Security and privacy challenges in mobile cloud computing: Survey and way ahead

The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here,...

Full description

Saved in:
Bibliographic Details
Published in:Journal of network and computer applications Vol. 84; pp. 38 - 54
Main Authors: Mollah, Muhammad Baqer, Azad, Md. Abul Kalam, Vasilakos, Athanasios
Format: Journal Article
Language:English
Published: Elsevier Ltd 15.04.2017
Subjects:
ISSN:1084-8045, 1095-8592, 1095-8592
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.
AbstractList The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.
Author Vasilakos, Athanasios
Mollah, Muhammad Baqer
Azad, Md. Abul Kalam
Author_xml – sequence: 1
  givenname: Muhammad Baqer
  surname: Mollah
  fullname: Mollah, Muhammad Baqer
  email: m.m.baqer@ieee.org
  organization: Department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh
– sequence: 2
  givenname: Md. Abul Kalam
  surname: Azad
  fullname: Azad, Md. Abul Kalam
  email: makazad@juniv.edu
  organization: Department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh
– sequence: 3
  givenname: Athanasios
  surname: Vasilakos
  fullname: Vasilakos, Athanasios
  email: athanasios.vasilakos@ltu.se
  organization: Department of Computer Science, Electrical and Space Engineering at the Luleå University of Technology, Sweden
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62082$$DView record from Swedish Publication Index
BookMark eNp9kMtOwzAQRS0EElD4AVb5ABLGTuI6iE3FW0LqosDWcsbT4iq1Kycp6t-TqogFi67uLO4ZXZ1zduyDJ8auOGQcuLxZZkuPJhPAxxmIDIAfsTMOVZmqshLHu1sVqYKiPGXnbbsEAFlU-Rmbzgj76LptYrxN1tFtDG4T_DJNQ35BbeJ8sgq1ayjBJvQ2wbBa953zi9tk1scN7cFvM-QXGXvBTuamaenyN0fs4-nx_f4lfZs-v95P3lLM83GX1kqiMYgSeQ3SgMwFDePLquRk89LmYm4JLRUltxZkLapakVCV5FKoooZ8xK73f9tvWve1HpavTNzqYJx-cJ8THeJCN12vpQAlhrrY1zGGto00_wM46J1BvdQ7g3pnUIPQg8EBUv8gdJ3pXPBdNK45jN7tURocbBxF3aIjj2RdJOy0De4Q_gPsTo9P
CitedBy_id crossref_primary_10_1155_2021_8848032
crossref_primary_10_1007_s11042_020_10117_y
crossref_primary_10_1016_j_jnca_2020_102710
crossref_primary_10_1109_TETC_2018_2791459
crossref_primary_10_1145_3427376
crossref_primary_10_1016_j_iot_2018_11_003
crossref_primary_10_1016_j_compeleceng_2019_106504
crossref_primary_10_1016_j_compeleceng_2022_107692
crossref_primary_10_1007_s11831_021_09573_y
crossref_primary_10_1108_ICS_11_2021_0182
crossref_primary_10_3390_su15097569
crossref_primary_10_1002_spe_2851
crossref_primary_10_1109_COMST_2023_3239579
crossref_primary_10_1016_j_csi_2021_103538
crossref_primary_10_1109_ACCESS_2018_2820162
crossref_primary_10_1007_s40747_021_00399_6
crossref_primary_10_4102_sajim_v24i1_1426
crossref_primary_10_1002_spe_2850
crossref_primary_10_1109_TSC_2022_3155447
crossref_primary_10_1109_ACCESS_2024_3438618
crossref_primary_10_3390_s19224905
crossref_primary_10_1007_s10586_022_03585_4
crossref_primary_10_4018_JOEUC_20211101_oa11
crossref_primary_10_1016_j_jnca_2018_06_003
crossref_primary_10_1109_ACCESS_2022_3174554
crossref_primary_10_1371_journal_pone_0252244
crossref_primary_10_3390_s18061676
crossref_primary_10_1109_JSYST_2019_2896064
crossref_primary_10_1002_ett_4108
crossref_primary_10_1016_j_jksuci_2019_05_007
crossref_primary_10_1109_MCC_2018_011791715
crossref_primary_10_1002_ett_3773
crossref_primary_10_1002_ett_4587
crossref_primary_10_1016_j_future_2018_04_023
crossref_primary_10_1007_s43762_022_00051_0
crossref_primary_10_1002_dac_5237
crossref_primary_10_1109_JIOT_2021_3119517
crossref_primary_10_1088_1742_6596_1018_1_012006
crossref_primary_10_3390_electronics10151811
crossref_primary_10_1007_s13204_021_02070_5
crossref_primary_10_1109_COMST_2019_2916180
crossref_primary_10_1109_JIOT_2024_3385095
crossref_primary_10_3390_en13164117
crossref_primary_10_1016_j_jnca_2021_103152
crossref_primary_10_1007_s11235_019_00575_7
crossref_primary_10_1016_j_comcom_2022_01_005
crossref_primary_10_1109_ACCESS_2020_3037108
crossref_primary_10_1016_j_sysarc_2018_05_007
crossref_primary_10_1109_TETC_2018_2865345
crossref_primary_10_1007_s12652_020_02842_x
crossref_primary_10_1109_TII_2020_3031440
crossref_primary_10_26634_jcc_5_1_15448
crossref_primary_10_1111_exsy_12753
crossref_primary_10_1515_auto_2022_0023
crossref_primary_10_3390_s25030670
crossref_primary_10_1007_s11036_022_01933_7
crossref_primary_10_1109_TEM_2021_3116204
crossref_primary_10_4018_JOEUC_20211101_oa1
crossref_primary_10_1109_TITS_2023_3295818
crossref_primary_10_1007_s11042_020_09516_y
crossref_primary_10_1016_j_aej_2024_10_116
crossref_primary_10_1007_s00500_019_03787_w
crossref_primary_10_1016_j_simpat_2022_102491
crossref_primary_10_1109_ACCESS_2021_3138219
crossref_primary_10_1093_comjnl_bxz165
crossref_primary_10_1016_j_future_2018_08_029
crossref_primary_10_4018_IJISP_2022010116
crossref_primary_10_1016_j_future_2018_01_026
crossref_primary_10_26634_jcc_10_2_20419
crossref_primary_10_3233_JIFS_219424
crossref_primary_10_1016_j_jnca_2019_102469
crossref_primary_10_26634_jes_11_1_19136
crossref_primary_10_1007_s12083_018_0705_6
crossref_primary_10_2196_16399
crossref_primary_10_1016_j_future_2017_11_024
crossref_primary_10_3390_fi12090157
crossref_primary_10_1109_ACCESS_2020_3022661
crossref_primary_10_1109_JSYST_2021_3072793
crossref_primary_10_1007_s11036_019_01263_1
crossref_primary_10_1016_j_jisa_2020_102582
crossref_primary_10_1109_ACCESS_2021_3053233
crossref_primary_10_1016_j_vehcom_2022_100529
crossref_primary_10_1109_TC_2025_3543682
crossref_primary_10_3390_s23063254
crossref_primary_10_1108_ICS_02_2023_0015
crossref_primary_10_26599_TST_2023_9010080
crossref_primary_10_1016_j_jnca_2019_02_003
crossref_primary_10_3390_info16050394
crossref_primary_10_1007_s11227_022_04411_9
crossref_primary_10_1016_j_jnca_2020_102642
crossref_primary_10_1109_ACCESS_2020_3022957
crossref_primary_10_3390_s23218720
crossref_primary_10_1109_COMST_2020_3012961
crossref_primary_10_3390_s22010108
crossref_primary_10_1108_ITP_12_2019_0630
crossref_primary_10_1016_j_jisa_2020_102590
crossref_primary_10_1145_3555802
crossref_primary_10_1109_TNSE_2020_2976697
crossref_primary_10_3390_info10080259
crossref_primary_10_1155_2021_5542852
crossref_primary_10_1016_j_cose_2025_104339
crossref_primary_10_1007_s11276_018_1704_5
crossref_primary_10_1109_ACCESS_2024_3371488
crossref_primary_10_1109_ACCESS_2018_2865539
crossref_primary_10_1109_ACCESS_2020_3009876
crossref_primary_10_1109_TCC_2020_2968320
crossref_primary_10_1002_cpe_6070
crossref_primary_10_1631_FITEE_1800343
crossref_primary_10_1007_s11277_019_06872_3
crossref_primary_10_1016_j_rineng_2025_103934
crossref_primary_10_1155_2019_4520685
crossref_primary_10_1109_TCE_2019_2902412
crossref_primary_10_1109_JSYST_2020_2979006
crossref_primary_10_1080_15623599_2025_2533392
crossref_primary_10_3390_fi14010011
crossref_primary_10_3390_s20102798
crossref_primary_10_1109_JIOT_2022_3161950
crossref_primary_10_1049_cmu2_12327
crossref_primary_10_1109_JSYST_2020_2998721
crossref_primary_10_1109_ACCESS_2020_2971024
crossref_primary_10_1007_s10796_025_10579_1
crossref_primary_10_1016_j_csi_2021_103518
crossref_primary_10_1109_ACCESS_2024_3381616
crossref_primary_10_1145_3529753
crossref_primary_10_4018_IJSESD_292078
crossref_primary_10_3390_smartcities5030043
crossref_primary_10_1109_JIOT_2021_3057653
crossref_primary_10_1145_3442181
crossref_primary_10_1155_2018_1827074
crossref_primary_10_1007_s10660_022_09615_y
crossref_primary_10_1186_s13677_022_00339_w
crossref_primary_10_1002_spy2_70001
crossref_primary_10_1108_JHTT_07_2018_0049
crossref_primary_10_1049_iet_sen_2018_5294
crossref_primary_10_1145_3243929
Cites_doi 10.1016/j.jnca.2015.03.001
10.1109/UMEDIA.2010.5544470
10.1109/UCC.2014.68
10.1016/j.future.2012.08.003
10.1109/MSP.2011.940269
10.1007/s10723-015-9352-9
10.1109/CloudCom.2014.116
10.1109/Trustcom.2015.485
10.1109/ICOIN.2015.7057954
10.1016/j.jnca.2016.06.012
10.1002/sec.1055
10.1007/978-3-319-16745-9_28
10.1109/MCC.2017.9
10.1109/MDM.2010.78
10.1109/IEEEGCC.2013.6705783
10.1145/2642687.2642696
10.1109/ICCCW.2012.6316466
10.1109/ICCSE.2012.6295061
10.1109/IWCMC.2013.6583635
10.1109/TC.2015.2389792
10.1109/MCC.2015.2
10.1016/j.jnca.2015.10.005
10.1109/WCNC.2013.6555295
10.1109/CICN.2013.116
10.1109/CIT/IUCC/DASC/PICOM.2015.88
10.1109/MobileCloud.2014.46
10.1109/WCNC.2014.6953141
10.1109/HICSS.2013.262
10.1080/0144929X.2014.934286
10.1109/MNET.2015.7064900
10.1109/MNET.2014.6963805
10.1109/CSCloud.2016.52
10.1007/s11227-014-1269-8
10.1109/BDCloud.2015.57
10.1016/j.ins.2015.01.025
10.1109/IWCMC.2013.6583636
10.1109/SAI.2015.7237312
10.1109/TCC.2013.11
10.1145/2677046.2677052
10.1109/MCOM.2014.6766088
10.1016/j.future.2013.06.011
10.1109/MCC.2014.61
10.1109/CCECE.2012.6334973
10.1016/j.future.2012.05.023
10.1016/j.jnca.2016.08.016
10.1145/2751496.2751501
10.1109/TDSC.2015.2429132
10.1145/2420950.2420983
10.1016/j.comnet.2014.03.015
10.1109/TETC.2014.2371239
10.1109/MobileCloud.2015.11
10.1109/DSP-SPE.2011.5739270
10.1109/INFOCOM.2015.7218658
10.1109/MCOM.2015.7010539
10.1109/MSN.2015.28
10.1142/S0218488502001648
10.1109/ICCCN.2013.6614169
10.1007/s11036-014-0509-8
10.1109/ICRMS.2014.7107254
10.1109/MobileCloud.2015.15
10.1109/BTAS.2013.6712747
10.1007/s11227-013-0967-y
10.1109/Trustcom.2015.482
10.1109/JSYST.2014.2322973
10.1109/ACCESS.2013.2260813
10.1109/MobileCloud.2015.40
10.1145/1810931.1810937
10.1016/j.pmcj.2015.06.017
10.1109/TMM.2014.2315596
10.1109/TrustCom.2013.272
10.1007/s10660-015-9208-1
10.1145/1655008.1655026
10.1109/TMM.2015.2460193
10.1109/CICN.2013.120
10.1016/j.jnca.2016.01.001
10.1145/2856126
10.1109/MPRV.2009.82
10.1109/ICCCI.2015.7218101
10.1007/s10916-016-0588-0
10.1080/21642583.2014.913213
10.1016/j.pmcj.2015.06.009
10.1109/CLOUD.2010.28
10.1016/j.ins.2015.09.004
10.1109/TIFS.2015.2506542
10.1109/MIM.2015.7108393
10.1016/j.cose.2013.02.002
10.1109/TNET.2015.2487344
10.1109/TMM.2015.2438713
10.1109/INFOCOM.2015.7218474
10.1109/TWC.2015.2416177
10.1109/SECCOMW.2006.359550
10.1145/2659651.2659730
10.1109/MobileCloud.2014.19
10.1109/AIMSEC.2011.6010435
10.1016/j.jnca.2016.01.005
10.1016/j.jnca.2015.11.023
10.1109/FSKD.2015.7382287
10.1109/RoEduNet.2013.6511724
10.1109/CSCS.2013.27
10.1109/MWC.2013.6549279
10.1016/j.procs.2015.07.257
10.1007/978-3-319-24177-7_8
10.1016/j.csi.2016.09.002
10.1109/MNET.2014.6863135
10.1109/INFCOMW.2014.6849255
10.1016/j.future.2008.12.001
10.1109/SERVICES.2012.25
10.1002/sec.907
10.1109/MobileCloud.2015.36
10.1109/MCOM.2015.7120041
10.1109/CSCI.2014.33
10.1109/SURV.2013.101613.00077
10.1109/MWC.2015.7054715
10.1007/s00779-013-0682-y
10.1007/978-3-319-40253-6_24
10.1016/j.future.2016.10.004
10.1016/j.jnca.2015.11.017
10.1109/CSNT.2015.288
10.1109/MCOM.2015.7060486
10.1109/MobileCloud.2015.30
10.1016/B978-0-12-415815-3.00016-9
10.1080/02564602.2014.891382
10.1109/PCCC.2014.7017041
10.1145/2470654.2481330
10.1109/INM.2015.7140340
10.1145/1882486.1882493
ContentType Journal Article
Copyright 2017 Elsevier Ltd
Copyright_xml – notice: 2017 Elsevier Ltd
DBID AAYXX
CITATION
ADTPV
AOWAS
DOI 10.1016/j.jnca.2017.02.001
DatabaseName CrossRef
SwePub
SwePub Articles
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1095-8592
EndPage 54
ExternalDocumentID oai_DiVA_org_ltu_62082
10_1016_j_jnca_2017_02_001
S1084804517300632
GroupedDBID --K
--M
-~X
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABJNI
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DM4
DU5
EBS
EFBJH
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
ZU3
~G-
29L
9DU
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADFGL
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CAG
CITATION
COF
EFKBS
FGOYB
HZ~
R2-
SEW
UHS
XPP
ZMT
~HD
ADTPV
AOWAS
ID FETCH-LOGICAL-c337t-b86caacc6c1b06a0632e2015951ed35d32fdecde451dd06b29b8e289616284b03
ISICitedReferencesCount 165
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000398007200004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1084-8045
1095-8592
IngestDate Sat Oct 25 07:01:59 EDT 2025
Tue Nov 18 22:30:51 EST 2025
Sat Nov 29 07:09:15 EST 2025
Fri Feb 23 02:12:48 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cloud computing
Security and privacy
Computational offloading
Virtualization
Mobile computing
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c337t-b86caacc6c1b06a0632e2015951ed35d32fdecde451dd06b29b8e289616284b03
PageCount 17
ParticipantIDs swepub_primary_oai_DiVA_org_ltu_62082
crossref_primary_10_1016_j_jnca_2017_02_001
crossref_citationtrail_10_1016_j_jnca_2017_02_001
elsevier_sciencedirect_doi_10_1016_j_jnca_2017_02_001
PublicationCentury 2000
PublicationDate 2017-04-15
PublicationDateYYYYMMDD 2017-04-15
PublicationDate_xml – month: 04
  year: 2017
  text: 2017-04-15
  day: 15
PublicationDecade 2010
PublicationTitle Journal of network and computer applications
PublicationYear 2017
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Khan, Kiah, Ali, Shamshirband (bib69) 2015; 13
Rassan, I.A., AlShaher, H., 2014. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA), In: 2014 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 157–161.
Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile Cloud Computing: Bridging the Gap between Cloud and Mobile Devices," in Computational Intelligence and Communication Networks (CICN), 2013 In: Proceedings of the 5th International Conference on, pp. 553–555.
Abdalla, Pathan (bib4) 2014; 31
Online: 2016] US National Security Agency: Information Assurance
Arabo A., Pranggono, B., 2013. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions, in Control Systems and Computer Science (CSCS), 2013. In: Proceedings of the 19th International Conference on, pp. 526–531.
Ellouze, A., Gagnaire, M., Haddad, A., 2015. A mobile application offloading algorithm for mobile cloud computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 34–40.
Dey, S., Sampalli, S., Ye, Q., 2015. A Context-Adaptive Security Framework for Mobile Cloud Computing, in 2015. In: Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 89–95.
Jin, Ahn, Seol, Cha, Huh, Maeng (bib62) 2015; 64
Fernando, Loke, Rahayu (bib45) 2013; 29
Horrow, S., Gupta, S., Sardana, A., Abraham, A., 2012. Secure private cloud architecture for mobile infrastructure as a service. In: Services (SERVICES), 2012 IEEE Eighth World Congress on, pp. 149–154.
Li, Liu, Dai, Luan, Shen (bib73) 2015; 3
Liu, Dai, Luan, Yu (bib77) 2015
Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S., 2009. Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127–134.
Ali, Dhamotharan, Khan, Khan, Vasilakos, Li (bib8) 2015; 99
Dhanya, Kousalya (bib38) 2015
Cai, Yu, Bu (bib24) 2014; 28
Peng, Choo, Ashman (bib107) 2016; 72
Satyanarayanan, Bahl, Caceres, Davies (bib121) 2009; 8
AlShahwan, Faisal, Ansa (bib13) 2015
Shon, Cho, Han, Choi (bib126) 2014; 19
Zhang, Su, Wang, Chen, Yang (bib157) 2014; 7
Chen, M., Li, W., Li, Z., Lu, S., Chen, D., 2014. Preserving location privacy based on distributed cache pushing, in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, pp. 3456–3461.
Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: Securecomm and Workshops, pp. 1–10.
Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2015. Fog Computing: Focusing on Mobile Users at the Edge, arXiv preprint
Ahmed, Gani, Khan, Buyya, Khan (bib5) 2015; 52
Ali, Khan, Vasilakos (bib7) 2015; 305
Mollah, M.B., Islam, K.R., Islam, S.S., 2012. Next generation of computing through cloud computing technology, in Electrical & Computer Engineering (CCECE), 2012 In: Proceedings of the 25th IEEE Canadian Conference on, pp. 1–6.
Suarez-Tangil, Tapiador, Peris-Lopez, Ribagorda (bib129) 2014; 16
Online: 2016] ABI Research Report on Mobile Cloud Computing
Tysowski, Hasan (bib138) 2011; 33
.
Amin, M.A., Bib Abu Bakar, K., Al-Hashimi, H., 2013. A review of mobile cloud computing architecture and challenges to enterprise users, in GCC Conference and Exhibition (GCC), 2013. 7th IEEE, pp. 240–244.
Chun, Maniatis (bib34) 2009
Jeong, Park, Park (bib61) 2013
Zonouz, Houmansadr, Berthier, Borisov, Sanders (bib164) 2013; 37
Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp. 14–19.
[Online: 2016] Locations of Google’s Data Centers
Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management, in Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1073–1080.
Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., Li, Q., 2015. SMOC: A secure mobile cloud computing platform. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2668–2676.
Sweeney (bib131) 2002; 10
Alizadeh, Abolfazli, Zamani, Baharun, Sakurai (bib9) 2016; 61
S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, 2014, pp. 1–2.
Iqbal, Kiah, Dhaghighi, Hussain, Khan, Khan (bib59) 2016; 74
Gao, Zhang, Wen, Wang, Zhu (bib49) 2015; 17
Donald, A.C., Arockiam, L., 2015. A secure authentication scheme for MobiCloud, In: Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1–6.
Baharon, M.R., Shi, Q., Llewellyn-Jones, D., 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing, in Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, pp. 618–625.
Tysowski, Hasan (bib139) 2013; 1
Liu, Au, Susilo, Liang, Lu, Srinivasan (bib79) 2015; 29
Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., et al., 2015. TinMan: eliminating confidential mobile data exposure with security oriented offloading. In: Proceedings of the Tenth European Conference on Computer Systems, p. 27.
Zhang, Zhao (bib156) 2015
Osanaiye, Choo, Dlodlo (bib101) 2016; 67
Wang, Wu, Chen, Wang (bib143) 2014; 52
Liu, Shu, Jin, Ding, Yu, Niu (bib78) 2013; 20
Quick, Choo (bib113) 2016
Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile cloud computing: A needed shift from cloud to mobile cloud, in Computational Intelligence and Communication Networks (CICN), 2013. In: Proceedings of the 5th International Conference on, pp. 536–539.
Mohammad, Elham, Jararweh (bib88) 2015; 56
Imgraben, Engelbrecht, Choo (bib58) 2014; 33
Pasupuleti, Ramalingam, Buyya (bib105) 2016; 64
Popa, D., Cremene, M., Borda, M., Boudaoud, K., 2013. A security framework for mobile cloud applications. In: Roedunet International Conference (RoEduNet), 2013 11th, pp. 1–4.
Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards Cloud-Based Compositions of Security Functions For Mobile Devices. In: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), p. 6.
Choo (bib33) 2014
Zhong, L., Wang, B., Wei, H., 2012. Cloud computing applied in the mobile internet, in Computer Science & Education (ICCSE), 2012. In: Proceedings of the 7th International Conference on, pp. 218–221.
Tan, J., Gandhi, R., Narasimhan, P., 2014. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE. In: Proceedings of the 6th International Conference on, pp. 644–649.
Xiu-feng, Q., Jian-Wei, L., Peng-Chuan, Z., 2011. Secure cloud computing architecture on mobile internet, in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011. In: Proceedings of the 2nd International Conference on, pp. 619–622.
Li, Li, Chen, Liu, Jia (bib74) 2014; 30
Olafare, O., Parhizkar, H., Vem, S., 2015. A New Secure Mobile Cloud Architecture," arXiv preprint
Jin, Y., Tian, C., He, H., Wang, F., 2015. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing, in Big Data and Cloud Computing (BDCloud), 2015 IEEE. In: Proceedings of the Fifth International Conference on, pp. 172–179.
Sookhak, Gani, Khan, Buyya (bib128) 2017; 380
Huerta-Canepa, G., Lee, D., 2010. A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6.
Wang, S., Tu, G.-H., Ganti, R., He, T., Leung, K., Tripp, H., et al., 2013. Mobile micro-cloud: Application classification, mapping, and deployment. In: Proceedings Annual Fall Meeting of ITA (AMITA).
Shi, Y., Abhilash, S., Hwang, K., 2015. Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 109–118.
Al-Mutawa, M., Mishra, S., 2014. Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 51–60.
Pokharel, Choo, Liu (bib108) 2017; 49
Liu, L., Zhang, X., Yan, G., Chen, S., 2009. Exploitation and threat analysis of open mobile devices, In: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 20–29.
Azfar, Choo, Liu (bib16) 2016; 16
ElMenshawy, D., 2015. Touchscreen patterns based authentication approach for smart phones. In: Science and Information Conference (SAI), pp. 1311–1315.
Juliadotter, Choo (bib64) 2015; 2
Buyya, Yeo, Venugopal, Broberg, Brandic (bib22) 2009; 25
Online: 2016] A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011
Online: 2016] Mobile Cloud Computing Forum
Bouzefrane, S., Mostefa, B., Amira, F., Houacine., Cagon, H., 2014. Cloudlets Authentication in NFC-Based Mobile Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, 2014, pp. 267–272.
Prokhorenko, Choo, Ashman (bib110) 2016; 60
Tang, L., Ouyang, L., Tsai, W.-T., 2015. Multi-factor web API security for securing Mobile Cloud. In: Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pp. 2163-2168.
Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278.
Walls, J., Cho
Li (10.1016/j.jnca.2017.02.001_bib75) 2016; 12
10.1016/j.jnca.2017.02.001_bib43
10.1016/j.jnca.2017.02.001_bib44
10.1016/j.jnca.2017.02.001_bib41
10.1016/j.jnca.2017.02.001_bib42
10.1016/j.jnca.2017.02.001_bib40
10.1016/j.jnca.2017.02.001_bib151
10.1016/j.jnca.2017.02.001_bib150
10.1016/j.jnca.2017.02.001_bib154
10.1016/j.jnca.2017.02.001_bib39
10.1016/j.jnca.2017.02.001_bib36
10.1016/j.jnca.2017.02.001_bib37
10.1016/j.jnca.2017.02.001_bib159
Chen (10.1016/j.jnca.2017.02.001_bib29) 2015; 22
Odelu (10.1016/j.jnca.2017.02.001_bib93) 2016
Yu (10.1016/j.jnca.2017.02.001_bib153) 2014
Ahmed (10.1016/j.jnca.2017.02.001_bib5) 2015; 52
Zonouz (10.1016/j.jnca.2017.02.001_bib164) 2013; 37
10.1016/j.jnca.2017.02.001_bib54
Prokhorenko (10.1016/j.jnca.2017.02.001_bib110) 2016; 60
Flores (10.1016/j.jnca.2017.02.001_bib47) 2015; 53
10.1016/j.jnca.2017.02.001_bib53
10.1016/j.jnca.2017.02.001_bib162
10.1016/j.jnca.2017.02.001_bib161
10.1016/j.jnca.2017.02.001_bib160
10.1016/j.jnca.2017.02.001_bib48
Mao (10.1016/j.jnca.2017.02.001_bib83) 2017; 1701
10.1016/j.jnca.2017.02.001_bib46
Rappaport (10.1016/j.jnca.2017.02.001_bib116) 2013; 1
Li (10.1016/j.jnca.2017.02.001_bib73) 2015; 3
Abdalla (10.1016/j.jnca.2017.02.001_bib4) 2014; 31
Chen (10.1016/j.jnca.2017.02.001_bib27) 2015; 17
Khan (10.1016/j.jnca.2017.02.001_bib68) 2014; 70
Satyanarayanan (10.1016/j.jnca.2017.02.001_bib121) 2009; 8
Cai (10.1016/j.jnca.2017.02.001_bib24) 2014; 28
Vaquero (10.1016/j.jnca.2017.02.001_bib141) 2014; 44
Chun (10.1016/j.jnca.2017.02.001_bib34) 2009
Guo (10.1016/j.jnca.2017.02.001_bib51) 2016; 40
Meng (10.1016/j.jnca.2017.02.001_bib86) 2015
10.1016/j.jnca.2017.02.001_bib21
10.1016/j.jnca.2017.02.001_bib20
10.1016/j.jnca.2017.02.001_bib18
Mohammad (10.1016/j.jnca.2017.02.001_bib88) 2015; 56
10.1016/j.jnca.2017.02.001_bib19
Pasupuleti (10.1016/j.jnca.2017.02.001_bib105) 2016; 64
10.1016/j.jnca.2017.02.001_bib17
Paladi (10.1016/j.jnca.2017.02.001_bib103) 2016
10.1016/j.jnca.2017.02.001_bib14
10.1016/j.jnca.2017.02.001_bib15
10.1016/j.jnca.2017.02.001_bib12
Ab Rahman (10.1016/j.jnca.2017.02.001_bib3) 2016
Liu (10.1016/j.jnca.2017.02.001_bib78) 2013; 20
Chung (10.1016/j.jnca.2017.02.001_bib35) 2014; 18
Nan (10.1016/j.jnca.2017.02.001_bib91) 2014; 28
Pokharel (10.1016/j.jnca.2017.02.001_bib108) 2017; 49
Shon (10.1016/j.jnca.2017.02.001_bib126) 2014; 19
Liu (10.1016/j.jnca.2017.02.001_bib79) 2015; 29
10.1016/j.jnca.2017.02.001_bib32
Juliadotter (10.1016/j.jnca.2017.02.001_bib64) 2015; 2
Ali (10.1016/j.jnca.2017.02.001_bib8) 2015; 99
Azfar (10.1016/j.jnca.2017.02.001_bib16) 2016; 16
Raj (10.1016/j.jnca.2017.02.001_bib115) 2012
Wang (10.1016/j.jnca.2017.02.001_bib143) 2014; 52
Fernando (10.1016/j.jnca.2017.02.001_bib45) 2013; 29
10.1016/j.jnca.2017.02.001_bib100
10.1016/j.jnca.2017.02.001_bib25
10.1016/j.jnca.2017.02.001_bib26
10.1016/j.jnca.2017.02.001_bib104
Qiu (10.1016/j.jnca.2017.02.001_bib112) 2016
Zhang (10.1016/j.jnca.2017.02.001_bib155) 2015; 8
10.1016/j.jnca.2017.02.001_bib102
10.1016/j.jnca.2017.02.001_bib109
10.1016/j.jnca.2017.02.001_bib106
Dhanya (10.1016/j.jnca.2017.02.001_bib38) 2015
Yin (10.1016/j.jnca.2017.02.001_bib152) 2015; 14
10.1016/j.jnca.2017.02.001_bib80
Sgandurra (10.1016/j.jnca.2017.02.001_bib122) 2016; 48
Choo (10.1016/j.jnca.2017.02.001_bib33) 2014
Vaezpour (10.1016/j.jnca.2017.02.001_bib140) 2016
Wen (10.1016/j.jnca.2017.02.001_bib145) 2014; 16
Alizadeh (10.1016/j.jnca.2017.02.001_bib9) 2016; 61
10.1016/j.jnca.2017.02.001_bib85
10.1016/j.jnca.2017.02.001_bib84
10.1016/j.jnca.2017.02.001_bib81
10.1016/j.jnca.2017.02.001_bib82
Suarez-Tangil (10.1016/j.jnca.2017.02.001_bib129) 2014; 16
Tsai (10.1016/j.jnca.2017.02.001_bib137) 2015; 9
10.1016/j.jnca.2017.02.001_bib114
Tian (10.1016/j.jnca.2017.02.001_bib136) 2015
10.1016/j.jnca.2017.02.001_bib118
10.1016/j.jnca.2017.02.001_bib117
Buyya (10.1016/j.jnca.2017.02.001_bib22) 2009; 25
10.1016/j.jnca.2017.02.001_bib90
Zhang (10.1016/j.jnca.2017.02.001_bib156) 2015
Osanaiye (10.1016/j.jnca.2017.02.001_bib101) 2016; 67
Teing (10.1016/j.jnca.2017.02.001_bib133) 2016
AlShahwan (10.1016/j.jnca.2017.02.001_bib13) 2015
Giurgiu (10.1016/j.jnca.2017.02.001_bib50) 2009; 2009
10.1016/j.jnca.2017.02.001_bib10
10.1016/j.jnca.2017.02.001_bib98
Zhu (10.1016/j.jnca.2017.02.001_bib163) 2011; 28
10.1016/j.jnca.2017.02.001_bib11
10.1016/j.jnca.2017.02.001_bib99
10.1016/j.jnca.2017.02.001_bib96
Khan (10.1016/j.jnca.2017.02.001_bib66) 2013; 29
10.1016/j.jnca.2017.02.001_bib97
10.1016/j.jnca.2017.02.001_bib94
10.1016/j.jnca.2017.02.001_bib95
10.1016/j.jnca.2017.02.001_bib92
Kumari (10.1016/j.jnca.2017.02.001_bib71) 2017; 68
10.1016/j.jnca.2017.02.001_bib123
10.1016/j.jnca.2017.02.001_bib120
10.1016/j.jnca.2017.02.001_bib125
10.1016/j.jnca.2017.02.001_bib124
Ali (10.1016/j.jnca.2017.02.001_bib7) 2015; 305
Psannis (10.1016/j.jnca.2017.02.001_bib111) 2014; 2
10.1016/j.jnca.2017.02.001_bib1
Chen (10.1016/j.jnca.2017.02.001_bib30) 2015; 53
Han (10.1016/j.jnca.2017.02.001_bib52) 2015
10.1016/j.jnca.2017.02.001_bib2
Zhang (10.1016/j.jnca.2017.02.001_bib158) 2016; 28
Khalil (10.1016/j.jnca.2017.02.001_bib65) 2014; 65
Khan (10.1016/j.jnca.2017.02.001_bib69) 2015; 13
10.1016/j.jnca.2017.02.001_bib6
Zhang (10.1016/j.jnca.2017.02.001_bib157) 2014; 7
Chen (10.1016/j.jnca.2017.02.001_bib28) 2015; 29
Yang (10.1016/j.jnca.2017.02.001_bib149) 2016; 28
10.1016/j.jnca.2017.02.001_bib63
Mollah (10.1016/j.jnca.2017.02.001_bib89) 2017; 4
10.1016/j.jnca.2017.02.001_bib130
Cahyani (10.1016/j.jnca.2017.02.001_bib23) 2016
10.1016/j.jnca.2017.02.001_bib60
Saab (10.1016/j.jnca.2017.02.001_bib119) 2015; 8
10.1016/j.jnca.2017.02.001_bib134
Chen (10.1016/j.jnca.2017.02.001_bib31) 2016; 24
10.1016/j.jnca.2017.02.001_bib132
Sitová (10.1016/j.jnca.2017.02.001_bib127) 2016; 11
10.1016/j.jnca.2017.02.001_bib56
10.1016/j.jnca.2017.02.001_bib57
10.1016/j.jnca.2017.02.001_bib135
Hossain (10.1016/j.jnca.2017.02.001_bib55) 2015; 18
Jin (10.1016/j.jnca.2017.02.001_bib62) 2015; 64
Sweeney (10.1016/j.jnca.2017.02.001_bib131) 2002; 10
Tysowski (10.1016/j.jnca.2017.02.001_bib138) 2011; 33
Liu (10.1016/j.jnca.2017.02.001_bib77) 2015
Milligan (10.1016/j.jnca.2017.02.001_bib87) 2008; 1
Sookhak (10.1016/j.jnca.2017.02.001_bib128) 2017; 380
Quick (10.1016/j.jnca.2017.02.001_bib113) 2016
10.1016/j.jnca.2017.02.001_bib76
Tysowski (10.1016/j.jnca.2017.02.001_bib139) 2013; 1
Khan (10.1016/j.jnca.2017.02.001_bib67) 2013; 66
10.1016/j.jnca.2017.02.001_bib72
Gao (10.1016/j.jnca.2017.02.001_bib49) 2015; 17
10.1016/j.jnca.2017.02.001_bib70
10.1016/j.jnca.2017.02.001_bib144
10.1016/j.jnca.2017.02.001_bib142
Iqbal (10.1016/j.jnca.2017.02.001_bib59) 2016; 74
10.1016/j.jnca.2017.02.001_bib148
10.1016/j.jnca.2017.02.001_bib147
Wu (10.1016/j.jnca.2017.02.001_bib146) 2015; 53
Imgraben (10.1016/j.jnca.2017.02.001_bib58) 2014; 33
Jeong (10.1016/j.jnca.2017.02.001_bib61) 2013
Li (10.1016/j.jnca.2017.02.001_bib74) 2014; 30
Peng (10.1016/j.jnca.2017.02.001_bib107) 2016; 72
References_xml – volume: 28
  start-page: 122
  year: 2016
  end-page: 134
  ident: bib149
  article-title: Cloud based data sharing with fine-grained proxy re-encryption
  publication-title: Pervasive Mob. Comput.
– year: 2016
  ident: bib133
  article-title: Forensic investigation of cooperative storage cloud service: symform as a case study
  publication-title: J. Forensic Sci.
– volume: 16
  start-page: 885
  year: 2014
  end-page: 902
  ident: bib145
  article-title: Cloud mobile media: reflections and outlook
  publication-title: Multimed. IEEE Trans.
– volume: 64
  start-page: 2833
  year: 2015
  end-page: 2846
  ident: bib62
  article-title: H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor
  publication-title: Comput. IEEE Trans.
– start-page: 411
  year: 2012
  end-page: 429
  ident: bib115
  article-title: secure mobile cloud computing
  publication-title: Handb. Secur. Cyber-Phys. Crit. Infrastruct.
– volume: 37
  start-page: 215
  year: 2013
  end-page: 227
  ident: bib164
  article-title: Secloud: a cloud-based comprehensive and lightweight security solution for smartphones
  publication-title: Comput. Secur.
– volume: 70
  start-page: 946
  year: 2014
  end-page: 976
  ident: bib68
  article-title: BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
  publication-title: J. Supercomput.
– volume: 10
  start-page: 557
  year: 2002
  end-page: 570
  ident: bib131
  article-title: k-anonymity: a model for protecting privacy
  publication-title: Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
– year: 2015
  ident: bib136
  article-title: Dynamic-hash-table based public auditing for secure cloud storage
  publication-title: IEEE Trans. Serv. Comput.
– reference: Ferzli R., Khalife, I., 2011. Mobile cloud computing educational tool for image/video processing algorithms, in Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop (DSP/SPE), IEEE, pp. 529–533.
– reference: Fawaz, K., Feng, H., Shin, K.G., 2015. Anatomization and Protection of Mobile Apps' Location Privacy Threats. In: Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), pp. 753–768.
– volume: 30
  start-page: 98
  year: 2014
  end-page: 106
  ident: bib74
  article-title: Privacy-preserving data utilization in hybrid clouds
  publication-title: Future Gener. Comput. Syst.
– start-page: 1
  year: 2015
  end-page: 11
  ident: bib13
  article-title: Security framework for RESTful mobile cloud computing web services
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 8
  year: 2009
  end-page: 11
  ident: bib34
  article-title: Augmented smartphone applications Through clone cloud execution
  publication-title: HotOS
– volume: 7
  start-page: 1933
  year: 2014
  end-page: 1944
  ident: bib157
  article-title: Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud
  publication-title: Secur. Commun. Netw.
– volume: 4
  start-page: 34
  year: 2017
  end-page: 42
  ident: bib89
  article-title: Secure data sharing and Searching at the edge of cloud-assisted Internet of Things
  publication-title: IEEE Cloud Comput.
– reference: Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., Li, Q., 2015. SMOC: A secure mobile cloud computing platform. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2668–2676.
– volume: 2
  start-page: 14
  year: 2015
  end-page: 20
  ident: bib64
  article-title: Cloud attack and risk assessment taxonomy
  publication-title: IEEE Cloud Comput.
– reference: Ba, H., Heinzelman, W., Janssen, C.-A., Shi, J., 2013. Mobile computing-A green computing resource, in Wireless Communications and Networking Conference (WCNC), IEEE, pp. 4451–4456.
– reference: Baharon, M.R., Shi, Q., Llewellyn-Jones, D., 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing, in Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, pp. 618–625.
– reference: Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: Securecomm and Workshops, pp. 1–10.
– year: 2016
  ident: bib140
  article-title: A new approach to mitigating security risks of phone clone Co-location Over mobile clouds
  publication-title: J. Netw. Comput. Appl.
– start-page: 45
  year: 2015
  end-page: 53
  ident: bib38
  article-title: Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing, Security in Computing and Communications
– reference: Ellouze, A., Gagnaire, M., Haddad, A., 2015. A mobile application offloading algorithm for mobile cloud computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 34–40.
– volume: 17
  start-page: 1286
  year: 2015
  end-page: 1296
  ident: bib49
  article-title: Towards cost-efficient video transcoding in media cloud: insights learned from user viewing patterns
  publication-title: Multimed. IEEE Trans.
– reference: Zhong, H., Xiao, J., 2014. Design for a cloud-based hybrid Android application security assessment framework. In: Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on, pp. 539–546.
– volume: 61
  start-page: 59
  year: 2016
  end-page: 80
  ident: bib9
  article-title: Authentication in mobile cloud computing: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 52
  start-page: 73
  year: 2014
  end-page: 79
  ident: bib143
  article-title: Security protection between users and the mobile media cloud
  publication-title: Commun. Mag., IEEE
– reference: Liang, H., Han, C., Zhang, D., Wu, D., 2014. A Lightweight Security Isolation Approach for Virtual Machines Deployment. In: Information Security and Cryptology, pp. 516–529.
– reference: Amin, M.A., Bib Abu Bakar, K., Al-Hashimi, H., 2013. A review of mobile cloud computing architecture and challenges to enterprise users, in GCC Conference and Exhibition (GCC), 2013. 7th IEEE, pp. 240–244.
– reference: ElMenshawy, D., 2015. Touchscreen patterns based authentication approach for smart phones. In: Science and Information Conference (SAI), pp. 1311–1315.
– year: 2015
  ident: bib52
  article-title: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing
  publication-title: IEEE Trans. Dependable Secur. Comput.
– volume: 8
  start-page: 1006
  year: 2015
  end-page: 1025
  ident: bib155
  article-title: Mobile cloud computing based privacy protection in location‐based information survey applications
  publication-title: Secur. Commun. Netw.
– reference: Walls, J., Choo, K.-K. R., 2015. A Review of Free Cloud-Based Anti-Malware Apps for Android, In: Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1053–1058.
– reference: Online: 2016] US National Security Agency: Information Assurance:
– volume: 24
  start-page: 2795
  year: 2016
  end-page: 2808
  ident: bib31
  article-title: Efficient multi-user computation offloading for mobile-edge cloud computing
  publication-title: IEEE/ACM Trans. Netw.
– volume: 2
  start-page: 476
  year: 2014
  end-page: 483
  ident: bib111
  article-title: Convergence of Internet of things and mobile cloud computing
  publication-title: Syst. Sci. Control Eng.: Open Access J.
– reference: Suo, H., Liu, Z., Wan, J., Zhou, K., 2013. Security and privacy in mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 655–659.
– reference: Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278.
– year: 2016
  ident: bib3
  article-title: Cloud incident handling and forensic‐by‐design: cloud storage as a case study
  publication-title: Concurr. Comput.: Pract. Exp.
– volume: 53
  start-page: 80
  year: 2015
  end-page: 88
  ident: bib47
  article-title: Mobile code offloading: from concept to practice and beyond
  publication-title: Commun. Mag. IEEE
– reference: Bahrami, M., Singhal, M., 2015. A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 189–198.
– reference: Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Bringing mobile online games to clouds, in Computer Communications Workshops (INFOCOM WKSHPS), 2014. IEEE Conference on, pp. 340–345.
– volume: 29
  start-page: 1278
  year: 2013
  end-page: 1299
  ident: bib66
  article-title: Towards secure mobile cloud computing: a survey
  publication-title: Future Gener. Comput. Syst.
– volume: 74
  start-page: 98
  year: 2016
  end-page: 120
  ident: bib59
  article-title: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service
  publication-title: J. Netw. Comput. Appl.
– year: 2016
  ident: bib113
  article-title: Pervasive social networking forensics: intelligence and evidence from mobile device extracts
  publication-title: J. Netw. Comput. Appl.
– reference: Tan, J., Gandhi, R., Narasimhan, P., 2014. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE. In: Proceedings of the 6th International Conference on, pp. 644–649.
– reference: Zhong, L., Wang, B., Wei, H., 2012. Cloud computing applied in the mobile internet, in Computer Science & Education (ICCSE), 2012. In: Proceedings of the 7th International Conference on, pp. 218–221.
– volume: 28
  start-page: 135
  year: 2016
  end-page: 149
  ident: bib158
  article-title: Efficient attribute-based data sharing in mobile clouds
  publication-title: Pervasive Mob. Comput.
– volume: 49
  start-page: 71
  year: 2017
  end-page: 78
  ident: bib108
  article-title: Mobile cloud security: an adversary model for lightweight browser security
  publication-title: Comput. Stand. Interfaces
– reference: Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management, in Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 1073–1080.
– reference: De Luca, A., Von Zezschwitz, E., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., et al., 2013. Back-of-device authentication on smartphones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2389–2398.
– reference: Xiu-feng, Q., Jian-Wei, L., Peng-Chuan, Z., 2011. Secure cloud computing architecture on mobile internet, in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011. In: Proceedings of the 2nd International Conference on, pp. 619–622.
– volume: 17
  start-page: 1471
  year: 2015
  end-page: 1483
  ident: bib27
  article-title: Cloud-assisted live streaming for crowdsourced multimedia content
  publication-title: Multimed. IEEE Trans.
– volume: 29
  start-page: 46
  year: 2015
  end-page: 50
  ident: bib79
  article-title: Secure sharing and searching for real-time video data in mobile cloud
  publication-title: Netw. IEEE
– start-page: 28
  year: 2014
  end-page: 40
  ident: bib153
  article-title: Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage, Network andSystem Security
– volume: 1701
  start-page: 01090
  year: 2017
  ident: bib83
  article-title: Mobile edge computing: survey and Research outlook
  publication-title: arXiv Prepr arXiv
– reference: Rassan, I.A., AlShaher, H., 2014. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA), In: 2014 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 157–161.
– year: 2015
  ident: bib77
  article-title: Personalized search over encrypted data with efficient and secure updates in mobile clouds
  publication-title: IEEE Trans. Emerg. Top. Comput.
– reference: Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2015. Fog Computing: Focusing on Mobile Users at the Edge, arXiv preprint
– volume: 305
  start-page: 357
  year: 2015
  end-page: 383
  ident: bib7
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
– volume: 60
  start-page: 95
  year: 2016
  end-page: 112
  ident: bib110
  article-title: Web application protection techniques: a taxonomy
  publication-title: J. Netw. Comput. Appl.
– reference: [Online: 2016] Locations of Google’s Data Centers:
– volume: 16
  start-page: 73
  year: 2016
  end-page: 111
  ident: bib16
  article-title: Android mobile VoIP apps: a survey and examination of their security and privacy
  publication-title: Electron. Commer. Res.
– reference: Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile Cloud Computing: Bridging the Gap between Cloud and Mobile Devices," in Computational Intelligence and Communication Networks (CICN), 2013 In: Proceedings of the 5th International Conference on, pp. 553–555.
– volume: 18
  start-page: 11
  year: 2015
  end-page: 21
  ident: bib55
  article-title: 5G cellular: key enabling technologies and research challenges
  publication-title: Instrum. Meas. Mag. IEEE
– volume: 12
  start-page: 67
  year: 2016
  ident: bib75
  article-title: Intercrossed access controls for secure financial services on multimedia big data in cloud systems
  publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)
– volume: 72
  start-page: 14
  year: 2016
  end-page: 27
  ident: bib107
  article-title: User profiling in intrusion detection: a review
  publication-title: J. Netw. Comput. Appl.
– year: 2013
  ident: bib61
  article-title: An efficient authentication system of smart device using multi factors in mobile cloud service architecture
  publication-title: Int. J. Commun. Syst.
– reference: Liu, L., Zhang, X., Yan, G., Chen, S., 2009. Exploitation and threat analysis of open mobile devices, In: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 20–29.
– volume: 1
  start-page: 24
  year: 2008
  ident: bib87
  article-title: Business risks and security assessment for mobile devices
  publication-title: Inf. Syst. Control J.
– reference: Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp. 14–19.
– reference: Bahrami, M., 2015. Cloud Computing for Emerging Mobile Cloud Apps, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 4–5.
– reference: Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S., 2009. Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127–134.
– reference: Huerta-Canepa, G., Lee, D., 2010. A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6.
– reference: Alqahtani, H.S., Kouadri-Mostefaou, G., 2014. Multi-clouds Mobile Computing for the Secure Storage of Data, in 2014 IEEE/ACM. In: Proceedings of the 7th International Conference on Utility and Cloud Computing, pp. 495–496.
– volume: 64
  start-page: 12
  year: 2016
  end-page: 22
  ident: bib105
  article-title: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
  publication-title: J. Netw. Comput. Appl.
– volume: 22
  start-page: 20
  year: 2015
  end-page: 27
  ident: bib29
  article-title: AIWAC: affective interaction through wearable computing and cloud technology
  publication-title: Wirel. Commun. IEEE
– reference: Zhao, X., Feng, T., Shi, W., 2013. Continuous mobile authentication using a novel graphic touch gesture feature, in Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE. In: Proceedings of the Sixth International Conference on, pp. 1–6.
– reference: Arabo A., Pranggono, B., 2013. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions, in Control Systems and Computer Science (CSCS), 2013. In: Proceedings of the 19th International Conference on, pp. 526–531.
– year: 2016
  ident: bib23
  article-title: Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study
  publication-title: Concurr. Comput.: Pract. Exp.
– reference: Feng, T., Zhao, X., Carbunar, B., Shi, W., 2013. Continuous mobile authentication using virtual key typing biometrics, in Trust, security and privacy in computing and communications (TrustCom), 2013. In: Proceedings of the 12th IEEE international conference on, pp. 1547–1552.
– volume: 3
  start-page: 127
  year: 2015
  end-page: 138
  ident: bib73
  article-title: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
  publication-title: Emerg. Top. Comput. IEEE Trans.
– volume: 25
  start-page: 599
  year: 2009
  end-page: 616
  ident: bib22
  article-title: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
  publication-title: Future Gener. Comput. Syst.
– volume: 40
  start-page: 235
  year: 2016
  ident: bib51
  article-title: Fine-grained database field search using attribute-based encryption for e-healthcare clouds
  publication-title: J. Med. Syst.
– volume: 13
  start-page: 651
  year: 2015
  end-page: 675
  ident: bib69
  article-title: A cloud-Manager-based Re-Encryption scheme for mobile users in cloud environment: a hybrid approach
  publication-title: J. Grid Comput.
– year: 2016
  ident: bib103
  article-title: Providing user security guarantees in public infrastructure clouds
  publication-title: IEEE Trans. Cloud Comput.
– volume: 8
  start-page: 38
  year: 2015
  end-page: 46
  ident: bib119
  article-title: Partial mobile application offloading to the cloud for energy-efficiency with security measures
  publication-title: Sustain. Comput.: Inform. Syst.
– volume: 53
  start-page: 18
  year: 2015
  end-page: 24
  ident: bib30
  article-title: On the computation offloading at ad hoc cloudlet: architecture and service modes
  publication-title: Commun. Mag., IEEE
– reference: Park, I.-S., Lee, Y.-D., Jeong, J., 2013. Improved Identity Management Protocol for Secure Mobile Cloud Computing, in System Sciences (HICSS), 2013. In: Proceedings of the 46th Hawaii International Conference on, pp. 4958–4965.
– volume: 11
  start-page: 877
  year: 2016
  end-page: 892
  ident: bib127
  article-title: HMOG: New behavioral biometric features for continuous authentication of smartphone users
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: Niu, B., Li, Q., Zhu, X., Cao, G., Li, H., 2015. Enhancing privacy through caching in location-based services. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 1017–1025.
– reference: Olafare, O., Parhizkar, H., Vem, S., 2015. A New Secure Mobile Cloud Architecture," arXiv preprint
– volume: 9
  start-page: 805
  year: 2015
  end-page: 815
  ident: bib137
  article-title: A Privacy-Aware authentication scheme for Distributed mobile cloud computing services
  publication-title: IEEE Syst. J.
– reference: Jarabek, C., Barrera, D., Aycock, J., 2012. Thinav: Truly lightweight mobile cloud-based anti-malware. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 209–218.
– reference: Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Using mobile cloud computing for real-time online applications, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, pp. 48–56.
– reference: Alam, S., Sogukpinar, I., Traore, I., Coady, Y., 2014. In-Cloud Malware Analysis and Detection: State of the Art. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 473.
– reference: Chen, M., Li, W., Li, Z., Lu, S., Chen, D., 2014. Preserving location privacy based on distributed cache pushing, in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, pp. 3456–3461.
– year: 2016
  ident: bib112
  article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
  publication-title: Future Gener. Comput. Syst.
– volume: 14
  start-page: 4020
  year: 2015
  end-page: 4033
  ident: bib152
  article-title: Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud
  publication-title: Wirel. Commun. IEEE Trans.
– reference: Jin, Y., Tian, C., He, H., Wang, F., 2015. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing, in Big Data and Cloud Computing (BDCloud), 2015 IEEE. In: Proceedings of the Fifth International Conference on, pp. 172–179.
– reference: Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile cloud computing: A needed shift from cloud to mobile cloud, in Computational Intelligence and Communication Networks (CICN), 2013. In: Proceedings of the 5th International Conference on, pp. 536–539.
– start-page: 20
  year: 2014
  end-page: 23
  ident: bib33
  article-title: Mobile cloud storage users
  publication-title: IEEE Cloud Comput.
– start-page: 1
  year: 2015
  end-page: 10
  ident: bib156
  article-title: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
  publication-title: Clust. Comput.
– volume: 65
  start-page: 99
  year: 2014
  end-page: 110
  ident: bib65
  article-title: Consolidated Identity Management System for secure mobile cloud computing
  publication-title: Comput. Netw.
– volume: 67
  start-page: 147
  year: 2016
  end-page: 165
  ident: bib101
  article-title: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
  publication-title: J. Netw. Comput. Appl.
– volume: 48
  start-page: 46
  year: 2016
  ident: bib122
  article-title: Evolution of attacks, threat models, and solutions for virtualized systems
  publication-title: ACM Comput. Surv. (CSUR)
– reference: Patel, P., Patel, R., 2015. Security in CloneCloud for Mobile Cloud Computing, in Communication Systems and Network Technologies (CSNT), 2015. In: Proceedings of the Fifth International Conference on, pp. 752–756.
– reference: Online: 2016] Mobile Cloud Computing Forum;
– reference: Al-Mutawa, M., Mishra, S., 2014. Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 51–60.
– volume: 44
  start-page: 27
  year: 2014
  end-page: 32
  ident: bib141
  article-title: Finding your way in the fog: towards a comprehensive definition of fog computing
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
– reference: Duan, Y., Zhang, M., Yin, H., Tang, Y., 2015. Privacy-preserving offloading of mobile app to the public cloud. In: Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud15).
– reference: Alizadeh, M., Hassan, W.H., 2013. Challenges and opportunities of mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 660–666.
– year: 2016
  ident: bib93
  article-title: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
  publication-title: Comput. Stand. Interfaces
– volume: 33
  start-page: 2011
  year: 2011
  ident: bib138
  article-title: Towards secure communication for highly scalable mobile applications in cloud computing systems
  publication-title: Cent. Appl. Cryptogr. Res. Univ. Waterloo Tech. Rep. CACR
– reference: Online: 2016] Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications:
– volume: 56
  start-page: 580
  year: 2015
  end-page: 585
  ident: bib88
  article-title: AMCC: Ad-hoc based mobile cloud computing modeling
  publication-title: Procedia Comput. Sci.
– volume: 99
  start-page: 1
  year: 2015
  end-page: 10
  ident: bib8
  article-title: SeDaSC: Secure data sharing in clouds
  publication-title: IEEE Syst. J.
– reference: Horrow, S., Gupta, S., Sardana, A., Abraham, A., 2012. Secure private cloud architecture for mobile infrastructure as a service. In: Services (SERVICES), 2012 IEEE Eighth World Congress on, pp. 149–154.
– volume: 1
  start-page: 172
  year: 2013
  end-page: 186
  ident: bib139
  article-title: Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
  publication-title: Cloud Comput. IEEE Trans.
– volume: 31
  start-page: 82
  year: 2014
  end-page: 91
  ident: bib4
  article-title: On protecting data storage in mobile cloud computing paradigm
  publication-title: IETE Tech. Rev.
– reference: Yang, X., Pan, T., Shen, J., 2010. On 3G mobile e-commerce platform based on cloud computing, in Ubi-media Computing (U-Media), 2010. In: Proceedings of the 3rd IEEE International Conference on, pp. 198–201.
– reference: Kovachev, D., Renzel, D., Klamma, R., Cao, Y., 2010. Mobile community cloud computing: emerges and evolves, in Mobile Data Management (MDM), 2010. In: Proceedings of the Eleventh International Conference on, pp. 393–395.
– reference: S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, 2014, pp. 1–2.
– volume: 8
  start-page: 14
  year: 2009
  end-page: 23
  ident: bib121
  article-title: The case for vm-based cloudlets in mobile computing
  publication-title: Pervasive Comput. IEEE
– volume: 19
  start-page: 404
  year: 2014
  end-page: 413
  ident: bib126
  article-title: Toward advanced mobile cloud computing for the Internet of Things: Current issues and future direction
  publication-title: Mob. Netw. Appl.
– volume: 53
  start-page: 232
  year: 2015
  end-page: 238
  ident: bib146
  article-title: Millimeter-wave multimedia communications: challenges, methodology, and applications
  publication-title: Commun. Mag. IEEE
– volume: 33
  start-page: 1347
  year: 2014
  end-page: 1360
  ident: bib58
  article-title: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
  publication-title: Behav. Inf. Technol.
– reference: Online: 2016] ABI Research Report on Mobile Cloud Computing;
– volume: 18
  start-page: 489
  year: 2014
  end-page: 491
  ident: bib35
  article-title: Recent trends on mobile computing and future networks
  publication-title: Pers. Ubiquitous Comput.
– volume: 29
  start-page: 84
  year: 2013
  end-page: 106
  ident: bib45
  article-title: mobile cloud computing: a survey
  publication-title: Future Gener. Comput. Syst.
– volume: 20
  start-page: 14
  year: 2013
  end-page: 22
  ident: bib78
  article-title: Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
  publication-title: Wirel. Commun. IEEE
– reference: Yu, Y., Li, Y., Au, M.H., Susilo, W., Choo, K.-K.R., Zhang, X., 2016. Public cloud data auditing with practical key update and zero knowledge privacy. In: Australasian Conference on Information Security and Privacy, pp. 389–405.
– reference: Cai, W., Zhou, C., Li, M., Li, X., Leung, V., 2015. MCG Test-bed: an Experimental Test-bed for Mobile Cloud Gaming. In: Proceedings of the 2nd Workshop on Mobile Gaming, pp. 25–30.
– reference: Mollah, M.B., Islam, K.R., Islam, S.S., 2012. Next generation of computing through cloud computing technology, in Electrical & Computer Engineering (CCECE), 2012 In: Proceedings of the 25th IEEE Canadian Conference on, pp. 1–6.
– reference: Louk M., Lim, H., 2015. Homomorphic encryption in mobile multi cloud computing, in Information Networking (ICOIN), 2015 International Conference on, pp. 493–497.
– start-page: 143
  year: 2015
  end-page: 157
  ident: bib86
  article-title: Model-Based Quantitative Security Analysis of Mobile Offloading Systems under Timing Attacks, Analytical and Stochastic Modelling Techniques and Applications
– reference: Owens, R., Wang, W., 2013. Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing, in Computer Communications and Networks (ICCCN), 2013. In: Proceedings of the 22nd International Conference on, pp. 1–5.
– reference: Wang, S., Tu, G.-H., Ganti, R., He, T., Leung, K., Tripp, H., et al., 2013. Mobile micro-cloud: Application classification, mapping, and deployment. In: Proceedings Annual Fall Meeting of ITA (AMITA).
– reference: Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., 2015. Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, in European Symposium on Research in Computer Security, pp. 146–166.
– volume: 28
  start-page: 74
  year: 2014
  end-page: 80
  ident: bib91
  article-title: Distributed resource allocation in cloud-based wireless multimedia social networks
  publication-title: Netw., IEEE
– reference: Dey, S., Sampalli, S., Ye, Q., 2015. A Context-Adaptive Security Framework for Mobile Cloud Computing, in 2015. In: Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 89–95.
– reference: Popa, D., Cremene, M., Borda, M., Boudaoud, K., 2013. A security framework for mobile cloud applications. In: Roedunet International Conference (RoEduNet), 2013 11th, pp. 1–4.
– volume: 16
  start-page: 961
  year: 2014
  end-page: 987
  ident: bib129
  article-title: Evolution, detection and analysis of malware for smart devices
  publication-title: Commun. Surv. Tutor. IEEE
– volume: 52
  start-page: 154
  year: 2015
  end-page: 172
  ident: bib5
  article-title: Seamless application execution in mobile cloud computing: motivation, taxonomy, and open challenges
  publication-title: J. Netw. Comput. Appl.
– reference: Online: 2016] A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011:
– volume: 28
  start-page: 59
  year: 2011
  end-page: 69
  ident: bib163
  article-title: Multimedia cloud computing
  publication-title: Signal Process. Mag. IEEE
– reference: Bouzefrane, S., Mostefa, B., Amira, F., Houacine., Cagon, H., 2014. Cloudlets Authentication in NFC-Based Mobile Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, 2014, pp. 267–272.
– volume: 1
  start-page: 335
  year: 2013
  end-page: 349
  ident: bib116
  article-title: Millimeter wave mobile communications for 5G cellular: it will work!
  publication-title: Access, IEEE
– volume: 28
  start-page: 54
  year: 2014
  end-page: 59
  ident: bib24
  article-title: Cloud computing meets mobile wireless communications in next generation cellular networks
  publication-title: Netw. IEEE
– reference: Lei, L., Sengupta, S., Pattanaik, T., Gao, J., 2015. MCloudDB: A Mobile Cloud Database Service Framework, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 6–15.
– reference: Tang, L., Ouyang, L., Tsai, W.-T., 2015. Multi-factor web API security for securing Mobile Cloud. In: Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pp. 2163-2168.
– reference: .
– volume: 68
  start-page: 320
  year: 2017
  end-page: 330
  ident: bib71
  article-title: Design of a provably secure biometrics-based multi-cloud-server authentication scheme
  publication-title: Future Gener. Comput. Syst.
– reference: Online: 2016] Device Policy for Andriod: Overview for Users:
– reference: Chard, K., Caton, S., Rana, O., Bubendorfer, K., 2010. Social cloud: Cloud computing in social networks," in Cloud Computing (CLOUD), 2010. IEEE In: Proceedings of the 3rd International Conference on, pp. 99–106.
– volume: 2009
  start-page: 83
  year: 2009
  end-page: 102
  ident: bib50
  publication-title: Calling the Cloud: Enabling Mobile Phones as Interfaces t Cloud Applications
– reference: Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards Cloud-Based Compositions of Security Functions For Mobile Devices. In: IFIP/IEEE International Symposium on Integrated Network Management (IM'15), p. 6.
– reference: Donald, A.C., Arockiam, L., 2015. A secure authentication scheme for MobiCloud, In: Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1–6.
– volume: 380
  start-page: 101
  year: 2017
  end-page: 116
  ident: bib128
  article-title: Dynamic remote data auditing for securing big data storage in cloud computing
  publication-title: Inf. Sci.
– reference: Shi, Y., Abhilash, S., Hwang, K., 2015. Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 109–118.
– volume: 29
  start-page: 32
  year: 2015
  end-page: 38
  ident: bib28
  article-title: EMC: emotion-aware mobile cloud computing in 5G
  publication-title: Netw. IEEE
– volume: 66
  start-page: 1687
  year: 2013
  end-page: 1706
  ident: bib67
  article-title: Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
  publication-title: J. Supercomput.
– reference: Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., et al., 2015. TinMan: eliminating confidential mobile data exposure with security oriented offloading. In: Proceedings of the Tenth European Conference on Computer Systems, p. 27.
– volume: 52
  start-page: 154
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib5
  article-title: Seamless application execution in mobile cloud computing: motivation, taxonomy, and open challenges
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2015.03.001
– ident: 10.1016/j.jnca.2017.02.001_bib150
  doi: 10.1109/UMEDIA.2010.5544470
– ident: 10.1016/j.jnca.2017.02.001_bib144
– ident: 10.1016/j.jnca.2017.02.001_bib12
  doi: 10.1109/UCC.2014.68
– volume: 29
  start-page: 1278
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib66
  article-title: Towards secure mobile cloud computing: a survey
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2012.08.003
– volume: 33
  start-page: 2011
  year: 2011
  ident: 10.1016/j.jnca.2017.02.001_bib138
  article-title: Towards secure communication for highly scalable mobile applications in cloud computing systems
  publication-title: Cent. Appl. Cryptogr. Res. Univ. Waterloo Tech. Rep. CACR
– volume: 28
  start-page: 59
  year: 2011
  ident: 10.1016/j.jnca.2017.02.001_bib163
  article-title: Multimedia cloud computing
  publication-title: Signal Process. Mag. IEEE
  doi: 10.1109/MSP.2011.940269
– volume: 13
  start-page: 651
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib69
  article-title: A cloud-Manager-based Re-Encryption scheme for mobile users in cloud environment: a hybrid approach
  publication-title: J. Grid Comput.
  doi: 10.1007/s10723-015-9352-9
– volume: 1
  start-page: 24
  year: 2008
  ident: 10.1016/j.jnca.2017.02.001_bib87
  article-title: Business risks and security assessment for mobile devices
  publication-title: Inf. Syst. Control J.
– ident: 10.1016/j.jnca.2017.02.001_bib132
  doi: 10.1109/CloudCom.2014.116
– ident: 10.1016/j.jnca.2017.02.001_bib134
  doi: 10.1109/Trustcom.2015.485
– ident: 10.1016/j.jnca.2017.02.001_bib81
  doi: 10.1109/ICOIN.2015.7057954
– volume: 72
  start-page: 14
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib107
  article-title: User profiling in intrusion detection: a review
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.06.012
– ident: 10.1016/j.jnca.2017.02.001_bib98
– volume: 8
  start-page: 1006
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib155
  article-title: Mobile cloud computing based privacy protection in location‐based information survey applications
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1055
– ident: 10.1016/j.jnca.2017.02.001_bib76
  doi: 10.1007/978-3-319-16745-9_28
– volume: 4
  start-page: 34
  year: 2017
  ident: 10.1016/j.jnca.2017.02.001_bib89
  article-title: Secure data sharing and Searching at the edge of cloud-assisted Internet of Things
  publication-title: IEEE Cloud Comput.
  doi: 10.1109/MCC.2017.9
– ident: 10.1016/j.jnca.2017.02.001_bib2
– ident: 10.1016/j.jnca.2017.02.001_bib70
  doi: 10.1109/MDM.2010.78
– ident: 10.1016/j.jnca.2017.02.001_bib43
– volume: 1701
  start-page: 01090
  year: 2017
  ident: 10.1016/j.jnca.2017.02.001_bib83
  article-title: Mobile edge computing: survey and Research outlook
  publication-title: arXiv Prepr arXiv
– ident: 10.1016/j.jnca.2017.02.001_bib14
  doi: 10.1109/IEEEGCC.2013.6705783
– ident: 10.1016/j.jnca.2017.02.001_bib147
– ident: 10.1016/j.jnca.2017.02.001_bib11
  doi: 10.1145/2642687.2642696
– ident: 10.1016/j.jnca.2017.02.001_bib120
  doi: 10.1109/ICCCW.2012.6316466
– start-page: 1
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib156
  article-title: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
  publication-title: Clust. Comput.
– ident: 10.1016/j.jnca.2017.02.001_bib162
  doi: 10.1109/ICCSE.2012.6295061
– ident: 10.1016/j.jnca.2017.02.001_bib130
  doi: 10.1109/IWCMC.2013.6583635
– ident: 10.1016/j.jnca.2017.02.001_bib1
– volume: 64
  start-page: 2833
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib62
  article-title: H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor
  publication-title: Comput. IEEE Trans.
  doi: 10.1109/TC.2015.2389792
– volume: 2
  start-page: 14
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib64
  article-title: Cloud attack and risk assessment taxonomy
  publication-title: IEEE Cloud Comput.
  doi: 10.1109/MCC.2015.2
– ident: 10.1016/j.jnca.2017.02.001_bib95
– volume: 61
  start-page: 59
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib9
  article-title: Authentication in mobile cloud computing: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2015.10.005
– ident: 10.1016/j.jnca.2017.02.001_bib17
  doi: 10.1109/WCNC.2013.6555295
– start-page: 28
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib153
– ident: 10.1016/j.jnca.2017.02.001_bib123
  doi: 10.1109/CICN.2013.116
– ident: 10.1016/j.jnca.2017.02.001_bib18
  doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.88
– start-page: 1
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib13
  article-title: Security framework for RESTful mobile cloud computing web services
  publication-title: J. Ambient Intell. Humaniz. Comput.
– ident: 10.1016/j.jnca.2017.02.001_bib21
  doi: 10.1109/MobileCloud.2014.46
– ident: 10.1016/j.jnca.2017.02.001_bib32
  doi: 10.1109/WCNC.2014.6953141
– ident: 10.1016/j.jnca.2017.02.001_bib104
  doi: 10.1109/HICSS.2013.262
– volume: 8
  start-page: 38
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib119
  article-title: Partial mobile application offloading to the cloud for energy-efficiency with security measures
  publication-title: Sustain. Comput.: Inform. Syst.
– volume: 33
  start-page: 1347
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib58
  article-title: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
  publication-title: Behav. Inf. Technol.
  doi: 10.1080/0144929X.2014.934286
– volume: 29
  start-page: 32
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib28
  article-title: EMC: emotion-aware mobile cloud computing in 5G
  publication-title: Netw. IEEE
  doi: 10.1109/MNET.2015.7064900
– volume: 28
  start-page: 54
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib24
  article-title: Cloud computing meets mobile wireless communications in next generation cellular networks
  publication-title: Netw. IEEE
  doi: 10.1109/MNET.2014.6963805
– ident: 10.1016/j.jnca.2017.02.001_bib48
  doi: 10.1109/CSCloud.2016.52
– volume: 70
  start-page: 946
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib68
  article-title: BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-014-1269-8
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib113
  article-title: Pervasive social networking forensics: intelligence and evidence from mobile device extracts
  publication-title: J. Netw. Comput. Appl.
– ident: 10.1016/j.jnca.2017.02.001_bib63
  doi: 10.1109/BDCloud.2015.57
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib112
  article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
  publication-title: Future Gener. Comput. Syst.
– volume: 305
  start-page: 357
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib7
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.01.025
– ident: 10.1016/j.jnca.2017.02.001_bib10
  doi: 10.1109/IWCMC.2013.6583636
– ident: 10.1016/j.jnca.2017.02.001_bib42
  doi: 10.1109/SAI.2015.7237312
– ident: 10.1016/j.jnca.2017.02.001_bib97
– volume: 1
  start-page: 172
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib139
  article-title: Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
  publication-title: Cloud Comput. IEEE Trans.
  doi: 10.1109/TCC.2013.11
– volume: 44
  start-page: 27
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib141
  article-title: Finding your way in the fog: towards a comprehensive definition of fog computing
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/2677046.2677052
– volume: 52
  start-page: 73
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib143
  article-title: Security protection between users and the mobile media cloud
  publication-title: Commun. Mag., IEEE
  doi: 10.1109/MCOM.2014.6766088
– volume: 30
  start-page: 98
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib74
  article-title: Privacy-preserving data utilization in hybrid clouds
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2013.06.011
– start-page: 20
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib33
  article-title: Mobile cloud storage users
  publication-title: IEEE Cloud Comput.
  doi: 10.1109/MCC.2014.61
– year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib136
  article-title: Dynamic-hash-table based public auditing for secure cloud storage
  publication-title: IEEE Trans. Serv. Comput.
– ident: 10.1016/j.jnca.2017.02.001_bib90
  doi: 10.1109/CCECE.2012.6334973
– volume: 29
  start-page: 84
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib45
  article-title: mobile cloud computing: a survey
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2012.05.023
– volume: 74
  start-page: 98
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib59
  article-title: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.08.016
– ident: 10.1016/j.jnca.2017.02.001_bib25
  doi: 10.1145/2751496.2751501
– year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib52
  article-title: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2015.2429132
– ident: 10.1016/j.jnca.2017.02.001_bib60
  doi: 10.1145/2420950.2420983
– volume: 65
  start-page: 99
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib65
  article-title: Consolidated Identity Management System for secure mobile cloud computing
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2014.03.015
– volume: 2009
  start-page: 83
  year: 2009
  ident: 10.1016/j.jnca.2017.02.001_bib50
– year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib77
  article-title: Personalized search over encrypted data with efficient and secure updates in mobile clouds
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2014.2371239
– ident: 10.1016/j.jnca.2017.02.001_bib41
  doi: 10.1109/MobileCloud.2015.11
– ident: 10.1016/j.jnca.2017.02.001_bib46
  doi: 10.1109/DSP-SPE.2011.5739270
– ident: 10.1016/j.jnca.2017.02.001_bib53
  doi: 10.1109/INFOCOM.2015.7218658
– volume: 53
  start-page: 232
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib146
  article-title: Millimeter-wave multimedia communications: challenges, methodology, and applications
  publication-title: Commun. Mag. IEEE
  doi: 10.1109/MCOM.2015.7010539
– ident: 10.1016/j.jnca.2017.02.001_bib37
  doi: 10.1109/MSN.2015.28
– volume: 10
  start-page: 557
  year: 2002
  ident: 10.1016/j.jnca.2017.02.001_bib131
  article-title: k-anonymity: a model for protecting privacy
  publication-title: Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
  doi: 10.1142/S0218488502001648
– ident: 10.1016/j.jnca.2017.02.001_bib102
  doi: 10.1109/ICCCN.2013.6614169
– volume: 19
  start-page: 404
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib126
  article-title: Toward advanced mobile cloud computing for the Internet of Things: Current issues and future direction
  publication-title: Mob. Netw. Appl.
  doi: 10.1007/s11036-014-0509-8
– ident: 10.1016/j.jnca.2017.02.001_bib161
  doi: 10.1109/ICRMS.2014.7107254
– ident: 10.1016/j.jnca.2017.02.001_bib125
  doi: 10.1109/MobileCloud.2015.15
– ident: 10.1016/j.jnca.2017.02.001_bib160
  doi: 10.1109/BTAS.2013.6712747
– start-page: 8
  year: 2009
  ident: 10.1016/j.jnca.2017.02.001_bib34
  article-title: Augmented smartphone applications Through clone cloud execution
  publication-title: HotOS
– volume: 66
  start-page: 1687
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib67
  article-title: Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-013-0967-y
– ident: 10.1016/j.jnca.2017.02.001_bib142
  doi: 10.1109/Trustcom.2015.482
– volume: 9
  start-page: 805
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib137
  article-title: A Privacy-Aware authentication scheme for Distributed mobile cloud computing services
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2014.2322973
– volume: 1
  start-page: 335
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib116
  article-title: Millimeter wave mobile communications for 5G cellular: it will work!
  publication-title: Access, IEEE
  doi: 10.1109/ACCESS.2013.2260813
– ident: 10.1016/j.jnca.2017.02.001_bib19
  doi: 10.1109/MobileCloud.2015.40
– ident: 10.1016/j.jnca.2017.02.001_bib56
  doi: 10.1145/1810931.1810937
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib23
  article-title: Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study
  publication-title: Concurr. Comput.: Pract. Exp.
– volume: 28
  start-page: 122
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib149
  article-title: Cloud based data sharing with fine-grained proxy re-encryption
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2015.06.017
– volume: 16
  start-page: 885
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib145
  article-title: Cloud mobile media: reflections and outlook
  publication-title: Multimed. IEEE Trans.
  doi: 10.1109/TMM.2014.2315596
– ident: 10.1016/j.jnca.2017.02.001_bib44
  doi: 10.1109/TrustCom.2013.272
– volume: 16
  start-page: 73
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib16
  article-title: Android mobile VoIP apps: a survey and examination of their security and privacy
  publication-title: Electron. Commer. Res.
  doi: 10.1007/s10660-015-9208-1
– volume: 12
  start-page: 67
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib75
  article-title: Intercrossed access controls for secure financial services on multimedia big data in cloud systems
  publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)
– ident: 10.1016/j.jnca.2017.02.001_bib94
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib103
  article-title: Providing user security guarantees in public infrastructure clouds
  publication-title: IEEE Trans. Cloud Comput.
– ident: 10.1016/j.jnca.2017.02.001_bib159
  doi: 10.1145/1655008.1655026
– volume: 99
  start-page: 1
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib8
  article-title: SeDaSC: Secure data sharing in clouds
  publication-title: IEEE Syst. J.
– volume: 17
  start-page: 1471
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib27
  article-title: Cloud-assisted live streaming for crowdsourced multimedia content
  publication-title: Multimed. IEEE Trans.
  doi: 10.1109/TMM.2015.2460193
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib3
  article-title: Cloud incident handling and forensic‐by‐design: cloud storage as a case study
  publication-title: Concurr. Comput.: Pract. Exp.
– ident: 10.1016/j.jnca.2017.02.001_bib124
  doi: 10.1109/CICN.2013.120
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib133
  article-title: Forensic investigation of cooperative storage cloud service: symform as a case study
  publication-title: J. Forensic Sci.
– volume: 67
  start-page: 147
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib101
  article-title: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.01.001
– volume: 48
  start-page: 46
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib122
  article-title: Evolution of attacks, threat models, and solutions for virtualized systems
  publication-title: ACM Comput. Surv. (CSUR)
  doi: 10.1145/2856126
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib93
  article-title: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
  publication-title: Comput. Stand. Interfaces
– volume: 8
  start-page: 14
  year: 2009
  ident: 10.1016/j.jnca.2017.02.001_bib121
  article-title: The case for vm-based cloudlets in mobile computing
  publication-title: Pervasive Comput. IEEE
  doi: 10.1109/MPRV.2009.82
– ident: 10.1016/j.jnca.2017.02.001_bib39
  doi: 10.1109/ICCCI.2015.7218101
– volume: 40
  start-page: 235
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib51
  article-title: Fine-grained database field search using attribute-based encryption for e-healthcare clouds
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-016-0588-0
– volume: 2
  start-page: 476
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib111
  article-title: Convergence of Internet of things and mobile cloud computing
  publication-title: Syst. Sci. Control Eng.: Open Access J.
  doi: 10.1080/21642583.2014.913213
– volume: 28
  start-page: 135
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib158
  article-title: Efficient attribute-based data sharing in mobile clouds
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2015.06.009
– ident: 10.1016/j.jnca.2017.02.001_bib26
  doi: 10.1109/CLOUD.2010.28
– volume: 380
  start-page: 101
  year: 2017
  ident: 10.1016/j.jnca.2017.02.001_bib128
  article-title: Dynamic remote data auditing for securing big data storage in cloud computing
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.09.004
– volume: 11
  start-page: 877
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib127
  article-title: HMOG: New behavioral biometric features for continuous authentication of smartphone users
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2506542
– volume: 18
  start-page: 11
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib55
  article-title: 5G cellular: key enabling technologies and research challenges
  publication-title: Instrum. Meas. Mag. IEEE
  doi: 10.1109/MIM.2015.7108393
– volume: 37
  start-page: 215
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib164
  article-title: Secloud: a cloud-based comprehensive and lightweight security solution for smartphones
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2013.02.002
– year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib61
  article-title: An efficient authentication system of smart device using multi factors in mobile cloud service architecture
  publication-title: Int. J. Commun. Syst.
– volume: 29
  start-page: 46
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib79
  article-title: Secure sharing and searching for real-time video data in mobile cloud
  publication-title: Netw. IEEE
– ident: 10.1016/j.jnca.2017.02.001_bib99
– volume: 24
  start-page: 2795
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib31
  article-title: Efficient multi-user computation offloading for mobile-edge cloud computing
  publication-title: IEEE/ACM Trans. Netw.
  doi: 10.1109/TNET.2015.2487344
– volume: 17
  start-page: 1286
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib49
  article-title: Towards cost-efficient video transcoding in media cloud: insights learned from user viewing patterns
  publication-title: Multimed. IEEE Trans.
  doi: 10.1109/TMM.2015.2438713
– ident: 10.1016/j.jnca.2017.02.001_bib92
  doi: 10.1109/INFOCOM.2015.7218474
– volume: 14
  start-page: 4020
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib152
  article-title: Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud
  publication-title: Wirel. Commun. IEEE Trans.
  doi: 10.1109/TWC.2015.2416177
– ident: 10.1016/j.jnca.2017.02.001_bib114
  doi: 10.1109/SECCOMW.2006.359550
– ident: 10.1016/j.jnca.2017.02.001_bib6
  doi: 10.1145/2659651.2659730
– volume: 3
  start-page: 127
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib73
  article-title: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
  publication-title: Emerg. Top. Comput. IEEE Trans.
  doi: 10.1109/TETC.2014.2371239
– ident: 10.1016/j.jnca.2017.02.001_bib85
  doi: 10.1109/MobileCloud.2014.19
– ident: 10.1016/j.jnca.2017.02.001_bib148
  doi: 10.1109/AIMSEC.2011.6010435
– year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib140
  article-title: A new approach to mitigating security risks of phone clone Co-location Over mobile clouds
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.01.005
– volume: 64
  start-page: 12
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib105
  article-title: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2015.11.023
– start-page: 45
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib38
– ident: 10.1016/j.jnca.2017.02.001_bib135
  doi: 10.1109/FSKD.2015.7382287
– ident: 10.1016/j.jnca.2017.02.001_bib109
  doi: 10.1109/RoEduNet.2013.6511724
– ident: 10.1016/j.jnca.2017.02.001_bib15
  doi: 10.1109/CSCS.2013.27
– volume: 20
  start-page: 14
  year: 2013
  ident: 10.1016/j.jnca.2017.02.001_bib78
  article-title: Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
  publication-title: Wirel. Commun. IEEE
  doi: 10.1109/MWC.2013.6549279
– ident: 10.1016/j.jnca.2017.02.001_bib100
– ident: 10.1016/j.jnca.2017.02.001_bib40
– volume: 56
  start-page: 580
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib88
  article-title: AMCC: Ad-hoc based mobile cloud computing modeling
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2015.07.257
– ident: 10.1016/j.jnca.2017.02.001_bib151
  doi: 10.1007/978-3-319-24177-7_8
– volume: 49
  start-page: 71
  year: 2017
  ident: 10.1016/j.jnca.2017.02.001_bib108
  article-title: Mobile cloud security: an adversary model for lightweight browser security
  publication-title: Comput. Stand. Interfaces
  doi: 10.1016/j.csi.2016.09.002
– volume: 28
  start-page: 74
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib91
  article-title: Distributed resource allocation in cloud-based wireless multimedia social networks
  publication-title: Netw., IEEE
  doi: 10.1109/MNET.2014.6863135
– ident: 10.1016/j.jnca.2017.02.001_bib96
– ident: 10.1016/j.jnca.2017.02.001_bib84
  doi: 10.1109/INFCOMW.2014.6849255
– volume: 25
  start-page: 599
  year: 2009
  ident: 10.1016/j.jnca.2017.02.001_bib22
  article-title: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2008.12.001
– ident: 10.1016/j.jnca.2017.02.001_bib54
  doi: 10.1109/SERVICES.2012.25
– ident: 10.1016/j.jnca.2017.02.001_bib82
– volume: 7
  start-page: 1933
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib157
  article-title: Privacy‐assured substructure similarity query over encrypted graph‐structured data in cloud
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.907
– ident: 10.1016/j.jnca.2017.02.001_bib20
  doi: 10.1109/MobileCloud.2015.36
– volume: 53
  start-page: 18
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib30
  article-title: On the computation offloading at ad hoc cloudlet: architecture and service modes
  publication-title: Commun. Mag., IEEE
  doi: 10.1109/MCOM.2015.7120041
– ident: 10.1016/j.jnca.2017.02.001_bib117
  doi: 10.1109/CSCI.2014.33
– volume: 16
  start-page: 961
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib129
  article-title: Evolution, detection and analysis of malware for smart devices
  publication-title: Commun. Surv. Tutor. IEEE
  doi: 10.1109/SURV.2013.101613.00077
– volume: 22
  start-page: 20
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib29
  article-title: AIWAC: affective interaction through wearable computing and cloud technology
  publication-title: Wirel. Commun. IEEE
  doi: 10.1109/MWC.2015.7054715
– volume: 18
  start-page: 489
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib35
  article-title: Recent trends on mobile computing and future networks
  publication-title: Pers. Ubiquitous Comput.
  doi: 10.1007/s00779-013-0682-y
– ident: 10.1016/j.jnca.2017.02.001_bib154
  doi: 10.1007/978-3-319-40253-6_24
– volume: 68
  start-page: 320
  year: 2017
  ident: 10.1016/j.jnca.2017.02.001_bib71
  article-title: Design of a provably secure biometrics-based multi-cloud-server authentication scheme
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.10.004
– volume: 60
  start-page: 95
  year: 2016
  ident: 10.1016/j.jnca.2017.02.001_bib110
  article-title: Web application protection techniques: a taxonomy
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2015.11.017
– ident: 10.1016/j.jnca.2017.02.001_bib106
  doi: 10.1109/CSNT.2015.288
– volume: 53
  start-page: 80
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib47
  article-title: Mobile code offloading: from concept to practice and beyond
  publication-title: Commun. Mag. IEEE
  doi: 10.1109/MCOM.2015.7060486
– ident: 10.1016/j.jnca.2017.02.001_bib72
  doi: 10.1109/MobileCloud.2015.30
– start-page: 411
  year: 2012
  ident: 10.1016/j.jnca.2017.02.001_bib115
  article-title: secure mobile cloud computing
  publication-title: Handb. Secur. Cyber-Phys. Crit. Infrastruct.
  doi: 10.1016/B978-0-12-415815-3.00016-9
– volume: 31
  start-page: 82
  year: 2014
  ident: 10.1016/j.jnca.2017.02.001_bib4
  article-title: On protecting data storage in mobile cloud computing paradigm
  publication-title: IETE Tech. Rev.
  doi: 10.1080/02564602.2014.891382
– ident: 10.1016/j.jnca.2017.02.001_bib118
  doi: 10.1109/PCCC.2014.7017041
– ident: 10.1016/j.jnca.2017.02.001_bib36
  doi: 10.1145/2470654.2481330
– ident: 10.1016/j.jnca.2017.02.001_bib57
  doi: 10.1109/INM.2015.7140340
– ident: 10.1016/j.jnca.2017.02.001_bib80
  doi: 10.1145/1882486.1882493
– start-page: 143
  year: 2015
  ident: 10.1016/j.jnca.2017.02.001_bib86
SSID ssj0006493
Score 2.5701551
SecondaryResourceType review_article
Snippet The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be...
SourceID swepub
crossref
elsevier
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 38
SubjectTerms Cloud computing
Computational offloading
Distribuerade datorsystem
Mobile computing
Pervasive Mobile Computing
Security and privacy
Virtualization
Title Security and privacy challenges in mobile cloud computing: Survey and way ahead
URI https://dx.doi.org/10.1016/j.jnca.2017.02.001
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62082
Volume 84
WOSCitedRecordID wos000398007200004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1095-8592
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0006493
  issn: 1095-8592
  databaseCode: AIEXJ
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lc9MwENaElgMcChQ6tDxGBzh53Ilfss3NQBleLcy0ZHLTSLICDo4d0jh0-An8alaW5Lhl2qEHLk7GiWQ735fdtbz7LULPhEiDSR5LuE1NhRuCg3K54KkbBOAOA58lUZtEM_oYHx0l43H6eTD4bWthVmVcVcnZWTr_r1DDPgBblc5eA-5uUtgB7wF02ALssP0n4I9NRzojAVCsVEN3YXumtOmvs5qDMXBEWTdtUdu8sXXPx81iJfXQnwxewVSf6-TZi18rnUBuC-Pa3hBO_3l4h6WiWrt6c9h8Y7MZy52X7Mc6Kzj7pWl2mO87GW9K5wMr2cx-OmKnRcm-62zATC30w4763GoFeEAlixj1DOwwCcEraglJa4GTsGdCtdiLccZaYPovM69XHKb7U7Xsow6jdVe9tVOzD_Iv-LouA9Emt02pmoOqOejQVxl-N9CmH0cpWMjN7N3B-H3n10mYmnINfQWmBEtnC148k0vDnL4ebRvDnNxFWwY8nGnS3EMDWW2jO7axBzZ2fhvd7qlU3kefLKMwQI0No_CaUbiosGYUbhmFO0a9wJpP7UDgE2759AB9eXNw8uqta_pwuCII4qXLEyIYE4IIjw8Jg6DWl3CpEQTnMg-iPPAnuRS5DCMvz4eE-ylPJNzIE49A8MOHwQ7aqOpKPkRYKWklhHlCJS_Hk4DzUIS5kNwXIfG8eBd59mejwojUq14pJb0csF3kdGPmWqLlym9HFg1qgkwdPFIg15XjnmvoumMoYfbXxSij9eIrLZcNJT7E03vXOptH6Nb6X_IYbSwXjXyCborVsjhdPDUM_ANfCKz4
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+privacy+challenges+in+mobile+cloud+computing%3A+Survey+and+way+ahead&rft.jtitle=Journal+of+network+and+computer+applications&rft.au=Mollah%2C+Muhammad+Baqer&rft.au=Azad%2C+Md.+Abul+Kalam&rft.au=Vasilakos%2C+Athanasios&rft.date=2017-04-15&rft.issn=1084-8045&rft.volume=84&rft.spage=38&rft.epage=54&rft_id=info:doi/10.1016%2Fj.jnca.2017.02.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jnca_2017_02_001
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1084-8045&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1084-8045&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1084-8045&client=summon