2017
DOI: 10.1016/j.jnca.2017.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy challenges in mobile cloud computing: Survey and way ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
109
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 225 publications
(110 citation statements)
references
References 125 publications
1
109
0
Order By: Relevance
“…Mollah et al [6] explain the three junctions of the security of online data transfer; security of the users' devices, server security, and the security of communication paths. Most of data attacks are happen at the communication path [12], which represents the wire or wireless connection between the server and the users' devices.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Mollah et al [6] explain the three junctions of the security of online data transfer; security of the users' devices, server security, and the security of communication paths. Most of data attacks are happen at the communication path [12], which represents the wire or wireless connection between the server and the users' devices.…”
Section: Related Workmentioning
confidence: 99%
“…The researchers propose several security methods to improve the security level of the transfer data via the online connections. The symmetric and asymmetric data encryption methods are effective to secure the textual plain data [6,7,13]. Although the data encryption is not expensive earthier in time or money, the symmetric and asymmetric is not effective for the large volume data such as images, audio or video.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…II. CONVENTIONAL METHOD This overviews cloud computing securityprivacy protection, dealswith it various techniques and approaches, focal point provide cloud computing privacy protection security environment [9]. ZhiyuanYin et al, 2017 [7] deliberate privacy problems anxious cloud computing technology.…”
Section: Gs Parimalam Mgobimentioning
confidence: 99%
“…Mollah et al, 2017 [9] provides an various and different approaches based on the diffihalamaman encryption based cloud storage in data field environment in this part both encryption and decryption very essential part of recommendation conversion. Ye, J et al, 2016 [10] improve how to manage the security issues concerned with cloud computing, it has some security threats in the finite fieldset.…”
Section: Gs Parimalam Mgobimentioning
confidence: 99%