2015 Fifth International Conference on Communication Systems and Network Technologies 2015
DOI: 10.1109/csnt.2015.288
|View full text |Cite
|
Sign up to set email alerts
|

Security in CloneCloud for Mobile Cloud Computing

Abstract: Mobile Cloud Computing is an emerging technology in IT world. With the increasing demand of mobile users in terms of security, resources and computing power leads to necessity of accessing cloud resources in mobile device. Though there are some limitations in smartphones such as limited computing power and energy resources as compared to desktops. CloneCloud can be used as a solution to migrate the applications from mobile device to the clone over cloud. This will speed up the execution and reduce energy consu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The larger the key, the higher the level of security [17]. However, it's essential to select the appropriate key length, taking into account specific security requirements, computational resources, and cryptographic approach [18]. Staying abreast of recommended key sizes is crucial, given the rapid advancements in computing technology, to ensure an unbreakable encryption strategy.…”
Section: B Containers Data Protection In the Cloudmentioning
confidence: 99%
“…The larger the key, the higher the level of security [17]. However, it's essential to select the appropriate key length, taking into account specific security requirements, computational resources, and cryptographic approach [18]. Staying abreast of recommended key sizes is crucial, given the rapid advancements in computing technology, to ensure an unbreakable encryption strategy.…”
Section: B Containers Data Protection In the Cloudmentioning
confidence: 99%
“…Recent research has discussed approaches like platform diversity to reduce the cyber risks of Internet-connected systems [18]. Studies have also evaluated tailored encryption schemes and adaptive authentication methods for resource-constrained SCADA [19]. As attacks grow more sophisticated, research continuously works to enhance the resiliency of modernized SCADA infrastructure against both current and emerging threats.…”
Section: Cybersecurity Risks Of Scadamentioning
confidence: 99%
“…We normalize the amount of input and output data of each neuron to 1. Then we can get some specific sample points of tuple (𝑆 𝑛 , 𝐷 𝑛 off ) as (6,15), (5,10), (4,6), (3,3) and (2,1) as shown in Fig. 3(b).…”
Section: Un-offloaded Part Executed By Ue Offloaded Part Executed By ...mentioning
confidence: 99%
“…MEC normally assumes that all the users' programs and running environments should be pre-installed on edge servers in the form of virtual machines (VMs) [5] or mobile clones [6]. Recently, with the development of network function virtualization (NFV), flexible storage and service resource scheduling have made MEC more widely deployed in computation-centric networks [7] [8] [9].…”
Section: Introductionmentioning
confidence: 99%