2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583635
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy in mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
55
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(56 citation statements)
references
References 13 publications
1
55
0
Order By: Relevance
“…The involvement of third parties when utilising cloud computing with mobile further complicates the issue at hand. In the following, we review some of the possible security mechanisms As stated by Suo, et al in [10] any sensitive data used in transmission or storage in MCC to the cloud needs to be in cipher form to prevent it from being leaked. However, this will also decrease the utilization rate of the data, therefore attention will be given to efficiently analysing and processing the cipher text.…”
Section: Risk Of Data Stored and Processed In Multiple Locationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The involvement of third parties when utilising cloud computing with mobile further complicates the issue at hand. In the following, we review some of the possible security mechanisms As stated by Suo, et al in [10] any sensitive data used in transmission or storage in MCC to the cloud needs to be in cipher form to prevent it from being leaked. However, this will also decrease the utilization rate of the data, therefore attention will be given to efficiently analysing and processing the cipher text.…”
Section: Risk Of Data Stored and Processed In Multiple Locationsmentioning
confidence: 99%
“…Currently, MCC is a very hot topic of discussion in the technology world as well as in academia [10]. The IT industry highly anticipates that Mobile Cloud Computing will have a drastic effect on people's life styles and work patterns in a future networked world [11].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, only a few effective methods assisting dynamic testing management for a new distributed development paradigm, as typified by the open source projects, have been presented [8][9][10]. Furthermore, several research works [11][12][13][14][15] are based on the area of cloud computing and mobile clouds. However, these papers focus on security, service optimization, secure control, resource allocation technique, etc.…”
Section: Related Researchmentioning
confidence: 99%
“…In mobile cloud computing applications security and privacy are the key issues and still face some enormous challenges [18]. User's privacy and integrity of data or applications is one of the key issues in securing mobile cloud computing.…”
Section: Mobile Cloud Computing Securitymentioning
confidence: 99%