1109/ICOIN.2015.7057954 10.1016/j.jnca.2016.06.012 10.1002/sec.1055 10.1007/978-3-319-16745-9_28 10.1109/MCC.2017.9 10.1109/MDM.2010.78 10.1109/IEEEGCC.2013.6705783 10.1145/2642687.2642696 10.1109/ICCCW.2012.6316466 10.1109/ICCSE.2012.6295061 10.1109/IWCMC.2013.6583635 10.1109/TC.2015.2389792 10.1109/MCC.2015.2 10.1016/j.jnca.2015.10.005 10.1109/WCNC.2013.6555295 10.1109/CICN.2013.116 10.1109/CIT/IUCC/DASC/PICOM.2015.88 10.1109/MobileCloud.2014.46 10.1109/WCNC.2014.6953141 10.1109/HICSS.2013.262 10.1080/0144929X.2014.934286 10.1109/MNET.2015.7064900 10.1109/MNET.2014.6963805 10.1109/CSCloud.2016.52 10.1007/s11227-014-1269-8 10.1109/BDCloud.2015.57 10.1016/j.ins.2015.01.025 10.1109/IWCMC.2013.6583636 10.1109/SAI.2015.7237312 10.1109/TCC.2013.11 10.1145/2677046.2677052 10.1109/MCOM.2014.6766088 10.1016/j.future.2013.06.011 10.1109/MCC.2014.61 10.1109/CCECE.2012.6334973 10.1016/j.future.2012.05.023 10.1016/j.jnca.2016.08.016 10.1145/2751496.2751501 10.1109/TDSC.2015.2429132 10.1145/2420950.2420983 10.1016/j.comnet.2014.03.015 10.1109/TETC.2014.2371239 10.1109/MobileCloud.2015.11 10.1109/DSP-SPE.2011.5739270 10.1109/INFOCOM.2015.7218658 10.1109/MCOM.2015.7010539 10.1109/MSN.2015.28 10.1142/S0218488502001648 10.1109/ICCCN.2013.6614169 10.1007/s11036-014-0509-8 10.1109/ICRMS.2014.7107254 10.1109/MobileCloud.2015.15 10.1109/BTAS.2013.6712747 10.1007/s11227-013-0967-y 10.1109/Trustcom.2015.482 10.1109/JSYST.2014.2322973 10.1109/ACCESS.2013.2260813 10.1109/MobileCloud.2015.40 10.1145/1810931.1810937 10.1016/j.pmcj.2015.06.017 10.1109/TMM.2014.2315596 10.1109/TrustCom.2013.272 10.1007/s10660-015-9208-1 10.1145/1655008.1655026 10.1109/TMM.2015.2460193 10.1109/CICN.2013.120 10.1016/j.jnca.2016.01.001 10.1145/2856126 10.1109/MPRV.2009.82 10.1109/ICCCI.2015.7218101 10.1007/s10916-016-0588-0 10.1080/21642583.2014.913213 10.1016/j.pmcj.2015.06.009 10.1109/CLOUD.2010.28 10.1016/j.ins.2015.09.004 10.1109/TIFS.2015.2506542 10.1109/MIM.2015.7108393 10.1016/j.cose.2013.02.002 10.1109/TNET.2015.2487344 10.1109/TMM.2015.2438713 10.1109/INFOCOM.2015.7218474 10.1109/TWC.2015.2416177 10.1109/SECCOMW.2006.359550 10.1145/2659651.2659730 10.1109/MobileCloud.2014.19 10.1109/AIMSEC.2011.6010435 10.1016/j.jnca.2016.01.005 10.1016/j.jnca.2015.11.023 10.1109/FSKD.2015.7382287 10.1109/RoEduNet.2013.6511724 10.1109/CSCS.2013.27 10.1109/MWC.2013.6549279 10.1016/j.procs.2015.07.257 10.1007/978-3-319-24177-7_8 10.1016/j.csi.2016.09.002 10.1109/MNET.2014.6863135 10.1109/INFCOMW.2014.6849255 10.1016/j.future.2008.12.001 10.1109/SERVICES.2012.25 10.1002/sec.907 10.1109/MobileCloud.2015.36 10.1109/MCOM.2015.7120041 10.1109/CSCI.2014.33 10.1109/SURV.2013.101613.00077 10.1109/MWC.2015.7054715 10.1007/s00779-013-0682-y 10.1007/978-3-319-40253-6_24 10.1016/j.future.2016.10.004 10.1016/j.jnca.2015.11.017 10.1109/CSNT.2015.288 10.1109/MCOM.2015.7060486 10.1109/MobileCloud.2015.30 10.1016/B978-0-12-415815-3.00016-9 10.1080/02564602.2014.891382 10.1109/PCCC.2014.7017041 10.1145/2470654.2481330 10.1109/INM.2015.7140340 10.1145/1882486.1882493 |
| ContentType | Journal Article |
| Copyright | 2017 Elsevier Ltd |
| Copyright_xml | – notice: 2017 Elsevier Ltd |
| DBID | AAYXX CITATION ADTPV AOWAS |
| DOI | 10.1016/j.jnca.2017.02.001 |
| DatabaseName | CrossRef SwePub SwePub Articles |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1095-8592 |
| EndPage | 54 |
| ExternalDocumentID | oai_DiVA_org_ltu_62082 10_1016_j_jnca_2017_02_001 S1084804517300632 |
| GroupedDBID | --K --M -~X .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABJNI ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DM4 DU5 EBS EFBJH EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K WH7 ZU3 ~G- 29L 9DU AAQXK AATTM AAXKI AAYWO AAYXX ABFNM ABWVN ABXDB ACLOT ACNNM ACRPL ACVFH ADCNI ADFGL ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CAG CITATION COF EFKBS FGOYB HZ~ R2- SEW UHS XPP ZMT ~HD ADTPV AOWAS |
| ID | FETCH-LOGICAL-c337t-b86caacc6c1b06a0632e2015951ed35d32fdecde451dd06b29b8e289616284b03 |
| ISICitedReferencesCount | 165 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000398007200004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1084-8045 1095-8592 |
| IngestDate | Sat Oct 25 07:01:59 EDT 2025 Tue Nov 18 22:30:51 EST 2025 Sat Nov 29 07:09:15 EST 2025 Fri Feb 23 02:12:48 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Cloud computing Security and privacy Computational offloading Virtualization Mobile computing |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c337t-b86caacc6c1b06a0632e2015951ed35d32fdecde451dd06b29b8e289616284b03 |
| PageCount | 17 |
| ParticipantIDs | swepub_primary_oai_DiVA_org_ltu_62082 crossref_primary_10_1016_j_jnca_2017_02_001 crossref_citationtrail_10_1016_j_jnca_2017_02_001 elsevier_sciencedirect_doi_10_1016_j_jnca_2017_02_001 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-04-15 |
| PublicationDateYYYYMMDD | 2017-04-15 |
| PublicationDate_xml | – month: 04 year: 2017 text: 2017-04-15 day: 15 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of network and computer applications |
| PublicationYear | 2017 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Khan, Kiah, Ali, Shamshirband (bib69) 2015; 13 Rassan, I.A., AlShaher, H., 2014. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA), In: 2014 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 157–161. Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile Cloud Computing: Bridging the Gap between Cloud and Mobile Devices," in Computational Intelligence and Communication Networks (CICN), 2013 In: Proceedings of the 5th International Conference on, pp. 553–555. Abdalla, Pathan (bib4) 2014; 31 Online: 2016] US National Security Agency: Information Assurance Arabo A., Pranggono, B., 2013. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions, in Control Systems and Computer Science (CSCS), 2013. In: Proceedings of the 19th International Conference on, pp. 526–531. Ellouze, A., Gagnaire, M., Haddad, A., 2015. A mobile application offloading algorithm for mobile cloud computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 34–40. Dey, S., Sampalli, S., Ye, Q., 2015. A Context-Adaptive Security Framework for Mobile Cloud Computing, in 2015. In: Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 89–95. Jin, Ahn, Seol, Cha, Huh, Maeng (bib62) 2015; 64 Fernando, Loke, Rahayu (bib45) 2013; 29 Horrow, S., Gupta, S., Sardana, A., Abraham, A., 2012. Secure private cloud architecture for mobile infrastructure as a service. In: Services (SERVICES), 2012 IEEE Eighth World Congress on, pp. 149–154. Li, Liu, Dai, Luan, Shen (bib73) 2015; 3 Liu, Dai, Luan, Yu (bib77) 2015 Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S., 2009. Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127–134. Ali, Dhamotharan, Khan, Khan, Vasilakos, Li (bib8) 2015; 99 Dhanya, Kousalya (bib38) 2015 Cai, Yu, Bu (bib24) 2014; 28 Peng, Choo, Ashman (bib107) 2016; 72 Satyanarayanan, Bahl, Caceres, Davies (bib121) 2009; 8 AlShahwan, Faisal, Ansa (bib13) 2015 Shon, Cho, Han, Choi (bib126) 2014; 19 Zhang, Su, Wang, Chen, Yang (bib157) 2014; 7 Chen, M., Li, W., Li, Z., Lu, S., Chen, D., 2014. Preserving location privacy based on distributed cache pushing, in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, pp. 3456–3461. Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: Securecomm and Workshops, pp. 1–10. Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2015. Fog Computing: Focusing on Mobile Users at the Edge, arXiv preprint Ahmed, Gani, Khan, Buyya, Khan (bib5) 2015; 52 Ali, Khan, Vasilakos (bib7) 2015; 305 Mollah, M.B., Islam, K.R., Islam, S.S., 2012. Next generation of computing through cloud computing technology, in Electrical & Computer Engineering (CCECE), 2012 In: Proceedings of the 25th IEEE Canadian Conference on, pp. 1–6. Suarez-Tangil, Tapiador, Peris-Lopez, Ribagorda (bib129) 2014; 16 Online: 2016] ABI Research Report on Mobile Cloud Computing Tysowski, Hasan (bib138) 2011; 33 . Amin, M.A., Bib Abu Bakar, K., Al-Hashimi, H., 2013. A review of mobile cloud computing architecture and challenges to enterprise users, in GCC Conference and Exhibition (GCC), 2013. 7th IEEE, pp. 240–244. Chun, Maniatis (bib34) 2009 Jeong, Park, Park (bib61) 2013 Zonouz, Houmansadr, Berthier, Borisov, Sanders (bib164) 2013; 37 Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp. 14–19. [Online: 2016] Locations of Google’s Data Centers Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management, in Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1073–1080. Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., Li, Q., 2015. SMOC: A secure mobile cloud computing platform. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2668–2676. Sweeney (bib131) 2002; 10 Alizadeh, Abolfazli, Zamani, Baharun, Sakurai (bib9) 2016; 61 S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, 2014, pp. 1–2. Iqbal, Kiah, Dhaghighi, Hussain, Khan, Khan (bib59) 2016; 74 Gao, Zhang, Wen, Wang, Zhu (bib49) 2015; 17 Donald, A.C., Arockiam, L., 2015. A secure authentication scheme for MobiCloud, In: Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1–6. Baharon, M.R., Shi, Q., Llewellyn-Jones, D., 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing, in Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, pp. 618–625. Tysowski, Hasan (bib139) 2013; 1 Liu, Au, Susilo, Liang, Lu, Srinivasan (bib79) 2015; 29 Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., et al., 2015. TinMan: eliminating confidential mobile data exposure with security oriented offloading. In: Proceedings of the Tenth European Conference on Computer Systems, p. 27. Zhang, Zhao (bib156) 2015 Osanaiye, Choo, Dlodlo (bib101) 2016; 67 Wang, Wu, Chen, Wang (bib143) 2014; 52 Liu, Shu, Jin, Ding, Yu, Niu (bib78) 2013; 20 Quick, Choo (bib113) 2016 Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile cloud computing: A needed shift from cloud to mobile cloud, in Computational Intelligence and Communication Networks (CICN), 2013. In: Proceedings of the 5th International Conference on, pp. 536–539. Mohammad, Elham, Jararweh (bib88) 2015; 56 Imgraben, Engelbrecht, Choo (bib58) 2014; 33 Pasupuleti, Ramalingam, Buyya (bib105) 2016; 64 Popa, D., Cremene, M., Borda, M., Boudaoud, K., 2013. A security framework for mobile cloud applications. In: Roedunet International Conference (RoEduNet), 2013 11th, pp. 1–4. Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards Cloud-Based Compositions of Security Functions For Mobile Devices. In: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), p. 6. Choo (bib33) 2014 Zhong, L., Wang, B., Wei, H., 2012. Cloud computing applied in the mobile internet, in Computer Science & Education (ICCSE), 2012. In: Proceedings of the 7th International Conference on, pp. 218–221. Tan, J., Gandhi, R., Narasimhan, P., 2014. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE. In: Proceedings of the 6th International Conference on, pp. 644–649. Xiu-feng, Q., Jian-Wei, L., Peng-Chuan, Z., 2011. Secure cloud computing architecture on mobile internet, in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011. In: Proceedings of the 2nd International Conference on, pp. 619–622. Li, Li, Chen, Liu, Jia (bib74) 2014; 30 Olafare, O., Parhizkar, H., Vem, S., 2015. A New Secure Mobile Cloud Architecture," arXiv preprint Jin, Y., Tian, C., He, H., Wang, F., 2015. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing, in Big Data and Cloud Computing (BDCloud), 2015 IEEE. In: Proceedings of the Fifth International Conference on, pp. 172–179. Sookhak, Gani, Khan, Buyya (bib128) 2017; 380 Huerta-Canepa, G., Lee, D., 2010. A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6. Wang, S., Tu, G.-H., Ganti, R., He, T., Leung, K., Tripp, H., et al., 2013. Mobile micro-cloud: Application classification, mapping, and deployment. In: Proceedings Annual Fall Meeting of ITA (AMITA). Shi, Y., Abhilash, S., Hwang, K., 2015. Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 109–118. Al-Mutawa, M., Mishra, S., 2014. Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 51–60. Pokharel, Choo, Liu (bib108) 2017; 49 Liu, L., Zhang, X., Yan, G., Chen, S., 2009. Exploitation and threat analysis of open mobile devices, In: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 20–29. Azfar, Choo, Liu (bib16) 2016; 16 ElMenshawy, D., 2015. Touchscreen patterns based authentication approach for smart phones. In: Science and Information Conference (SAI), pp. 1311–1315. Juliadotter, Choo (bib64) 2015; 2 Buyya, Yeo, Venugopal, Broberg, Brandic (bib22) 2009; 25 Online: 2016] A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011 Online: 2016] Mobile Cloud Computing Forum Bouzefrane, S., Mostefa, B., Amira, F., Houacine., Cagon, H., 2014. Cloudlets Authentication in NFC-Based Mobile Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, 2014, pp. 267–272. Prokhorenko, Choo, Ashman (bib110) 2016; 60 Tang, L., Ouyang, L., Tsai, W.-T., 2015. Multi-factor web API security for securing Mobile Cloud. In: Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pp. 2163-2168. Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278. Walls, J., Cho Li (10.1016/j.jnca.2017.02.001_bib75) 2016; 12 10.1016/j.jnca.2017.02.001_bib43 10.1016/j.jnca.2017.02.001_bib44 10.1016/j.jnca.2017.02.001_bib41 10.1016/j.jnca.2017.02.001_bib42 10.1016/j.jnca.2017.02.001_bib40 10.1016/j.jnca.2017.02.001_bib151 10.1016/j.jnca.2017.02.001_bib150 10.1016/j.jnca.2017.02.001_bib154 10.1016/j.jnca.2017.02.001_bib39 10.1016/j.jnca.2017.02.001_bib36 10.1016/j.jnca.2017.02.001_bib37 10.1016/j.jnca.2017.02.001_bib159 Chen (10.1016/j.jnca.2017.02.001_bib29) 2015; 22 Odelu (10.1016/j.jnca.2017.02.001_bib93) 2016 Yu (10.1016/j.jnca.2017.02.001_bib153) 2014 Ahmed (10.1016/j.jnca.2017.02.001_bib5) 2015; 52 Zonouz (10.1016/j.jnca.2017.02.001_bib164) 2013; 37 10.1016/j.jnca.2017.02.001_bib54 Prokhorenko (10.1016/j.jnca.2017.02.001_bib110) 2016; 60 Flores (10.1016/j.jnca.2017.02.001_bib47) 2015; 53 10.1016/j.jnca.2017.02.001_bib53 10.1016/j.jnca.2017.02.001_bib162 10.1016/j.jnca.2017.02.001_bib161 10.1016/j.jnca.2017.02.001_bib160 10.1016/j.jnca.2017.02.001_bib48 Mao (10.1016/j.jnca.2017.02.001_bib83) 2017; 1701 10.1016/j.jnca.2017.02.001_bib46 Rappaport (10.1016/j.jnca.2017.02.001_bib116) 2013; 1 Li (10.1016/j.jnca.2017.02.001_bib73) 2015; 3 Abdalla (10.1016/j.jnca.2017.02.001_bib4) 2014; 31 Chen (10.1016/j.jnca.2017.02.001_bib27) 2015; 17 Khan (10.1016/j.jnca.2017.02.001_bib68) 2014; 70 Satyanarayanan (10.1016/j.jnca.2017.02.001_bib121) 2009; 8 Cai (10.1016/j.jnca.2017.02.001_bib24) 2014; 28 Vaquero (10.1016/j.jnca.2017.02.001_bib141) 2014; 44 Chun (10.1016/j.jnca.2017.02.001_bib34) 2009 Guo (10.1016/j.jnca.2017.02.001_bib51) 2016; 40 Meng (10.1016/j.jnca.2017.02.001_bib86) 2015 10.1016/j.jnca.2017.02.001_bib21 10.1016/j.jnca.2017.02.001_bib20 10.1016/j.jnca.2017.02.001_bib18 Mohammad (10.1016/j.jnca.2017.02.001_bib88) 2015; 56 10.1016/j.jnca.2017.02.001_bib19 Pasupuleti (10.1016/j.jnca.2017.02.001_bib105) 2016; 64 10.1016/j.jnca.2017.02.001_bib17 Paladi (10.1016/j.jnca.2017.02.001_bib103) 2016 10.1016/j.jnca.2017.02.001_bib14 10.1016/j.jnca.2017.02.001_bib15 10.1016/j.jnca.2017.02.001_bib12 Ab Rahman (10.1016/j.jnca.2017.02.001_bib3) 2016 Liu (10.1016/j.jnca.2017.02.001_bib78) 2013; 20 Chung (10.1016/j.jnca.2017.02.001_bib35) 2014; 18 Nan (10.1016/j.jnca.2017.02.001_bib91) 2014; 28 Pokharel (10.1016/j.jnca.2017.02.001_bib108) 2017; 49 Shon (10.1016/j.jnca.2017.02.001_bib126) 2014; 19 Liu (10.1016/j.jnca.2017.02.001_bib79) 2015; 29 10.1016/j.jnca.2017.02.001_bib32 Juliadotter (10.1016/j.jnca.2017.02.001_bib64) 2015; 2 Ali (10.1016/j.jnca.2017.02.001_bib8) 2015; 99 Azfar (10.1016/j.jnca.2017.02.001_bib16) 2016; 16 Raj (10.1016/j.jnca.2017.02.001_bib115) 2012 Wang (10.1016/j.jnca.2017.02.001_bib143) 2014; 52 Fernando (10.1016/j.jnca.2017.02.001_bib45) 2013; 29 10.1016/j.jnca.2017.02.001_bib100 10.1016/j.jnca.2017.02.001_bib25 10.1016/j.jnca.2017.02.001_bib26 10.1016/j.jnca.2017.02.001_bib104 Qiu (10.1016/j.jnca.2017.02.001_bib112) 2016 Zhang (10.1016/j.jnca.2017.02.001_bib155) 2015; 8 10.1016/j.jnca.2017.02.001_bib102 10.1016/j.jnca.2017.02.001_bib109 10.1016/j.jnca.2017.02.001_bib106 Dhanya (10.1016/j.jnca.2017.02.001_bib38) 2015 Yin (10.1016/j.jnca.2017.02.001_bib152) 2015; 14 10.1016/j.jnca.2017.02.001_bib80 Sgandurra (10.1016/j.jnca.2017.02.001_bib122) 2016; 48 Choo (10.1016/j.jnca.2017.02.001_bib33) 2014 Vaezpour (10.1016/j.jnca.2017.02.001_bib140) 2016 Wen (10.1016/j.jnca.2017.02.001_bib145) 2014; 16 Alizadeh (10.1016/j.jnca.2017.02.001_bib9) 2016; 61 10.1016/j.jnca.2017.02.001_bib85 10.1016/j.jnca.2017.02.001_bib84 10.1016/j.jnca.2017.02.001_bib81 10.1016/j.jnca.2017.02.001_bib82 Suarez-Tangil (10.1016/j.jnca.2017.02.001_bib129) 2014; 16 Tsai (10.1016/j.jnca.2017.02.001_bib137) 2015; 9 10.1016/j.jnca.2017.02.001_bib114 Tian (10.1016/j.jnca.2017.02.001_bib136) 2015 10.1016/j.jnca.2017.02.001_bib118 10.1016/j.jnca.2017.02.001_bib117 Buyya (10.1016/j.jnca.2017.02.001_bib22) 2009; 25 10.1016/j.jnca.2017.02.001_bib90 Zhang (10.1016/j.jnca.2017.02.001_bib156) 2015 Osanaiye (10.1016/j.jnca.2017.02.001_bib101) 2016; 67 Teing (10.1016/j.jnca.2017.02.001_bib133) 2016 AlShahwan (10.1016/j.jnca.2017.02.001_bib13) 2015 Giurgiu (10.1016/j.jnca.2017.02.001_bib50) 2009; 2009 10.1016/j.jnca.2017.02.001_bib10 10.1016/j.jnca.2017.02.001_bib98 Zhu (10.1016/j.jnca.2017.02.001_bib163) 2011; 28 10.1016/j.jnca.2017.02.001_bib11 10.1016/j.jnca.2017.02.001_bib99 10.1016/j.jnca.2017.02.001_bib96 Khan (10.1016/j.jnca.2017.02.001_bib66) 2013; 29 10.1016/j.jnca.2017.02.001_bib97 10.1016/j.jnca.2017.02.001_bib94 10.1016/j.jnca.2017.02.001_bib95 10.1016/j.jnca.2017.02.001_bib92 Kumari (10.1016/j.jnca.2017.02.001_bib71) 2017; 68 10.1016/j.jnca.2017.02.001_bib123 10.1016/j.jnca.2017.02.001_bib120 10.1016/j.jnca.2017.02.001_bib125 10.1016/j.jnca.2017.02.001_bib124 Ali (10.1016/j.jnca.2017.02.001_bib7) 2015; 305 Psannis (10.1016/j.jnca.2017.02.001_bib111) 2014; 2 10.1016/j.jnca.2017.02.001_bib1 Chen (10.1016/j.jnca.2017.02.001_bib30) 2015; 53 Han (10.1016/j.jnca.2017.02.001_bib52) 2015 10.1016/j.jnca.2017.02.001_bib2 Zhang (10.1016/j.jnca.2017.02.001_bib158) 2016; 28 Khalil (10.1016/j.jnca.2017.02.001_bib65) 2014; 65 Khan (10.1016/j.jnca.2017.02.001_bib69) 2015; 13 10.1016/j.jnca.2017.02.001_bib6 Zhang (10.1016/j.jnca.2017.02.001_bib157) 2014; 7 Chen (10.1016/j.jnca.2017.02.001_bib28) 2015; 29 Yang (10.1016/j.jnca.2017.02.001_bib149) 2016; 28 10.1016/j.jnca.2017.02.001_bib63 Mollah (10.1016/j.jnca.2017.02.001_bib89) 2017; 4 10.1016/j.jnca.2017.02.001_bib130 Cahyani (10.1016/j.jnca.2017.02.001_bib23) 2016 10.1016/j.jnca.2017.02.001_bib60 Saab (10.1016/j.jnca.2017.02.001_bib119) 2015; 8 10.1016/j.jnca.2017.02.001_bib134 Chen (10.1016/j.jnca.2017.02.001_bib31) 2016; 24 10.1016/j.jnca.2017.02.001_bib132 Sitová (10.1016/j.jnca.2017.02.001_bib127) 2016; 11 10.1016/j.jnca.2017.02.001_bib56 10.1016/j.jnca.2017.02.001_bib57 10.1016/j.jnca.2017.02.001_bib135 Hossain (10.1016/j.jnca.2017.02.001_bib55) 2015; 18 Jin (10.1016/j.jnca.2017.02.001_bib62) 2015; 64 Sweeney (10.1016/j.jnca.2017.02.001_bib131) 2002; 10 Tysowski (10.1016/j.jnca.2017.02.001_bib138) 2011; 33 Liu (10.1016/j.jnca.2017.02.001_bib77) 2015 Milligan (10.1016/j.jnca.2017.02.001_bib87) 2008; 1 Sookhak (10.1016/j.jnca.2017.02.001_bib128) 2017; 380 Quick (10.1016/j.jnca.2017.02.001_bib113) 2016 10.1016/j.jnca.2017.02.001_bib76 Tysowski (10.1016/j.jnca.2017.02.001_bib139) 2013; 1 Khan (10.1016/j.jnca.2017.02.001_bib67) 2013; 66 10.1016/j.jnca.2017.02.001_bib72 Gao (10.1016/j.jnca.2017.02.001_bib49) 2015; 17 10.1016/j.jnca.2017.02.001_bib70 10.1016/j.jnca.2017.02.001_bib144 10.1016/j.jnca.2017.02.001_bib142 Iqbal (10.1016/j.jnca.2017.02.001_bib59) 2016; 74 10.1016/j.jnca.2017.02.001_bib148 10.1016/j.jnca.2017.02.001_bib147 Wu (10.1016/j.jnca.2017.02.001_bib146) 2015; 53 Imgraben (10.1016/j.jnca.2017.02.001_bib58) 2014; 33 Jeong (10.1016/j.jnca.2017.02.001_bib61) 2013 Li (10.1016/j.jnca.2017.02.001_bib74) 2014; 30 Peng (10.1016/j.jnca.2017.02.001_bib107) 2016; 72 |
| References_xml | – volume: 28 start-page: 122 year: 2016 end-page: 134 ident: bib149 article-title: Cloud based data sharing with fine-grained proxy re-encryption publication-title: Pervasive Mob. Comput. – year: 2016 ident: bib133 article-title: Forensic investigation of cooperative storage cloud service: symform as a case study publication-title: J. Forensic Sci. – volume: 16 start-page: 885 year: 2014 end-page: 902 ident: bib145 article-title: Cloud mobile media: reflections and outlook publication-title: Multimed. IEEE Trans. – volume: 64 start-page: 2833 year: 2015 end-page: 2846 ident: bib62 article-title: H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor publication-title: Comput. IEEE Trans. – start-page: 411 year: 2012 end-page: 429 ident: bib115 article-title: secure mobile cloud computing publication-title: Handb. Secur. Cyber-Phys. Crit. Infrastruct. – volume: 37 start-page: 215 year: 2013 end-page: 227 ident: bib164 article-title: Secloud: a cloud-based comprehensive and lightweight security solution for smartphones publication-title: Comput. Secur. – volume: 70 start-page: 946 year: 2014 end-page: 976 ident: bib68 article-title: BSS: block-based sharing scheme for secure data storage services in mobile cloud environment publication-title: J. Supercomput. – volume: 10 start-page: 557 year: 2002 end-page: 570 ident: bib131 article-title: k-anonymity: a model for protecting privacy publication-title: Int. J. Uncertain. Fuzziness Knowl.-Based Syst. – year: 2015 ident: bib136 article-title: Dynamic-hash-table based public auditing for secure cloud storage publication-title: IEEE Trans. Serv. Comput. – reference: Ferzli R., Khalife, I., 2011. Mobile cloud computing educational tool for image/video processing algorithms, in Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop (DSP/SPE), IEEE, pp. 529–533. – reference: Fawaz, K., Feng, H., Shin, K.G., 2015. Anatomization and Protection of Mobile Apps' Location Privacy Threats. In: Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), pp. 753–768. – volume: 30 start-page: 98 year: 2014 end-page: 106 ident: bib74 article-title: Privacy-preserving data utilization in hybrid clouds publication-title: Future Gener. Comput. Syst. – start-page: 1 year: 2015 end-page: 11 ident: bib13 article-title: Security framework for RESTful mobile cloud computing web services publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 8 year: 2009 end-page: 11 ident: bib34 article-title: Augmented smartphone applications Through clone cloud execution publication-title: HotOS – volume: 7 start-page: 1933 year: 2014 end-page: 1944 ident: bib157 article-title: Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud publication-title: Secur. Commun. Netw. – volume: 4 start-page: 34 year: 2017 end-page: 42 ident: bib89 article-title: Secure data sharing and Searching at the edge of cloud-assisted Internet of Things publication-title: IEEE Cloud Comput. – reference: Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., Li, Q., 2015. SMOC: A secure mobile cloud computing platform. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2668–2676. – volume: 2 start-page: 14 year: 2015 end-page: 20 ident: bib64 article-title: Cloud attack and risk assessment taxonomy publication-title: IEEE Cloud Comput. – reference: Ba, H., Heinzelman, W., Janssen, C.-A., Shi, J., 2013. Mobile computing-A green computing resource, in Wireless Communications and Networking Conference (WCNC), IEEE, pp. 4451–4456. – reference: Baharon, M.R., Shi, Q., Llewellyn-Jones, D., 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing, in Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, pp. 618–625. – reference: Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: Securecomm and Workshops, pp. 1–10. – year: 2016 ident: bib140 article-title: A new approach to mitigating security risks of phone clone Co-location Over mobile clouds publication-title: J. Netw. Comput. Appl. – start-page: 45 year: 2015 end-page: 53 ident: bib38 article-title: Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing, Security in Computing and Communications – reference: Ellouze, A., Gagnaire, M., Haddad, A., 2015. A mobile application offloading algorithm for mobile cloud computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 34–40. – volume: 17 start-page: 1286 year: 2015 end-page: 1296 ident: bib49 article-title: Towards cost-efficient video transcoding in media cloud: insights learned from user viewing patterns publication-title: Multimed. IEEE Trans. – reference: Zhong, H., Xiao, J., 2014. Design for a cloud-based hybrid Android application security assessment framework. In: Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on, pp. 539–546. – volume: 61 start-page: 59 year: 2016 end-page: 80 ident: bib9 article-title: Authentication in mobile cloud computing: a survey publication-title: J. Netw. Comput. Appl. – volume: 52 start-page: 73 year: 2014 end-page: 79 ident: bib143 article-title: Security protection between users and the mobile media cloud publication-title: Commun. Mag., IEEE – reference: Liang, H., Han, C., Zhang, D., Wu, D., 2014. A Lightweight Security Isolation Approach for Virtual Machines Deployment. In: Information Security and Cryptology, pp. 516–529. – reference: Amin, M.A., Bib Abu Bakar, K., Al-Hashimi, H., 2013. A review of mobile cloud computing architecture and challenges to enterprise users, in GCC Conference and Exhibition (GCC), 2013. 7th IEEE, pp. 240–244. – reference: ElMenshawy, D., 2015. Touchscreen patterns based authentication approach for smart phones. In: Science and Information Conference (SAI), pp. 1311–1315. – year: 2015 ident: bib52 article-title: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing publication-title: IEEE Trans. Dependable Secur. Comput. – volume: 8 start-page: 1006 year: 2015 end-page: 1025 ident: bib155 article-title: Mobile cloud computing based privacy protection in location‐based information survey applications publication-title: Secur. Commun. Netw. – reference: Walls, J., Choo, K.-K. R., 2015. A Review of Free Cloud-Based Anti-Malware Apps for Android, In: Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1053–1058. – reference: Online: 2016] US National Security Agency: Information Assurance: – volume: 24 start-page: 2795 year: 2016 end-page: 2808 ident: bib31 article-title: Efficient multi-user computation offloading for mobile-edge cloud computing publication-title: IEEE/ACM Trans. Netw. – volume: 2 start-page: 476 year: 2014 end-page: 483 ident: bib111 article-title: Convergence of Internet of things and mobile cloud computing publication-title: Syst. Sci. Control Eng.: Open Access J. – reference: Suo, H., Liu, Z., Wan, J., Zhou, K., 2013. Security and privacy in mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 655–659. – reference: Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278. – year: 2016 ident: bib3 article-title: Cloud incident handling and forensic‐by‐design: cloud storage as a case study publication-title: Concurr. Comput.: Pract. Exp. – volume: 53 start-page: 80 year: 2015 end-page: 88 ident: bib47 article-title: Mobile code offloading: from concept to practice and beyond publication-title: Commun. Mag. IEEE – reference: Bahrami, M., Singhal, M., 2015. A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 189–198. – reference: Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Bringing mobile online games to clouds, in Computer Communications Workshops (INFOCOM WKSHPS), 2014. IEEE Conference on, pp. 340–345. – volume: 29 start-page: 1278 year: 2013 end-page: 1299 ident: bib66 article-title: Towards secure mobile cloud computing: a survey publication-title: Future Gener. Comput. Syst. – volume: 74 start-page: 98 year: 2016 end-page: 120 ident: bib59 article-title: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service publication-title: J. Netw. Comput. Appl. – year: 2016 ident: bib113 article-title: Pervasive social networking forensics: intelligence and evidence from mobile device extracts publication-title: J. Netw. Comput. Appl. – reference: Tan, J., Gandhi, R., Narasimhan, P., 2014. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE. In: Proceedings of the 6th International Conference on, pp. 644–649. – reference: Zhong, L., Wang, B., Wei, H., 2012. Cloud computing applied in the mobile internet, in Computer Science & Education (ICCSE), 2012. In: Proceedings of the 7th International Conference on, pp. 218–221. – volume: 28 start-page: 135 year: 2016 end-page: 149 ident: bib158 article-title: Efficient attribute-based data sharing in mobile clouds publication-title: Pervasive Mob. Comput. – volume: 49 start-page: 71 year: 2017 end-page: 78 ident: bib108 article-title: Mobile cloud security: an adversary model for lightweight browser security publication-title: Comput. Stand. Interfaces – reference: Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management, in Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1073–1080. – reference: De Luca, A., Von Zezschwitz, E., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., et al., 2013. Back-of-device authentication on smartphones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2389–2398. – reference: Xiu-feng, Q., Jian-Wei, L., Peng-Chuan, Z., 2011. Secure cloud computing architecture on mobile internet, in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011. In: Proceedings of the 2nd International Conference on, pp. 619–622. – volume: 17 start-page: 1471 year: 2015 end-page: 1483 ident: bib27 article-title: Cloud-assisted live streaming for crowdsourced multimedia content publication-title: Multimed. IEEE Trans. – volume: 29 start-page: 46 year: 2015 end-page: 50 ident: bib79 article-title: Secure sharing and searching for real-time video data in mobile cloud publication-title: Netw. IEEE – start-page: 28 year: 2014 end-page: 40 ident: bib153 article-title: Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage, Network andSystem Security – volume: 1701 start-page: 01090 year: 2017 ident: bib83 article-title: Mobile edge computing: survey and Research outlook publication-title: arXiv Prepr arXiv – reference: Rassan, I.A., AlShaher, H., 2014. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA), In: 2014 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 157–161. – year: 2015 ident: bib77 article-title: Personalized search over encrypted data with efficient and secure updates in mobile clouds publication-title: IEEE Trans. Emerg. Top. Comput. – reference: Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2015. Fog Computing: Focusing on Mobile Users at the Edge, arXiv preprint – volume: 305 start-page: 357 year: 2015 end-page: 383 ident: bib7 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. – volume: 60 start-page: 95 year: 2016 end-page: 112 ident: bib110 article-title: Web application protection techniques: a taxonomy publication-title: J. Netw. Comput. Appl. – reference: [Online: 2016] Locations of Google’s Data Centers: – volume: 16 start-page: 73 year: 2016 end-page: 111 ident: bib16 article-title: Android mobile VoIP apps: a survey and examination of their security and privacy publication-title: Electron. Commer. Res. – reference: Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile Cloud Computing: Bridging the Gap between Cloud and Mobile Devices," in Computational Intelligence and Communication Networks (CICN), 2013 In: Proceedings of the 5th International Conference on, pp. 553–555. – volume: 18 start-page: 11 year: 2015 end-page: 21 ident: bib55 article-title: 5G cellular: key enabling technologies and research challenges publication-title: Instrum. Meas. Mag. IEEE – volume: 12 start-page: 67 year: 2016 ident: bib75 article-title: Intercrossed access controls for secure financial services on multimedia big data in cloud systems publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) – volume: 72 start-page: 14 year: 2016 end-page: 27 ident: bib107 article-title: User profiling in intrusion detection: a review publication-title: J. Netw. Comput. Appl. – year: 2013 ident: bib61 article-title: An efficient authentication system of smart device using multi factors in mobile cloud service architecture publication-title: Int. J. Commun. Syst. – reference: Liu, L., Zhang, X., Yan, G., Chen, S., 2009. Exploitation and threat analysis of open mobile devices, In: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 20–29. – volume: 1 start-page: 24 year: 2008 ident: bib87 article-title: Business risks and security assessment for mobile devices publication-title: Inf. Syst. Control J. – reference: Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp. 14–19. – reference: Bahrami, M., 2015. Cloud Computing for Emerging Mobile Cloud Apps, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 4–5. – reference: Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S., 2009. Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127–134. – reference: Huerta-Canepa, G., Lee, D., 2010. A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6. – reference: Alqahtani, H.S., Kouadri-Mostefaou, G., 2014. Multi-clouds Mobile Computing for the Secure Storage of Data, in 2014 IEEE/ACM. In: Proceedings of the 7th International Conference on Utility and Cloud Computing, pp. 495–496. – volume: 64 start-page: 12 year: 2016 end-page: 22 ident: bib105 article-title: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing publication-title: J. Netw. Comput. Appl. – volume: 22 start-page: 20 year: 2015 end-page: 27 ident: bib29 article-title: AIWAC: affective interaction through wearable computing and cloud technology publication-title: Wirel. Commun. IEEE – reference: Zhao, X., Feng, T., Shi, W., 2013. Continuous mobile authentication using a novel graphic touch gesture feature, in Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE. In: Proceedings of the Sixth International Conference on, pp. 1–6. – reference: Arabo A., Pranggono, B., 2013. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions, in Control Systems and Computer Science (CSCS), 2013. In: Proceedings of the 19th International Conference on, pp. 526–531. – year: 2016 ident: bib23 article-title: Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study publication-title: Concurr. Comput.: Pract. Exp. – reference: Feng, T., Zhao, X., Carbunar, B., Shi, W., 2013. Continuous mobile authentication using virtual key typing biometrics, in Trust, security and privacy in computing and communications (TrustCom), 2013. In: Proceedings of the 12th IEEE international conference on, pp. 1547–1552. – volume: 3 start-page: 127 year: 2015 end-page: 138 ident: bib73 article-title: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage publication-title: Emerg. Top. Comput. IEEE Trans. – volume: 25 start-page: 599 year: 2009 end-page: 616 ident: bib22 article-title: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility publication-title: Future Gener. Comput. Syst. – volume: 40 start-page: 235 year: 2016 ident: bib51 article-title: Fine-grained database field search using attribute-based encryption for e-healthcare clouds publication-title: J. Med. Syst. – volume: 13 start-page: 651 year: 2015 end-page: 675 ident: bib69 article-title: A cloud-Manager-based Re-Encryption scheme for mobile users in cloud environment: a hybrid approach publication-title: J. Grid Comput. – year: 2016 ident: bib103 article-title: Providing user security guarantees in public infrastructure clouds publication-title: IEEE Trans. Cloud Comput. – volume: 8 start-page: 38 year: 2015 end-page: 46 ident: bib119 article-title: Partial mobile application offloading to the cloud for energy-efficiency with security measures publication-title: Sustain. Comput.: Inform. Syst. – volume: 53 start-page: 18 year: 2015 end-page: 24 ident: bib30 article-title: On the computation offloading at ad hoc cloudlet: architecture and service modes publication-title: Commun. Mag., IEEE – reference: Park, I.-S., Lee, Y.-D., Jeong, J., 2013. Improved Identity Management Protocol for Secure Mobile Cloud Computing, in System Sciences (HICSS), 2013. In: Proceedings of the 46th Hawaii International Conference on, pp. 4958–4965. – volume: 11 start-page: 877 year: 2016 end-page: 892 ident: bib127 article-title: HMOG: New behavioral biometric features for continuous authentication of smartphone users publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Niu, B., Li, Q., Zhu, X., Cao, G., Li, H., 2015. Enhancing privacy through caching in location-based services. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 1017–1025. – reference: Olafare, O., Parhizkar, H., Vem, S., 2015. A New Secure Mobile Cloud Architecture," arXiv preprint – volume: 9 start-page: 805 year: 2015 end-page: 815 ident: bib137 article-title: A Privacy-Aware authentication scheme for Distributed mobile cloud computing services publication-title: IEEE Syst. J. – reference: Jarabek, C., Barrera, D., Aycock, J., 2012. Thinav: Truly lightweight mobile cloud-based anti-malware. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 209–218. – reference: Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Using mobile cloud computing for real-time online applications, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, pp. 48–56. – reference: Alam, S., Sogukpinar, I., Traore, I., Coady, Y., 2014. In-Cloud Malware Analysis and Detection: State of the Art. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 473. – reference: Chen, M., Li, W., Li, Z., Lu, S., Chen, D., 2014. Preserving location privacy based on distributed cache pushing, in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, pp. 3456–3461. – year: 2016 ident: bib112 article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry publication-title: Future Gener. Comput. Syst. – volume: 14 start-page: 4020 year: 2015 end-page: 4033 ident: bib152 article-title: Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud publication-title: Wirel. Commun. IEEE Trans. – reference: Jin, Y., Tian, C., He, H., Wang, F., 2015. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing, in Big Data and Cloud Computing (BDCloud), 2015 IEEE. In: Proceedings of the Fifth International Conference on, pp. 172–179. – reference: Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile cloud computing: A needed shift from cloud to mobile cloud, in Computational Intelligence and Communication Networks (CICN), 2013. In: Proceedings of the 5th International Conference on, pp. 536–539. – start-page: 20 year: 2014 end-page: 23 ident: bib33 article-title: Mobile cloud storage users publication-title: IEEE Cloud Comput. – start-page: 1 year: 2015 end-page: 10 ident: bib156 article-title: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage publication-title: Clust. Comput. – volume: 65 start-page: 99 year: 2014 end-page: 110 ident: bib65 article-title: Consolidated Identity Management System for secure mobile cloud computing publication-title: Comput. Netw. – volume: 67 start-page: 147 year: 2016 end-page: 165 ident: bib101 article-title: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework publication-title: J. Netw. Comput. Appl. – volume: 48 start-page: 46 year: 2016 ident: bib122 article-title: Evolution of attacks, threat models, and solutions for virtualized systems publication-title: ACM Comput. Surv. (CSUR) – reference: Patel, P., Patel, R., 2015. Security in CloneCloud for Mobile Cloud Computing, in Communication Systems and Network Technologies (CSNT), 2015. In: Proceedings of the Fifth International Conference on, pp. 752–756. – reference: Online: 2016] Mobile Cloud Computing Forum; – reference: Al-Mutawa, M., Mishra, S., 2014. Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 51–60. – volume: 44 start-page: 27 year: 2014 end-page: 32 ident: bib141 article-title: Finding your way in the fog: towards a comprehensive definition of fog computing publication-title: ACM SIGCOMM Comput. Commun. Rev. – reference: Duan, Y., Zhang, M., Yin, H., Tang, Y., 2015. Privacy-preserving offloading of mobile app to the public cloud. In: Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud15). – reference: Alizadeh, M., Hassan, W.H., 2013. Challenges and opportunities of mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 660–666. – year: 2016 ident: bib93 article-title: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment publication-title: Comput. Stand. Interfaces – volume: 33 start-page: 2011 year: 2011 ident: bib138 article-title: Towards secure communication for highly scalable mobile applications in cloud computing systems publication-title: Cent. Appl. Cryptogr. Res. Univ. Waterloo Tech. Rep. CACR – reference: Online: 2016] Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications: – volume: 56 start-page: 580 year: 2015 end-page: 585 ident: bib88 article-title: AMCC: Ad-hoc based mobile cloud computing modeling publication-title: Procedia Comput. Sci. – volume: 99 start-page: 1 year: 2015 end-page: 10 ident: bib8 article-title: SeDaSC: Secure data sharing in clouds publication-title: IEEE Syst. J. – reference: Horrow, S., Gupta, S., Sardana, A., Abraham, A., 2012. Secure private cloud architecture for mobile infrastructure as a service. In: Services (SERVICES), 2012 IEEE Eighth World Congress on, pp. 149–154. – volume: 1 start-page: 172 year: 2013 end-page: 186 ident: bib139 article-title: Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds publication-title: Cloud Comput. IEEE Trans. – volume: 31 start-page: 82 year: 2014 end-page: 91 ident: bib4 article-title: On protecting data storage in mobile cloud computing paradigm publication-title: IETE Tech. Rev. – reference: Yang, X., Pan, T., Shen, J., 2010. On 3G mobile e-commerce platform based on cloud computing, in Ubi-media Computing (U-Media), 2010. In: Proceedings of the 3rd IEEE International Conference on, pp. 198–201. – reference: Kovachev, D., Renzel, D., Klamma, R., Cao, Y., 2010. Mobile community cloud computing: emerges and evolves, in Mobile Data Management (MDM), 2010. In: Proceedings of the Eleventh International Conference on, pp. 393–395. – reference: S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, 2014, pp. 1–2. – volume: 8 start-page: 14 year: 2009 end-page: 23 ident: bib121 article-title: The case for vm-based cloudlets in mobile computing publication-title: Pervasive Comput. IEEE – volume: 19 start-page: 404 year: 2014 end-page: 413 ident: bib126 article-title: Toward advanced mobile cloud computing for the Internet of Things: Current issues and future direction publication-title: Mob. Netw. Appl. – volume: 53 start-page: 232 year: 2015 end-page: 238 ident: bib146 article-title: Millimeter-wave multimedia communications: challenges, methodology, and applications publication-title: Commun. Mag. IEEE – volume: 33 start-page: 1347 year: 2014 end-page: 1360 ident: bib58 article-title: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users publication-title: Behav. Inf. Technol. – reference: Online: 2016] ABI Research Report on Mobile Cloud Computing; – volume: 18 start-page: 489 year: 2014 end-page: 491 ident: bib35 article-title: Recent trends on mobile computing and future networks publication-title: Pers. Ubiquitous Comput. – volume: 29 start-page: 84 year: 2013 end-page: 106 ident: bib45 article-title: mobile cloud computing: a survey publication-title: Future Gener. Comput. Syst. – volume: 20 start-page: 14 year: 2013 end-page: 22 ident: bib78 article-title: Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications publication-title: Wirel. Commun. IEEE – reference: Yu, Y., Li, Y., Au, M.H., Susilo, W., Choo, K.-K.R., Zhang, X., 2016. Public cloud data auditing with practical key update and zero knowledge privacy. In: Australasian Conference on Information Security and Privacy, pp. 389–405. – reference: Cai, W., Zhou, C., Li, M., Li, X., Leung, V., 2015. MCG Test-bed: an Experimental Test-bed for Mobile Cloud Gaming. In: Proceedings of the 2nd Workshop on Mobile Gaming, pp. 25–30. – reference: Mollah, M.B., Islam, K.R., Islam, S.S., 2012. Next generation of computing through cloud computing technology, in Electrical & Computer Engineering (CCECE), 2012 In: Proceedings of the 25th IEEE Canadian Conference on, pp. 1–6. – reference: Louk M., Lim, H., 2015. Homomorphic encryption in mobile multi cloud computing, in Information Networking (ICOIN), 2015 International Conference on, pp. 493–497. – start-page: 143 year: 2015 end-page: 157 ident: bib86 article-title: Model-Based Quantitative Security Analysis of Mobile Offloading Systems under Timing Attacks, Analytical and Stochastic Modelling Techniques and Applications – reference: Owens, R., Wang, W., 2013. Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing, in Computer Communications and Networks (ICCCN), 2013. In: Proceedings of the 22nd International Conference on, pp. 1–5. – reference: Wang, S., Tu, G.-H., Ganti, R., He, T., Leung, K., Tripp, H., et al., 2013. Mobile micro-cloud: Application classification, mapping, and deployment. In: Proceedings Annual Fall Meeting of ITA (AMITA). – reference: Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., 2015. Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, in European Symposium on Research in Computer Security, pp. 146–166. – volume: 28 start-page: 74 year: 2014 end-page: 80 ident: bib91 article-title: Distributed resource allocation in cloud-based wireless multimedia social networks publication-title: Netw., IEEE – reference: Dey, S., Sampalli, S., Ye, Q., 2015. A Context-Adaptive Security Framework for Mobile Cloud Computing, in 2015. In: Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 89–95. – reference: Popa, D., Cremene, M., Borda, M., Boudaoud, K., 2013. A security framework for mobile cloud applications. In: Roedunet International Conference (RoEduNet), 2013 11th, pp. 1–4. – volume: 16 start-page: 961 year: 2014 end-page: 987 ident: bib129 article-title: Evolution, detection and analysis of malware for smart devices publication-title: Commun. Surv. Tutor. IEEE – volume: 52 start-page: 154 year: 2015 end-page: 172 ident: bib5 article-title: Seamless application execution in mobile cloud computing: motivation, taxonomy, and open challenges publication-title: J. Netw. Comput. Appl. – reference: Online: 2016] A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011: – volume: 28 start-page: 59 year: 2011 end-page: 69 ident: bib163 article-title: Multimedia cloud computing publication-title: Signal Process. Mag. IEEE – reference: Bouzefrane, S., Mostefa, B., Amira, F., Houacine., Cagon, H., 2014. Cloudlets Authentication in NFC-Based Mobile Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, 2014, pp. 267–272. – volume: 1 start-page: 335 year: 2013 end-page: 349 ident: bib116 article-title: Millimeter wave mobile communications for 5G cellular: it will work! publication-title: Access, IEEE – volume: 28 start-page: 54 year: 2014 end-page: 59 ident: bib24 article-title: Cloud computing meets mobile wireless communications in next generation cellular networks publication-title: Netw. IEEE – reference: Lei, L., Sengupta, S., Pattanaik, T., Gao, J., 2015. MCloudDB: A Mobile Cloud Database Service Framework, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 6–15. – reference: Tang, L., Ouyang, L., Tsai, W.-T., 2015. Multi-factor web API security for securing Mobile Cloud. In: Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pp. 2163-2168. – reference: . – volume: 68 start-page: 320 year: 2017 end-page: 330 ident: bib71 article-title: Design of a provably secure biometrics-based multi-cloud-server authentication scheme publication-title: Future Gener. Comput. Syst. – reference: Online: 2016] Device Policy for Andriod: Overview for Users: – reference: Chard, K., Caton, S., Rana, O., Bubendorfer, K., 2010. Social cloud: Cloud computing in social networks," in Cloud Computing (CLOUD), 2010. IEEE In: Proceedings of the 3rd International Conference on, pp. 99–106. – volume: 2009 start-page: 83 year: 2009 end-page: 102 ident: bib50 publication-title: Calling the Cloud: Enabling Mobile Phones as Interfaces t Cloud Applications – reference: Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards Cloud-Based Compositions of Security Functions For Mobile Devices. In: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), p. 6. – reference: Donald, A.C., Arockiam, L., 2015. A secure authentication scheme for MobiCloud, In: Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1–6. – volume: 380 start-page: 101 year: 2017 end-page: 116 ident: bib128 article-title: Dynamic remote data auditing for securing big data storage in cloud computing publication-title: Inf. Sci. – reference: Shi, Y., Abhilash, S., Hwang, K., 2015. Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 109–118. – volume: 29 start-page: 32 year: 2015 end-page: 38 ident: bib28 article-title: EMC: emotion-aware mobile cloud computing in 5G publication-title: Netw. IEEE – volume: 66 start-page: 1687 year: 2013 end-page: 1706 ident: bib67 article-title: Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing publication-title: J. Supercomput. – reference: Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., et al., 2015. TinMan: eliminating confidential mobile data exposure with security oriented offloading. In: Proceedings of the Tenth European Conference on Computer Systems, p. 27. – volume: 52 start-page: 154 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib5 article-title: Seamless application execution in mobile cloud computing: motivation, taxonomy, and open challenges publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.03.001 – ident: 10.1016/j.jnca.2017.02.001_bib150 doi: 10.1109/UMEDIA.2010.5544470 – ident: 10.1016/j.jnca.2017.02.001_bib144 – ident: 10.1016/j.jnca.2017.02.001_bib12 doi: 10.1109/UCC.2014.68 – volume: 29 start-page: 1278 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib66 article-title: Towards secure mobile cloud computing: a survey publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2012.08.003 – volume: 33 start-page: 2011 year: 2011 ident: 10.1016/j.jnca.2017.02.001_bib138 article-title: Towards secure communication for highly scalable mobile applications in cloud computing systems publication-title: Cent. Appl. Cryptogr. Res. Univ. Waterloo Tech. Rep. CACR – volume: 28 start-page: 59 year: 2011 ident: 10.1016/j.jnca.2017.02.001_bib163 article-title: Multimedia cloud computing publication-title: Signal Process. Mag. IEEE doi: 10.1109/MSP.2011.940269 – volume: 13 start-page: 651 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib69 article-title: A cloud-Manager-based Re-Encryption scheme for mobile users in cloud environment: a hybrid approach publication-title: J. Grid Comput. doi: 10.1007/s10723-015-9352-9 – volume: 1 start-page: 24 year: 2008 ident: 10.1016/j.jnca.2017.02.001_bib87 article-title: Business risks and security assessment for mobile devices publication-title: Inf. Syst. Control J. – ident: 10.1016/j.jnca.2017.02.001_bib132 doi: 10.1109/CloudCom.2014.116 – ident: 10.1016/j.jnca.2017.02.001_bib134 doi: 10.1109/Trustcom.2015.485 – ident: 10.1016/j.jnca.2017.02.001_bib81 doi: 10.1109/ICOIN.2015.7057954 – volume: 72 start-page: 14 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib107 article-title: User profiling in intrusion detection: a review publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.06.012 – ident: 10.1016/j.jnca.2017.02.001_bib98 – volume: 8 start-page: 1006 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib155 article-title: Mobile cloud computing based privacy protection in location‐based information survey applications publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1055 – ident: 10.1016/j.jnca.2017.02.001_bib76 doi: 10.1007/978-3-319-16745-9_28 – volume: 4 start-page: 34 year: 2017 ident: 10.1016/j.jnca.2017.02.001_bib89 article-title: Secure data sharing and Searching at the edge of cloud-assisted Internet of Things publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2017.9 – ident: 10.1016/j.jnca.2017.02.001_bib2 – ident: 10.1016/j.jnca.2017.02.001_bib70 doi: 10.1109/MDM.2010.78 – ident: 10.1016/j.jnca.2017.02.001_bib43 – volume: 1701 start-page: 01090 year: 2017 ident: 10.1016/j.jnca.2017.02.001_bib83 article-title: Mobile edge computing: survey and Research outlook publication-title: arXiv Prepr arXiv – ident: 10.1016/j.jnca.2017.02.001_bib14 doi: 10.1109/IEEEGCC.2013.6705783 – ident: 10.1016/j.jnca.2017.02.001_bib147 – ident: 10.1016/j.jnca.2017.02.001_bib11 doi: 10.1145/2642687.2642696 – ident: 10.1016/j.jnca.2017.02.001_bib120 doi: 10.1109/ICCCW.2012.6316466 – start-page: 1 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib156 article-title: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage publication-title: Clust. Comput. – ident: 10.1016/j.jnca.2017.02.001_bib162 doi: 10.1109/ICCSE.2012.6295061 – ident: 10.1016/j.jnca.2017.02.001_bib130 doi: 10.1109/IWCMC.2013.6583635 – ident: 10.1016/j.jnca.2017.02.001_bib1 – volume: 64 start-page: 2833 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib62 article-title: H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor publication-title: Comput. IEEE Trans. doi: 10.1109/TC.2015.2389792 – volume: 2 start-page: 14 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib64 article-title: Cloud attack and risk assessment taxonomy publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2015.2 – ident: 10.1016/j.jnca.2017.02.001_bib95 – volume: 61 start-page: 59 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib9 article-title: Authentication in mobile cloud computing: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.10.005 – ident: 10.1016/j.jnca.2017.02.001_bib17 doi: 10.1109/WCNC.2013.6555295 – start-page: 28 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib153 – ident: 10.1016/j.jnca.2017.02.001_bib123 doi: 10.1109/CICN.2013.116 – ident: 10.1016/j.jnca.2017.02.001_bib18 doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.88 – start-page: 1 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib13 article-title: Security framework for RESTful mobile cloud computing web services publication-title: J. Ambient Intell. Humaniz. Comput. – ident: 10.1016/j.jnca.2017.02.001_bib21 doi: 10.1109/MobileCloud.2014.46 – ident: 10.1016/j.jnca.2017.02.001_bib32 doi: 10.1109/WCNC.2014.6953141 – ident: 10.1016/j.jnca.2017.02.001_bib104 doi: 10.1109/HICSS.2013.262 – volume: 8 start-page: 38 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib119 article-title: Partial mobile application offloading to the cloud for energy-efficiency with security measures publication-title: Sustain. Comput.: Inform. Syst. – volume: 33 start-page: 1347 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib58 article-title: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users publication-title: Behav. Inf. Technol. doi: 10.1080/0144929X.2014.934286 – volume: 29 start-page: 32 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib28 article-title: EMC: emotion-aware mobile cloud computing in 5G publication-title: Netw. IEEE doi: 10.1109/MNET.2015.7064900 – volume: 28 start-page: 54 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib24 article-title: Cloud computing meets mobile wireless communications in next generation cellular networks publication-title: Netw. IEEE doi: 10.1109/MNET.2014.6963805 – ident: 10.1016/j.jnca.2017.02.001_bib48 doi: 10.1109/CSCloud.2016.52 – volume: 70 start-page: 946 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib68 article-title: BSS: block-based sharing scheme for secure data storage services in mobile cloud environment publication-title: J. Supercomput. doi: 10.1007/s11227-014-1269-8 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib113 article-title: Pervasive social networking forensics: intelligence and evidence from mobile device extracts publication-title: J. Netw. Comput. Appl. – ident: 10.1016/j.jnca.2017.02.001_bib63 doi: 10.1109/BDCloud.2015.57 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib112 article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry publication-title: Future Gener. Comput. Syst. – volume: 305 start-page: 357 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib7 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.01.025 – ident: 10.1016/j.jnca.2017.02.001_bib10 doi: 10.1109/IWCMC.2013.6583636 – ident: 10.1016/j.jnca.2017.02.001_bib42 doi: 10.1109/SAI.2015.7237312 – ident: 10.1016/j.jnca.2017.02.001_bib97 – volume: 1 start-page: 172 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib139 article-title: Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds publication-title: Cloud Comput. IEEE Trans. doi: 10.1109/TCC.2013.11 – volume: 44 start-page: 27 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib141 article-title: Finding your way in the fog: towards a comprehensive definition of fog computing publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/2677046.2677052 – volume: 52 start-page: 73 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib143 article-title: Security protection between users and the mobile media cloud publication-title: Commun. Mag., IEEE doi: 10.1109/MCOM.2014.6766088 – volume: 30 start-page: 98 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib74 article-title: Privacy-preserving data utilization in hybrid clouds publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2013.06.011 – start-page: 20 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib33 article-title: Mobile cloud storage users publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2014.61 – year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib136 article-title: Dynamic-hash-table based public auditing for secure cloud storage publication-title: IEEE Trans. Serv. Comput. – ident: 10.1016/j.jnca.2017.02.001_bib90 doi: 10.1109/CCECE.2012.6334973 – volume: 29 start-page: 84 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib45 article-title: mobile cloud computing: a survey publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2012.05.023 – volume: 74 start-page: 98 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib59 article-title: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.08.016 – ident: 10.1016/j.jnca.2017.02.001_bib25 doi: 10.1145/2751496.2751501 – year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib52 article-title: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2015.2429132 – ident: 10.1016/j.jnca.2017.02.001_bib60 doi: 10.1145/2420950.2420983 – volume: 65 start-page: 99 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib65 article-title: Consolidated Identity Management System for secure mobile cloud computing publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.03.015 – volume: 2009 start-page: 83 year: 2009 ident: 10.1016/j.jnca.2017.02.001_bib50 – year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib77 article-title: Personalized search over encrypted data with efficient and secure updates in mobile clouds publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2014.2371239 – ident: 10.1016/j.jnca.2017.02.001_bib41 doi: 10.1109/MobileCloud.2015.11 – ident: 10.1016/j.jnca.2017.02.001_bib46 doi: 10.1109/DSP-SPE.2011.5739270 – ident: 10.1016/j.jnca.2017.02.001_bib53 doi: 10.1109/INFOCOM.2015.7218658 – volume: 53 start-page: 232 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib146 article-title: Millimeter-wave multimedia communications: challenges, methodology, and applications publication-title: Commun. Mag. IEEE doi: 10.1109/MCOM.2015.7010539 – ident: 10.1016/j.jnca.2017.02.001_bib37 doi: 10.1109/MSN.2015.28 – volume: 10 start-page: 557 year: 2002 ident: 10.1016/j.jnca.2017.02.001_bib131 article-title: k-anonymity: a model for protecting privacy publication-title: Int. J. Uncertain. Fuzziness Knowl.-Based Syst. doi: 10.1142/S0218488502001648 – ident: 10.1016/j.jnca.2017.02.001_bib102 doi: 10.1109/ICCCN.2013.6614169 – volume: 19 start-page: 404 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib126 article-title: Toward advanced mobile cloud computing for the Internet of Things: Current issues and future direction publication-title: Mob. Netw. Appl. doi: 10.1007/s11036-014-0509-8 – ident: 10.1016/j.jnca.2017.02.001_bib161 doi: 10.1109/ICRMS.2014.7107254 – ident: 10.1016/j.jnca.2017.02.001_bib125 doi: 10.1109/MobileCloud.2015.15 – ident: 10.1016/j.jnca.2017.02.001_bib160 doi: 10.1109/BTAS.2013.6712747 – start-page: 8 year: 2009 ident: 10.1016/j.jnca.2017.02.001_bib34 article-title: Augmented smartphone applications Through clone cloud execution publication-title: HotOS – volume: 66 start-page: 1687 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib67 article-title: Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing publication-title: J. Supercomput. doi: 10.1007/s11227-013-0967-y – ident: 10.1016/j.jnca.2017.02.001_bib142 doi: 10.1109/Trustcom.2015.482 – volume: 9 start-page: 805 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib137 article-title: A Privacy-Aware authentication scheme for Distributed mobile cloud computing services publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2014.2322973 – volume: 1 start-page: 335 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib116 article-title: Millimeter wave mobile communications for 5G cellular: it will work! publication-title: Access, IEEE doi: 10.1109/ACCESS.2013.2260813 – ident: 10.1016/j.jnca.2017.02.001_bib19 doi: 10.1109/MobileCloud.2015.40 – ident: 10.1016/j.jnca.2017.02.001_bib56 doi: 10.1145/1810931.1810937 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib23 article-title: Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study publication-title: Concurr. Comput.: Pract. Exp. – volume: 28 start-page: 122 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib149 article-title: Cloud based data sharing with fine-grained proxy re-encryption publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2015.06.017 – volume: 16 start-page: 885 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib145 article-title: Cloud mobile media: reflections and outlook publication-title: Multimed. IEEE Trans. doi: 10.1109/TMM.2014.2315596 – ident: 10.1016/j.jnca.2017.02.001_bib44 doi: 10.1109/TrustCom.2013.272 – volume: 16 start-page: 73 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib16 article-title: Android mobile VoIP apps: a survey and examination of their security and privacy publication-title: Electron. Commer. Res. doi: 10.1007/s10660-015-9208-1 – volume: 12 start-page: 67 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib75 article-title: Intercrossed access controls for secure financial services on multimedia big data in cloud systems publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) – ident: 10.1016/j.jnca.2017.02.001_bib94 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib103 article-title: Providing user security guarantees in public infrastructure clouds publication-title: IEEE Trans. Cloud Comput. – ident: 10.1016/j.jnca.2017.02.001_bib159 doi: 10.1145/1655008.1655026 – volume: 99 start-page: 1 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib8 article-title: SeDaSC: Secure data sharing in clouds publication-title: IEEE Syst. J. – volume: 17 start-page: 1471 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib27 article-title: Cloud-assisted live streaming for crowdsourced multimedia content publication-title: Multimed. IEEE Trans. doi: 10.1109/TMM.2015.2460193 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib3 article-title: Cloud incident handling and forensic‐by‐design: cloud storage as a case study publication-title: Concurr. Comput.: Pract. Exp. – ident: 10.1016/j.jnca.2017.02.001_bib124 doi: 10.1109/CICN.2013.120 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib133 article-title: Forensic investigation of cooperative storage cloud service: symform as a case study publication-title: J. Forensic Sci. – volume: 67 start-page: 147 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib101 article-title: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.01.001 – volume: 48 start-page: 46 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib122 article-title: Evolution of attacks, threat models, and solutions for virtualized systems publication-title: ACM Comput. Surv. (CSUR) doi: 10.1145/2856126 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib93 article-title: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment publication-title: Comput. Stand. Interfaces – volume: 8 start-page: 14 year: 2009 ident: 10.1016/j.jnca.2017.02.001_bib121 article-title: The case for vm-based cloudlets in mobile computing publication-title: Pervasive Comput. IEEE doi: 10.1109/MPRV.2009.82 – ident: 10.1016/j.jnca.2017.02.001_bib39 doi: 10.1109/ICCCI.2015.7218101 – volume: 40 start-page: 235 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib51 article-title: Fine-grained database field search using attribute-based encryption for e-healthcare clouds publication-title: J. Med. Syst. doi: 10.1007/s10916-016-0588-0 – volume: 2 start-page: 476 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib111 article-title: Convergence of Internet of things and mobile cloud computing publication-title: Syst. Sci. Control Eng.: Open Access J. doi: 10.1080/21642583.2014.913213 – volume: 28 start-page: 135 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib158 article-title: Efficient attribute-based data sharing in mobile clouds publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2015.06.009 – ident: 10.1016/j.jnca.2017.02.001_bib26 doi: 10.1109/CLOUD.2010.28 – volume: 380 start-page: 101 year: 2017 ident: 10.1016/j.jnca.2017.02.001_bib128 article-title: Dynamic remote data auditing for securing big data storage in cloud computing publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.09.004 – volume: 11 start-page: 877 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib127 article-title: HMOG: New behavioral biometric features for continuous authentication of smartphone users publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2506542 – volume: 18 start-page: 11 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib55 article-title: 5G cellular: key enabling technologies and research challenges publication-title: Instrum. Meas. Mag. IEEE doi: 10.1109/MIM.2015.7108393 – volume: 37 start-page: 215 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib164 article-title: Secloud: a cloud-based comprehensive and lightweight security solution for smartphones publication-title: Comput. Secur. doi: 10.1016/j.cose.2013.02.002 – year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib61 article-title: An efficient authentication system of smart device using multi factors in mobile cloud service architecture publication-title: Int. J. Commun. Syst. – volume: 29 start-page: 46 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib79 article-title: Secure sharing and searching for real-time video data in mobile cloud publication-title: Netw. IEEE – ident: 10.1016/j.jnca.2017.02.001_bib99 – volume: 24 start-page: 2795 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib31 article-title: Efficient multi-user computation offloading for mobile-edge cloud computing publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/TNET.2015.2487344 – volume: 17 start-page: 1286 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib49 article-title: Towards cost-efficient video transcoding in media cloud: insights learned from user viewing patterns publication-title: Multimed. IEEE Trans. doi: 10.1109/TMM.2015.2438713 – ident: 10.1016/j.jnca.2017.02.001_bib92 doi: 10.1109/INFOCOM.2015.7218474 – volume: 14 start-page: 4020 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib152 article-title: Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud publication-title: Wirel. Commun. IEEE Trans. doi: 10.1109/TWC.2015.2416177 – ident: 10.1016/j.jnca.2017.02.001_bib114 doi: 10.1109/SECCOMW.2006.359550 – ident: 10.1016/j.jnca.2017.02.001_bib6 doi: 10.1145/2659651.2659730 – volume: 3 start-page: 127 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib73 article-title: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage publication-title: Emerg. Top. Comput. IEEE Trans. doi: 10.1109/TETC.2014.2371239 – ident: 10.1016/j.jnca.2017.02.001_bib85 doi: 10.1109/MobileCloud.2014.19 – ident: 10.1016/j.jnca.2017.02.001_bib148 doi: 10.1109/AIMSEC.2011.6010435 – year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib140 article-title: A new approach to mitigating security risks of phone clone Co-location Over mobile clouds publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.01.005 – volume: 64 start-page: 12 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib105 article-title: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.11.023 – start-page: 45 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib38 – ident: 10.1016/j.jnca.2017.02.001_bib135 doi: 10.1109/FSKD.2015.7382287 – ident: 10.1016/j.jnca.2017.02.001_bib109 doi: 10.1109/RoEduNet.2013.6511724 – ident: 10.1016/j.jnca.2017.02.001_bib15 doi: 10.1109/CSCS.2013.27 – volume: 20 start-page: 14 year: 2013 ident: 10.1016/j.jnca.2017.02.001_bib78 article-title: Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications publication-title: Wirel. Commun. IEEE doi: 10.1109/MWC.2013.6549279 – ident: 10.1016/j.jnca.2017.02.001_bib100 – ident: 10.1016/j.jnca.2017.02.001_bib40 – volume: 56 start-page: 580 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib88 article-title: AMCC: Ad-hoc based mobile cloud computing modeling publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2015.07.257 – ident: 10.1016/j.jnca.2017.02.001_bib151 doi: 10.1007/978-3-319-24177-7_8 – volume: 49 start-page: 71 year: 2017 ident: 10.1016/j.jnca.2017.02.001_bib108 article-title: Mobile cloud security: an adversary model for lightweight browser security publication-title: Comput. Stand. Interfaces doi: 10.1016/j.csi.2016.09.002 – volume: 28 start-page: 74 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib91 article-title: Distributed resource allocation in cloud-based wireless multimedia social networks publication-title: Netw., IEEE doi: 10.1109/MNET.2014.6863135 – ident: 10.1016/j.jnca.2017.02.001_bib96 – ident: 10.1016/j.jnca.2017.02.001_bib84 doi: 10.1109/INFCOMW.2014.6849255 – volume: 25 start-page: 599 year: 2009 ident: 10.1016/j.jnca.2017.02.001_bib22 article-title: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2008.12.001 – ident: 10.1016/j.jnca.2017.02.001_bib54 doi: 10.1109/SERVICES.2012.25 – ident: 10.1016/j.jnca.2017.02.001_bib82 – volume: 7 start-page: 1933 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib157 article-title: Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud publication-title: Secur. Commun. Netw. doi: 10.1002/sec.907 – ident: 10.1016/j.jnca.2017.02.001_bib20 doi: 10.1109/MobileCloud.2015.36 – volume: 53 start-page: 18 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib30 article-title: On the computation offloading at ad hoc cloudlet: architecture and service modes publication-title: Commun. Mag., IEEE doi: 10.1109/MCOM.2015.7120041 – ident: 10.1016/j.jnca.2017.02.001_bib117 doi: 10.1109/CSCI.2014.33 – volume: 16 start-page: 961 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib129 article-title: Evolution, detection and analysis of malware for smart devices publication-title: Commun. Surv. Tutor. IEEE doi: 10.1109/SURV.2013.101613.00077 – volume: 22 start-page: 20 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib29 article-title: AIWAC: affective interaction through wearable computing and cloud technology publication-title: Wirel. Commun. IEEE doi: 10.1109/MWC.2015.7054715 – volume: 18 start-page: 489 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib35 article-title: Recent trends on mobile computing and future networks publication-title: Pers. Ubiquitous Comput. doi: 10.1007/s00779-013-0682-y – ident: 10.1016/j.jnca.2017.02.001_bib154 doi: 10.1007/978-3-319-40253-6_24 – volume: 68 start-page: 320 year: 2017 ident: 10.1016/j.jnca.2017.02.001_bib71 article-title: Design of a provably secure biometrics-based multi-cloud-server authentication scheme publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.10.004 – volume: 60 start-page: 95 year: 2016 ident: 10.1016/j.jnca.2017.02.001_bib110 article-title: Web application protection techniques: a taxonomy publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.11.017 – ident: 10.1016/j.jnca.2017.02.001_bib106 doi: 10.1109/CSNT.2015.288 – volume: 53 start-page: 80 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib47 article-title: Mobile code offloading: from concept to practice and beyond publication-title: Commun. Mag. IEEE doi: 10.1109/MCOM.2015.7060486 – ident: 10.1016/j.jnca.2017.02.001_bib72 doi: 10.1109/MobileCloud.2015.30 – start-page: 411 year: 2012 ident: 10.1016/j.jnca.2017.02.001_bib115 article-title: secure mobile cloud computing publication-title: Handb. Secur. Cyber-Phys. Crit. Infrastruct. doi: 10.1016/B978-0-12-415815-3.00016-9 – volume: 31 start-page: 82 year: 2014 ident: 10.1016/j.jnca.2017.02.001_bib4 article-title: On protecting data storage in mobile cloud computing paradigm publication-title: IETE Tech. Rev. doi: 10.1080/02564602.2014.891382 – ident: 10.1016/j.jnca.2017.02.001_bib118 doi: 10.1109/PCCC.2014.7017041 – ident: 10.1016/j.jnca.2017.02.001_bib36 doi: 10.1145/2470654.2481330 – ident: 10.1016/j.jnca.2017.02.001_bib57 doi: 10.1109/INM.2015.7140340 – ident: 10.1016/j.jnca.2017.02.001_bib80 doi: 10.1145/1882486.1882493 – start-page: 143 year: 2015 ident: 10.1016/j.jnca.2017.02.001_bib86 |
| SSID | ssj0006493 |
| Score | 2.5701551 |
| SecondaryResourceType | review_article |
| Snippet | The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be... |
| SourceID | swepub crossref elsevier |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 38 |
| SubjectTerms | Cloud computing Computational offloading Distribuerade datorsystem Mobile computing Pervasive Mobile Computing Security and privacy Virtualization |
| Title | Security and privacy challenges in mobile cloud computing: Survey and way ahead |
| URI | https://dx.doi.org/10.1016/j.jnca.2017.02.001 https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62082 |
| Volume | 84 |
| WOSCitedRecordID | wos000398007200004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1095-8592 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0006493 issn: 1095-8592 databaseCode: AIEXJ dateStart: 19960101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lc9MwENaElgMcChQ6tDxGBzh53Ilfss3NQBleLcy0ZHLTSLICDo4d0jh0-An8alaW5Lhl2qEHLk7GiWQ735fdtbz7LULPhEiDSR5LuE1NhRuCg3K54KkbBOAOA58lUZtEM_oYHx0l43H6eTD4bWthVmVcVcnZWTr_r1DDPgBblc5eA-5uUtgB7wF02ALssP0n4I9NRzojAVCsVEN3YXumtOmvs5qDMXBEWTdtUdu8sXXPx81iJfXQnwxewVSf6-TZi18rnUBuC-Pa3hBO_3l4h6WiWrt6c9h8Y7MZy52X7Mc6Kzj7pWl2mO87GW9K5wMr2cx-OmKnRcm-62zATC30w4763GoFeEAlixj1DOwwCcEraglJa4GTsGdCtdiLccZaYPovM69XHKb7U7Xsow6jdVe9tVOzD_Iv-LouA9Emt02pmoOqOejQVxl-N9CmH0cpWMjN7N3B-H3n10mYmnINfQWmBEtnC148k0vDnL4ebRvDnNxFWwY8nGnS3EMDWW2jO7axBzZ2fhvd7qlU3kefLKMwQI0No_CaUbiosGYUbhmFO0a9wJpP7UDgE2759AB9eXNw8uqta_pwuCII4qXLEyIYE4IIjw8Jg6DWl3CpEQTnMg-iPPAnuRS5DCMvz4eE-ylPJNzIE49A8MOHwQ7aqOpKPkRYKWklhHlCJS_Hk4DzUIS5kNwXIfG8eBd59mejwojUq14pJb0csF3kdGPmWqLlym9HFg1qgkwdPFIg15XjnmvoumMoYfbXxSij9eIrLZcNJT7E03vXOptH6Nb6X_IYbSwXjXyCborVsjhdPDUM_ANfCKz4 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+privacy+challenges+in+mobile+cloud+computing%3A+Survey+and+way+ahead&rft.jtitle=Journal+of+network+and+computer+applications&rft.au=Mollah%2C+Muhammad+Baqer&rft.au=Azad%2C+Md.+Abul+Kalam&rft.au=Vasilakos%2C+Athanasios&rft.date=2017-04-15&rft.issn=1084-8045&rft.volume=84&rft.spage=38&rft.epage=54&rft_id=info:doi/10.1016%2Fj.jnca.2017.02.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jnca_2017_02_001 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1084-8045&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1084-8045&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1084-8045&client=summon |