A Security Perspective on Adoption and Migration to Mobile Cloud Technology

Mohammad Ghudayyer - Prince Sultan University, Riyadh, KSA.
Yasir Javed - Prince Sultan University, Riyadh, KSA.
Mamdouh Alenezi - Prince Sultan University, Riyadh, KSA.


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.1.4.54

Abstract


Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.


Full Text:

PDF

References


IDC 2015 International Data Corporation, report 2015 available at http://www.idc.com/research/Predictions15/index.jsp

Krishnan, R. (2017). Security and Privacy in Cloud Computing.

Gasparis, I. (2017). Ensuring Users' Privacy and Security on Mobile Devices(Doctoral dissertation, University of California, Riverside).

Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, 1-24.

Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications.

Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing (IJCAC), 7(1), 1-31.

Gupta, S., & Gupta, B. B. (2017). Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1-43.

Amrutkar, C., Traynor, P., & Van Oorschot, P. C. (2012, September). Measuring SSL indicators on mobile browsers: Extended life, or end of the road?. In International Conference on Information Security (pp. 86-103). Springer, Berlin, Heidelberg.

Hosmer, C., Jeffcoat, C., Davis, M., & McGibbon, T. (2011). Use of mobile technology for information collection and dissemination. Data & Analysis Center for Software, 77.

Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.

Jouini, M., & Rabai, L. B. A. (2016). A Security Framework for Secure Cloud Computing Environments. International Journal of Cloud Applications and Computing (IJCAC), 6(3), 32-44.

De, D. (2016). Mobile cloud computing: architectures, algorithms and applications. CRC Press.

Alizadeh, M., Hassan, W. H., Behboodian, N., & Karamizadeh, S. (2013). A brief review of mobile cloud computing opportunities. Research Notes in Information Science, 12, 155-160.

Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337-368.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.

Yang, X., Pan, T., & Shen, J. (2010, July). On 3G mobile e-commerce platform based on cloud computing. In Ubi-media Computing (U-Media), 2010 3rd IEEE International Conference on (pp. 198-201). IEEE.

Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future generation computer systems, 29(1), 84-106.

Dai, J., & Zhou, Q. (2010, May). A PKI-based mechanism for secure and efficient access to outsourced data. In Networking and Digital Society (ICNDS), 2010 2nd International Conference on (Vol. 1, pp. 640-643). IEEE.

Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.

Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8.

Wang, W., Li, Z., Owens, R., & Bhargava, B. (2009, November). Secure and efficient access to outsourced data. In Proceedings of the 2009 ACM workshop on Cloud computing security (pp. 55-66). Acm.

Itani, W., Kayssi, A., & Chehab, A. (2010, December). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In Energy Aware Computing (ICEAC), 2010 International Conference on (pp. 1-2). IEEE.

Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., & Song, Z. (2010, October). Authentication in the clouds: a framework and its application to mobile users. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop (pp. 1-6). ACM.

Song, Z., Molina, J., Lee, S., Lee, H., Kotani, S., & Masuoka, R. (2009). Trustcube: An infrastructure that builds trust in client. In Future of Trust in Computing (pp. 68-79). Vieweg+ Teubner.

Catteddu, D., & Hogben, G. (2009). Cloud computing. Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2009).

Taylor, S., Young, A., Kumar, N., & Macaulay, J. (2011). The mobile cloud: When two explosive markets collide. Cisco Internet Business Solutions Group Tech. Rep.

Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.

Brunette, G., & Mogull, R. (2009). Security guidance for critical areas of focus in cloud computing v2. 1. Cloud Security Alliance, 1-76.