IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mobile Cloud Computing and Its Security and Privacy Challenges

Mobile Cloud Computing and Its Security and Privacy Challenges
View Sample PDF
Author(s): Hassan Takabi (University of Pittsburgh, USA), Saman Taghavi Zargar (University of Pittsburgh, USA) and James B. D. Joshi (University of Pittsburgh, USA)
Copyright: 2014
Pages: 24
Source title: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Source Author(s)/Editor(s): Danda B. Rawat (Georgia Southern University, USA), Bhed B. Bista (Iwate Prefectural University, Japan) and Gongjun Yan (University of Southern Indiana, USA)
DOI: 10.4018/978-1-4666-4691-9.ch016

Purchase

View Mobile Cloud Computing and Its Security and Privacy Challenges on the publisher's website for pricing and purchasing information.

Abstract

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.

Related Content

. © 2021. 35 pages.
. © 2021. 24 pages.
. © 2021. 35 pages.
. © 2021. 30 pages.
. © 2021. 34 pages.
. © 2021. 21 pages.
. © 2021. 31 pages.
Body Bottom