CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Privacy and Security in Mobile Cloud Computing: Review

by Sapna Malik, M. M Chaturvedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 11
Year of Publication: 2013
Authors: Sapna Malik, M. M Chaturvedi

Sapna Malik, M. M Chaturvedi . Privacy and Security in Mobile Cloud Computing: Review. International Journal of Computer Applications. 80, 11 ( October 2013), 20-26. DOI=10.5120/13906-1833

@article{ 10.5120/13906-1833,
author = { Sapna Malik, M. M Chaturvedi },
title = { Privacy and Security in Mobile Cloud Computing: Review },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 11 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { },
doi = { 10.5120/13906-1833 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T21:54:17.601575+05:30
%A Sapna Malik
%A M. M Chaturvedi
%T Privacy and Security in Mobile Cloud Computing: Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 11
%P 20-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA

Mobile cloud computing is computing of Mobile application through cloud. As we know market of mobile phones is growing rapidly. According to IDC, the premier global market intelligence firm, the worldwide Smartphone market grew 42. 5% year over year in the first quarter of 2012. With the growing demand of Smartphone the demand for fast computation is also growing. Inspite of comparatively more processing power and storage capability of Smartphone's, they still lag behind Personal Computers in meeting processing and storage demands of high end applications like speech recognition, security software, gaming, health services etc. Mobile cloud computing is an answer to intensive processing and storage demand of real-time and high end applications. Being in nascent stage, Mobile Cloud Computing has privacy and security issues which deter the users from adopting this technology. This review paper throws light on privacy and security issues of Mobile Cloud Computing.

  1. IDC global market intelligence firm (2011, Dec) Worldwide Smartphone 2011-2015 forecast [Online] Available: http://www. idc. com.
  2. Marston S. , Li Z. , Bandyopadhyay S. , Zhang J. and Ghalsasi A. ,2011 ,Cloud Computing – The business perspective. Decision Support Systems, vol. 51, Issue 1, 176-189.
  3. Satyanarayanan, M. , . Bahl P, Caceres R. and , Davies N. 2009, The case for VM based cloudlet in mobile computing . In proceeding of IEEE Pervasive Computing ,14-23 .
  4. Niroshinie Fernando , Seng W, Loke Wenny, Rahayu. "Mobile Cloud Computing: A Survey," published in Journal of Future Generation System ,Vol 29,issue 1,2013,January,2013,pp. 84-106
  5. Daniela POPA ,Marcel Cremene ,Monika Borda,Karima Boudaoud ," A Security Framework for Mobile Cloud Applications," published in IEEE 11th Roedunet International Conference,2013,pp. 1-4.
  6. India Knowledge@Wharton (2013,june 13) Mobile's Dramatic Growth in India Spurs a New Era of E- commerce,[Online],Available: http://knowledge. wharton. upenn. edu/india/article. cfm?articleid=4739. l
  7. K. Raghu (2008, Sept 24). IBM's India Lab to Innovate Cloud Computing Solutions, [Online] Available: www. livemint. com/2008/09/24222631/IBM8217s-India-lab-to-innov. html.
  8. Nir ksshetri ," Cloud Computing in India" published in IEEE Computer Society,2012
  9. Times of India, C. Gopalakrishnan (2011,29 Sept). How Cloud Technology Can Help You Spot Fake Drugs,[Online],Available : http://timesofindia. indiatimes. com/tech/personal-tech/computing/How-cloud-technologycan-help-you-spot-fake-drugs/articleshow/10168266. cms
  10. Oberheide, J. , Veeraraghavan, K. , Cooke, E. and Jahanian, F. 2008,Virtualized in-cloud security services for mobile devices. In Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt),31-35.
  11. Zhang, X. , Schiffman, J. ,. Gibbs S, Kunjithapatham, A. , and Jeong S. 2009,Securing elastic applications on mobile devices for cloud computing. In Proceeding ACM workshop on Cloud computing security, CCSW '09, Chicago, IL, USA.
  12. Xiao, S. and Gong ,W. ,2010. Mobility can help: protect user identity with dynamic credential. In Proceeding 11th International Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010.
  13. Wang, S . and S. Wang X. ," In-device spatial cloaking for mobile user privacy assisted by the cloud", in Proceeding 11th Interantional Conference on Mobile Data Management,MDM '10, Missouri, USA, May 2010.
  14. D. Huang, X. Zhang, M. Kang and J. Luo," MobiCloud: building secure cloud framework for mobile computing and communication," in Proceeding 5th IEEE International Symposium on Service Oriented System Engineering, SOSE '10, Nanjing, China, June 2010.
  15. G. Portokalidis,P. Homburg,K. Anagnostakis and H. Bos,"Paranoid Android: versatile protection for smartphones," in Proceedings of the 26th Annual Computer Security Application Conference (ACSAC), September 2010,pp. 347-356,
  16. H. Zhangwei. and X. Mingjun," Distributed Spatial Cloaking Protocol for Location Privacy," in Proceedings of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), vol. 2,June 2010, pp. 468.
  17. P. Zou, C. Wang, Z. Liu , and D. Bao, " Phosphor: A Cloud Based DRM Scheme with Sim Card," in Proceedings of the 12th International Asia-Pacific on Web Conference (APWEB), June 2010,pp. 459.
  18. R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi and Z. Song," Authentication in the clouds: a framework and its application to mobile users," in Proceeding ACM Cloud Computing Security Workshop, CCSW '10, Chicago, USA,Oct. 2010.
  19. W. Itani, A. Kayssi, and A. Chehab," Energy-efficient incremental integrity for securing storage in mobile cloud computing," in Proceeding International Conference on Energy Aware Computing, ICEAC '10, Cairo, Egypt, Dec. 2010.
  20. W. Jia, H. Zhu, Z. Cao, L. Wei and X. Lin," SDSM: a secure data service mechanism in mobile cloud computing," in Proceeding IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr. 2011.
  21. D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong," Secure data processing framework for mobilecloud computing," in Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM '11, Shanghai, China, June 2011.
  22. S. C. Hsueh, J. Y. Lin and M. Y. Lin," Secure cloud storage for conventional data archive of smart phones " in Proceeding 15th IEEE International Symposium on Consumer Electronics ,ISCE '11, Singapore, June 2011.
  23. J. Yang, H. Wang, J. Wang, C. Tan and D. Yu1, "Provable data possession of resource constrained mobile devices in cloud computing," Journal of Networks ,2011,pp. 1033–1040.
  24. Y. J. Chen and L. C. Wang," A security framework of group location-based mobile applications in cloud computing," in Proceeding. International Conference on Parallel Processing Workshops, ICPPW '11, Taipei, Taiwan, Sep. 2011
  25. W. Ren, L. Yu, R. Gao and F. Xiong," Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing," Journal of Tsinghua Science and Technology,2011,pp. 520–528.
  26. Z. Zhou and D. Huang," Efficient and secure data storage operations for mobile cloud computing," IACR Cryptology, 2011,ePrint Archive: 185.
  27. Saman Zonouz, Amir Houmansadr, Robin barthier, Nikita Borisov,William Sanders,"Secloud:A cloud based comprehensive and lightweight security solution for smartphones," published in Science Direct journal of Computers and security ,Volume 37, 2013, pp. 215-227.
  28. Han Qi and Addullah Gani," Research on mobile Cloud Computing:review,trend and Perspectives" in preceding of IEEE second international Conference on Digital information Technology & its application,2012,pp. 195-201.
  29. Paramvir Bahl,Richard Y. Han,Li Erran Li,Mahadev Satyanarayanan,"Advacing the state of Mobile Cloud Computing," in preceding of the third ACM workshop on Mobile cloud computing and services, New York,USA,2012,pp. 21-28
  30. Wei Tang, Jun-hyung Lee, Biao Song,Motaharul Islam,Sangho Na,Eui-Nam Huh,"Multi-Platform Mobile Thin Client Architecture in Cloud Environment" in Precedia Environmental Science, Volume 11,Part A,2011,pp. 499-504
Index Terms

Computer Science
Information Sciences


Cloud computing Mobile Cloud Computing Privacy Security M-Commerce.