2013
DOI: 10.1016/j.future.2012.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Towards secure mobile cloud computing: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
125
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 311 publications
(137 citation statements)
references
References 59 publications
0
125
0
2
Order By: Relevance
“…In this paper, we focus on the network environment of MCC, which is considered to be a viable solution to implement fast, large-scale big data applications [11,34]. A typical MCC architecture, which consists of a mobile client network, a wireless mesh backbone network and a cloud service platform, is depicted in Fig.…”
Section: A Network Modelmentioning
confidence: 99%
“…In this paper, we focus on the network environment of MCC, which is considered to be a viable solution to implement fast, large-scale big data applications [11,34]. A typical MCC architecture, which consists of a mobile client network, a wireless mesh backbone network and a cloud service platform, is depicted in Fig.…”
Section: A Network Modelmentioning
confidence: 99%
“…Autonomic computing manage applications execution in dynamically changing and unpredictable environments without any user's manual intervention [15,102,109] by regularly checking and monitoring the changing conditions automatically. Mobile computing extends the computing facilities to the smart mobile devices in order to enhance their capabilities on demand for accommodating computational-and storage-intensive applications [1,15,59,111,118].…”
Section: Immediate Extension Of Grid Resource Managementmentioning
confidence: 99%
“…Cloud is a service oriented platform that provides three types of basic services at different levels: The user requests a service through QoS parameters which are recorded in a predefined SLA. The objective of delivering the three types of services is to give a facility to the users to use existing softwares, platforms, and infrastructures on the fly without investing in new ones and wasting capacities in personnel trainings [59].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Users release their location in order to experience personalized/customized services (such as friend-seeker and navigation service). However, location sharing may introduce a new class of privacy threats ranging from localizing an individual to profiling and identifying him based on the places he visits [1,2] in mobile social networks.…”
Section: Introductionmentioning
confidence: 99%