Journal:Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges
Full article title | Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges |
---|---|
Journal | International Journal of Interactive Mobile Technologies |
Author(s) | Annane, Boubakeur; Ghazali, Osman |
Author affiliation(s) | Universiti Utara Malaysia |
Primary contact | Email: jakhar256 at yahoo dot com |
Year published | 2019 |
Volume and issue | 13(4) |
Page(s) | 20–32 |
DOI | 10.3991/ijim.v13i04.10515 |
ISSN | 1865-7923 |
Distribution license | Creative Commons Attribution 3.0 Austria |
Website | https://online-journals.org/index.php/i-jim/article/view/10515 |
Download | https://online-journals.org/index.php/i-jim/article/download/10515/5587 (PDF) |
Abstract
The principle constraints of mobile devices are their limited resources, including processing capability, storage space, and battery life. However, cloud computing offers a means of vast computing resources and services. With it a new idea emerged, the inclusion of cloud computing into mobile devices such as smartphones, tablet, and other personal digital assistants (PDA) to augment their capacities, providing a robust technology called mobile cloud computing (MCC). Although MCC has brought many advantages to mobile users, it also still suffers from the security and privacy issues of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of security experts are turned towards the virtualization-based security techniques used either on the cloud or on mobile devices. The new challenge is to develop secure methods in order to authenticate highly sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues inherent to the mobile cloud, focusing on the virtualization issue layer and giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers to adapt in order to achieve progress with future work.
Keywords: mobile cloud computing; virtualization; security and privacy of information; user virtual machines
Introduction
Nowadays, cloud computing is an attractive technology that is known to have an increasing importance for users by delivering services over the internet. It is defined as an information technology (IT) paradigm that allows the user to exploit cloud services in an on-demand way.[1] Three main services are provided: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). In IaaS, virtualization relies on sharing computing resources rather than having personal mobile devices to handle and to perform applications and tasks simultaneously and efficiently.[2]
References
- ↑ Deng, M.; Petkovic, M.; Nalin, M. et al. (2011). "A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges". IEEE 4th International Conference on Cloud Computing: 549-556. doi:10.1109/CLOUD.2011.108.
- ↑ Zhang, Y.; Chen, X.; Li, J. et al. (2017). "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing". Information Sciences 379: 42–61. doi:10.1016/j.ins.2016.04.015.
Notes
This presentation attempts to remain faithful to the original, with only a few minor changes to presentation. Grammar and punctuation has been updated reasonably to improve readability. In some cases important information was missing from the references, and that information was added.