№1, 2018


Rasid G.Alakbarov, Ogtay R. Alakbarov

This article investigates security and privacy issues on cloud platforms used in mobile cloud computing. Threats arisen from users' data protection and network security in mobile cloud computing are analyzed. At the same time, the article analyzes information security in mobile cloud computing, confidentiality, location and displacement of data, completeness of data, cyber attacks. Scientific-theoretical problems of security and privacy issues of mobile cloud computing are investigated and the status of researches in this direction is analyzed (pp.83-91).

Keywords: mobile computing cloud, mobile equipment, information security, confidentiality, cyber attacks, computing and memory resources, computing clouds, virtual machine, cloud services.
  • Gayathri M.R., Srinivas K. A Survey on Mobile Cloud Computing Architecture, Applications and Challenges // International Journal of Scientific Research Engineering & Technology, 2014, vol.3, no.6, pp.1013–1021.
  • Qi H., Gani A. Research on mobile Cloud Computing: review, trend and perspectives / Proceeding of IEEE second international Conference on Digital Information Technology & its application, 2012, pp.195–201.
  • Xiao Z., Xiao Y. Security and Privacy in Cloud Computing // IEEE Communications Surveys & Tutorials, 2013, vol.15, no.2, pp.843–859.
  • Gopichand M. An Overview of Security and Privacy Issue in Mobil Cloud Computing Environment // International Jornal of Advanced Researc in Computer Science and Software Engineering, 2016, vol.6, no.5, pp.779–784.
  • Hlavacs H., Treutner T., Gelas J.P., Lefevre L. Orgerie A.C. Energy consumption side-channel attack at virtual machines in a cloud / IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), 2011, pp.605–612.
  • Caytiles, Lee S. Security considerations for Public Mobile Cloud Computing // International Journal of Advanced Science and Technology, 2012, vol.44, pp.81–88.
  • Chen Y., Paxson V., Katz R.H. What's New About Cloud Computing Security? Electrical Engineering and Computer Sciences University of California at Berkeley.Technical Report, no. UCB/EECS-2010-5, 2010, pp.1–8.
  • Chen Y.J., Wang L.C. A security framework of group location-based mobile applications in cloud computing / Proceeding International Conference on Parallel Processing Workshops, (ICPPW’11), 2011, pp.184–190.
  • Subashini S., Kavitha V. A survey on security issues in service deliverymodels of cloud computing // Journal of Network and Computer Applications, 2011, vol.34, pp.1–11.
  • Fernando N., Seng L.W., Rahayu L. Mobile Cloud Computing: A Survey // Journal of Future Generation Systems, 2013, vol.29, no.1, pp.84–106.
  • Donald A., Oli S., Arockiam L. Mobile cloud security issues and challenges: A perspective // International Journal of Engineering and Innovative Technology, 2013, vol.3, no.1, pp.401.
  • Sarrab M. Mobile Cloud Computing: Security Issues and Considerations // Journal of Advances in Information Technology, 2015, vol.6, no.4, pp.248–251.
  • Collings R. Mobile Cloud Adoption Challenges in the Enterprise. http://cloudcomputingtopics.com/2012/04/mobile-cloud-adoption-challenges-in-theenterprise/
  • Dinh H.T., Lee C., Niyato D., Wang P. A survey of mobile cloud computing: Architecture, applications, and approaches // Wireless Communications and Mobile Computing, 2013, vol.13, no.18, pp.1587–1611.
  • Bahar A., Habib A., Islam M. Security architecture for mobile cloud computing // International Journal of Scientific Knowledge Computing and Information Technology, 2013, vol.3, no.3, pp.11–17.
  • Jashizume K. H., Rosado D., Fernandez-Medina E., Eduardo B. An analysis of security issues for cloud computing // Journal of Internet Services and Applications, 2013, vol.4, no.5, pp.1–13.
  • Schoo P., Fusenig V., Souza V., Melo M., Murray P., Debar H., Medhioub H., Zeghlach D. Challenges for Cloud Networking Security / 2nd International ICST Conference on Mobile Networks and Management, 2010, pp.2–16.
  • Zhangwei H., Mingjun X. A Distributed Spatial Cloaking Protocol for Location Privacy / Proceedings of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010, vol.2, pp.468–471.
  • Zou P., Wang C., Liu Z., Bao D. Phosphor: Cloud Based DRM Scheme with Sim Card / Proceedings of the 12th International Asia-Pacific on Web Conference (APWEB), 2010, pp.459–463.
  • Zhu Y., Hu H., Ahn G.J., Huang D., Wang S. Towards temporal access control in cloud computing / INFOCOM, 2012, pp.2576–2580.
  • Lakshmi I. A Review on Cloud Computing in Mobile Applications. // International Journal of Computer Science and Mobile Computing, 2016, vol.5, no.6, pp.149–161.
  • Gregg M. 10 Security Concerns for Cloud Computing. Global Knowledge, 2010, pp.2–7.
  • Sarrab M., Janicke H. Runtime monitoring and controlling of information flow // International Journal of Computer Science and Information Security, 2010, vol.8, no.9, pp.37–45.
  • Chow R., Jakobsson M., Masuoka R., Molina J., Niu Y., Shi E., Song Z. Authentication in the clouds: a framework and its application to mobile users / Proceeding ACM Cloud Computing Security Workshop (CCSW’10), 2010, pp.1–6.
  • Huang D., Zhou Z., Xu L., Xing T., Zhong Y. Secure data processing framework for mobilecloud computing / Proceeding IEEE INFOCOM Workshop on Cloud Computing, (INFOCOM’11), 2011, pp.620–624.
  • Yogita D.M., Kailas K.D. Protection concern in Mobile Cloud Computing - A Survey // IOSR Journal of Computer Engineering (IOSR-JCE), pp.39–44.
  • AlZain M., Pardede E., Soh B., Thom J. Cloud computing security: From single to multi-clouds/45th Hawaii International Conference on System Science (HICSS), 2012,
  • Cachin C., Keidar I., Shraer A. Trusting the cloud // ACM SIGACT News, 2009, vol.40, no.2, pp.81–86.
  • Vukolic M. The byzantine empire in the intercloud // ACM SIGACT News, 2010, vol.41, no.3, pp.105–111.
  • Shankarwar M., Pawar A. Security and privacy in cloud computing: A survey / Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, ser. Advances in Intelligent Systems and Computing. Springer International Publishing, 2015, vol.328, pp.1–11.
  • Popovic K., Hocenski V. Cloud computing security issues and challenges / MIPRO, Proceedings of the 33rd International Convention, 2010, pp.344–349.
  • Kovachev D., Klamma R. Framework for Computation Offloading in Mobile Cloud Computing // International Journal of Artificial Intelligence and Interactive Multimedia, 2012, vol.1, no.7, pp.6–15.
  • Portokalidis G., Homburg P., Anagnostakis K., Bos H. Paranoid Android: versatile protection for smartphones / Proceedings of the 26th Annual Computer Security Application Conference (ACSAC), 2010, pp.347–356.
  • Choi E., Jeong H. User authentication using profiling in mobil cloud computing / AASRİ Confrence on Power and Energy Systems, 2012, pp.262–267.
  • Jia W., Zhu H., Cao Z., Wei L., Lin X. SDSM: a secure data service mechanism in mobile cloud computing / The First International Workshop on Security in Computers, Networking and Communications, 2011, pp.1087–1082.
  • T et al. Monitoring and detecting abnormal behavior in mobile cloud infrastructure / 2012 IEEE Network Operations and Management Symposium, 2012, pp.1303–1310.
  • Oberheide J., Veeraraghavan K., Cooke E., Jahanian F. Virtualized in-cloud security services for mobile devices / Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), 2008, pp.31–35.