Mobile Cloud Computing: A Survey on Current Security Trends and Future Directions †
Abstract
:1. Introduction
2. Literature Review
3. Methodology
3.1. Mobile Cloud Computing (MCC)
3.2. The Architecture of MCC
- Access point: with the help of WI-FI devices
- Mobile network service: with the help of mobile communication networks like 3G, 4G, and 5G.
3.3. Advantages of MCC
3.4. Limitations of MCC
3.5. Challenges of MCC
4. Discussion
4.1. Work on MCC after COVID-19
4.2. 5G Impact on MCC
5. Result
6. Future Work and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jegadeesan, S.; Azees, M.; Kumar, P.M.; Manogaran, G.; Chilamkurti, N.; Varatharajan, R.; Hsu, C.H. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain. Cities Soc. 2019, 49, 101522. [Google Scholar] [CrossRef]
- Almusaylim, Z.A.; Jhanjhi, N.Z. Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing. Wirel. Pers. Commun. 2020, 111, 541–564. [Google Scholar] [CrossRef]
- Shabbir, M.; Shabbir, A.; Iwendi, C.; Javed, A.R.; Rizwan, M.; Herencsar, N.; Lin, J.C.W. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 2021, 9, 8820–8834. [Google Scholar] [CrossRef]
- Oh, E.N.; Baharon, M.R.; Yassin, S.M.W.M.S.M.M.; Idris, A.; MacDermott, A. Preserving Data Privacy in Mobile Cloud Computing using Enhanced Homomorphic Encryption Scheme. J. Phys. Conf. Ser. 2022, 2319, 012024. [Google Scholar] [CrossRef]
- Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A. Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. J. Inf. Secur. Appl. 2020, 55, 102582. [Google Scholar] [CrossRef]
- Akbar, A.; Lewis, P.R.; Wanner, E. A self-aware and scalable solution for efficient mobile-cloud hybrid robotics. Front. Robot. AI 2020, 7, 102. [Google Scholar] [CrossRef] [PubMed]
- AlAhmad, A.S.; Kahtan, H.; Alzoubi, Y.I.; Ali, O.; Jaradat, A. Mobile cloud computing models security issues: A systematic review. J. Netw. Comput. Appl. 2021, 190, 103152. [Google Scholar] [CrossRef]
- Maray, M.; Shuja, J. Computation offloading in mobile cloud computing and mobile edge computing: Survey, taxonomy, and open issues. Mob. Inf. Syst. 2022, 2022, 1121822. [Google Scholar] [CrossRef]
- Abidin, S.; Swami, A.; Ramirez-Asís, E.; Alvarado-Tolentino, J.; Maurya, R.K.; Hussain, N. Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC). Mater. Today Proc. 2022, 51, 508–514. [Google Scholar] [CrossRef]
- Ali, A.; Iqbal, M.M. A cost and energy efficient task scheduling technique to offload microservices based applications in mobile cloud computing. IEEE Access 2022, 10, 46633–46651. [Google Scholar] [CrossRef]
- Sheth, H.S.K.; Tyagi, A.K. Mobile cloud computing: Issues, applications and scope in COVID-19. In Intelligent Systems Design and Applications; Springer International Publishing: Cham, Switzerland, 2022. [Google Scholar]
- Irshad, A.; Chaudhry, S.A.; Shafiq, M.; Usman, M.; Asif, M.; Ghani, A. A provable and secure mobile user authentication scheme for mobile cloud computing services. Int. J. Commun. Syst. 2019, 32, e3980. [Google Scholar] [CrossRef]
- Elmeadawy, S.; Shubair, R.M. 6G wireless communications: Future technologies and research challenges. In Proceedings of the 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, United Arab Emirates, 19–21 November 2019. [Google Scholar]
Ref. | Technique | Security | Application | Architecture | Algorithms | Data Storage | Methodology Type |
---|---|---|---|---|---|---|---|
[1] | ✓ | ✓ | ✓ | n/a | ✓ | n/a | Trusted third party (TTP) |
[2] | ✓ | ✓ | ✓ | ✓ | ✓ | n/a | Homomorphic encryption technique |
[3] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Enciphering scheme, Modular Encryption Standard |
[4] | ✓ | ✓ | n/a | ✓ | ✓ | ✓ | Homomorphic cryptosystem technique. |
[5] | ✓ | ✓ | ✓ | ✓ | n/a | ✓ | CI-based IDs |
[6] | ✓ | n/a | ✓ | n/a | ✓ | n/a | Multi-objective optimization (MOO) algorithm |
[7] | ✓ | ✓ | ✓ | n/a | n/a | n/a | Client-to-client authentication, RQ models |
[8] | ✓ | ✓ | ✓ | ✓ | ✓ | n/a | Computation offloading, Mobile edge computing (MEC) |
[9] | ✓ | ✓ | ✓ | ✓ | ✓ | n/a | Quantum cryptography application |
[10] | ✓ | n/a | ✓ | ✓ | ✓ | ✓ | Task scheduling and microservice-based computational offloading (TSMCO) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sheikh, B.; Butt, A.; Hanif, J. Mobile Cloud Computing: A Survey on Current Security Trends and Future Directions. Eng. Proc. 2023, 32, 22. https://doi.org/10.3390/engproc2023032022
Sheikh B, Butt A, Hanif J. Mobile Cloud Computing: A Survey on Current Security Trends and Future Directions. Engineering Proceedings. 2023; 32(1):22. https://doi.org/10.3390/engproc2023032022
Chicago/Turabian StyleSheikh, Bisma, Ayesha Butt, and Javeria Hanif. 2023. "Mobile Cloud Computing: A Survey on Current Security Trends and Future Directions" Engineering Proceedings 32, no. 1: 22. https://doi.org/10.3390/engproc2023032022