Open Access   Article Go Back

A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing

Santosh Kumar Sharma1 , Saurabh Jha2 , Nayan Chitransh3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1002-1005, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.10021005

Online published on Jul 31, 2018

Copyright © Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh, “A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1002-1005, 2018.

MLA Style Citation: Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh "A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing." International Journal of Computer Sciences and Engineering 6.7 (2018): 1002-1005.

APA Style Citation: Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh, (2018). A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing. International Journal of Computer Sciences and Engineering, 6(7), 1002-1005.

BibTex Style Citation:
@article{Sharma_2018,
author = {Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh},
title = {A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1002-1005},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2550},
doi = {https://doi.org/10.26438/ijcse/v6i7.10021005}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.10021005}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2550
TI - A Survey on Challenges and Its Possible Solutions in Mobile Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Santosh Kumar Sharma, Saurabh Jha, Nayan Chitransh
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1002-1005
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
485 284 downloads 235 downloads
  
  
           

Abstract

Mobile Cloud Computing is a technological platform through which we can share resources like platform, software application, infrastructure, business processes and so on using mobile phones. It is a platform which combines the advantages of Mobile Computing and Cloud Computing and also it suffers from the common drawbacks of Mobile Computing (such as battery utilization) and Cloud Computing (such as privacy and security). In this technology, a user needs not to worry about the high configuration of the mobile phone because all the computations are done at the cloud not on the mobile device. In this paper, we present a survey on the research which has been done on MCC including challenges and open research issues.

Key-Words / Index Term

Mobile Computing, Cloud Computing, Security, Offloading, Virtualization

References

[1] . J. McCarthy, “Life in the Cloud, Living with Cloud Computing”, Available: http://computinginthecloud.wordpress.com/2008/09/25/utility-cloudcomputingflashback-to-1961-prof-john-mccarthy/.
[2] Jitendra verma, C.P. Katti, “Study of Cloud Computing and its Issues: A Review”, Smart Computing Review, vol. 4, no. 5, October 2014.
[3] S. Deshmukh, and R. Shah, “Computation offloading frameworks in mobile cloud computing: a survey”, in IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), (pp. 1-5). March 2016.
[4] E. Cuervo, A. Balasubramanian, D. K. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, MAUI: Making smartphone last longer with code offload, in Proceedings of the Eighth International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, ACM, pp. 49–62,2010.
[5] H. Dinh, T. C. Lee, D. Niyato and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches”,Wireless communications and mobile computing, 13(18), pp. 1587-1611, 2013.
[6] S. Bera, S. Misra and J. J Rodrigues”,Cloud computing applications for smart grid: A survey, ” IEEE Transactions on Parallel and Distributed Systems, 26(5), pp. 1477-1494, 2015.
[7] G. Gao, W. Zhang, Y. Wen, Z. Wang and W. Zhu”,Towards cost-efficient video transcoding in media cloud: Insights learned from user viewing patterns”,IEEE Transactions on Multimedia, 17(8), pp.1286-1296, 2015.
[8] W. Zhao, Y. Sun and L, Dai,“Improving computer basis teaching through mobile communication and cloud computing technology”,in IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 1, pp. V1-452, August 2010.
[9] G. Nan,.Z. Mao, M. Yu, M. Li, H. Wang and Y.Zhang, “Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks”,IEEE Systems Journal, 8(1), pp. 256-267. 2014.
[10] W. Cai and V. C Leung”,Decomposed cloud games: Design principles and challenges”,in IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 1-4, July 2014.
[11] K. E Psannis, S. Xinogalos and A. Sifaleras”,Convergence of Internet of things and mobile cloud computing”,Journal Systems Science & Control Engineering, 2(1), pp. 476-483. 2014.
[12] A. Botta, W. De Donato, V. Persico and A. Pescapé”,Integration of cloud computing and internet of things: a survey “,Future Generation Computer Systems, 56, pp. 684-700, 2016.
[13] A. Ellouze, M. Gagnaire and A. Haddad, “ mobile application offloading algorithm for mobile cloud computing”,in 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 34-40, March 2015.
[14] X. Chen, L, Jiao, W. Li, and X. Fu”, Efficient multi-user computation offloading for mobile-edge cloud computing”, IEEE/ACM Transactions on Networking, 24(5), pp. 2795-2808. 2016.
[15] Y. Jun, L. Shan and X. Lizhen”,Research of cache mechanism in mobile data management”,in IEEE Conference on Web Information Systems and Applications (WISA), pp. 159-162, November 2012.
[16] H. Mao, N. Xiao, W. Shi and Y. Lu”,Wukong: A cloud-oriented file service for mobile Internet devices”,Journal of Parallel and Distributed Computing, 72(2), pp. 171-184, 2012.
[17] Cho, E.,Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks. In ACM SIGKDD international conference on knowledge discovery and data mining, pp. 1082–1090.
[18] Stuedi, P., Mohomed, I.,&Terry, D. (2010).Wherestore: Location-based data storage for mobile devices interacting with the cloud. In ACM workshop on mobile cloud computing and services: Social networks and beyond, pp. 1–8.
[19] Rai, A., Bhagwan, R., & Guha, S. Generalized resource allocation for the cloud. In ACM symposium on cloud computing, pp. 15:1–15:12.
[20] He, Y., Elnikety, S., Larus, J., & Yan, C. (2012). Zeta: Scheduling interactive services with partial execution. In ACM symposium on cloud computing, pp. 1–14.
[21] . X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham and S. Jeong, “ Securing elastic applications on mobile devices for cloud computing, ” in proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127-134, November 2009.
[22] V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M. K. Khan and K. K. R Choo,“ Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment, ” Computer Standards & Interfaces, May 2016.
[23] M.Qiu, K. Gai, B.Thuraisingham, L. Tao, and H. Zhao, H”, Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry”, Future Generation Computer Systems, February 2016.
[24] M.Sookhak, A. Gani, M. K. Khan and R. Buyya,“Dynamic remote data auditing for securing big data storage in cloud computing”,Information Sciences, 380, pp. 101-116. 2017.
[25] Y. Yu, Y. Li, M. H. Au,., W. Susilo, K. K. R. Choo and X Zhang,“Public cloud data auditing with practical key update and zero knowledge privacy, ” in Australasian Conference on Information Security and Privacy, pp. 389-405, July 2016.
[26] M. Louk, and H. Lim”,Homomorphic encryption in mobile multi cloud computing”,in IEEE International Conference on Information Networking (ICOIN), pp. 493-497, January 2015.
[27] H. Wang, S. Wu, M. Chen and W. Wang,“Security protection between users and the mobile media cloud”,IEEE Communications Magazine, 52(3), pp. 73-79, 2014.
[28] K.Zkik, G.Orhanou and S. El Hajji,“Secure scheme on mobile multi cloud computing based on homomorphic encryption”,in IEEE International Conference on Engineering & MIS (ICEMIS), pp. 1-6 September 2016.
[29] S. K.Pasupuleti, S. Ramalingam and R. Buyya, “An efficient and secure privacy preserving approach for outsourced data of resource constrained mobile devices in cloud computing”, Journal of Network and Computer Applications, 64, pp. 12-22. 2016.
[30] B.Niu, Q. Li, X. Zhu, G.Cao and H. Li,“Enhancing privacy through caching in location-based services”,in IEEE Conference on Computer Communications (INFOCOM), pp. 1017-1025, April 2015.
[31] M.Chen, W. Li, Z. Li, , S. Lu and D. Chen,“Preserving location privacy based on distributed cache pushing”,in IEEE Wireless Communications and Networking Conference (WCNC), pp. 3456-3461, April 2014.
[32] H. Zhang, N. Yu and Y. Wen,“Mobile cloud computing based privacy protection in location-based information survey applications”,Security and Communication Networks, 8(6), pp. 1006-1025, 2015.
[33] N. M. Dhanya and G. Kousalya,“Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing,“in International Symposium on Security in Computing and Communication, pp. 45-53, August 2015.
[34] W. Wang, Z. Li, R. Owens and B.Bhargava,“Secure and efficient access to outsourced data”,in Proceedings of the ACM workshop on Cloud computing security, pp. 55-66, November 2009.
[35] J.Tan, R.Gandhi and P. Narasimhan”,STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications”,in 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 644-649, December 2014.
[36] Q. Xiu-feng, L.Jian-Wei and Z. Peng-Chuan,“Secure cloud computing architecture on mobile internet”,in 2nd IEEE International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 619-622, August 2011.
[37] S. Dey, S. Sampalli and Q. Ye,“A context-adaptive security framework for mobile cloud computing”, in 11th International Conference on Moile Ad-hoc and Sensor Networks (MSN), pp. 89-95, December 2015.
[38] S.Singh, P. K.Sharma and J. H. Park,“A Security Model for Protecting Virtualization in Cloud Computing”,in International Conference on Computer Science and its Applications, pp. 385-388, December 2016
[39] D.Sgandurra and E. Lupu”,Evolution of attacks, threat models, and solutions for virtualized systems”,ACM Computing Surveys (CSUR), 48(3), pp. 46. 2016.
[40] N. Paladi, C. Gehrmann and A. Michalas, “Providing user security guarantees in public infrastructure clouds”,IEEE Transactions on Cloud Computing, pp.1-1, 2016.
[41] A. Arabo and B. Pranggono,“Mobile malware and smart device security: Trends, challenges and solutions”,in 19th IEEE International Conference on Control Systems and Computer Science (CSCS), pp. 526-531, May 2013.
[42] J. Walls and K. K. R Choo,“A Review of Free Cloud-Based Anti-Malware Apps for Android”,in IEEE Trustcom/BigDataSE/ISPA, 1, pp. 1053-1058, August 2015.
[43] J. Imgraben, A.Engelbrecht, and K. K. R Choo,“Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users”,Behaviour & Information Technology, 33(12), pp.1347-1360, 2014.