SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ISSN: XXXX-XXXX Volume X, Issue X, Month Year
A Survey on Security Circumstances for Mobile
Cloud Computing
Poornima K M
Dept of Computer Science and Engineering
BTL Institute of Technology
Bangalore, India
poorni091@gmail.com
ABSTRACT: Establishing applications on on-
demand infrastructures rather of building applica-
tions on fixed and rigid infrastructures was provided
by cloud computing provides. By merely exploiting
into the cloud, initiatives can gain fast access to
business applications or infrastructure resources
with decreased Capital Expenditure (CAPEX). The
more and more information is placed into the cloud
by someone and initiatives, security issues begins to
develop and raised. This paper discusses the different
security issues that rise up about how secure the mo-
bile cloud computing environment is.
1. INTRODUCTION
Cloud computing means the accessibility of software,
processing power and storage on demand. Its key
features include legerity, decreased Cost, device in-
dependence, dependability (multiple redundant sites),
scalability, security and reduced maintenance. It is
already a permanent fixture of consumer orientated,
services such as email, storage and social media [4].
The chances, allowed by
cloud computing becomes available to initiatives of
all sizes that enables them to deliver more scalable
and resilient services to employees, partners and cus-
tomers at lower cost and with higher business legerity
[1].Mobile cloud computing concerns to the accessi-
bility of cloud computing services in a mobile envi-
ronment. It integrates the elements of mobile net-
works and cloud computing, thereby providing
optimum services for mobile users. In mobile cloud
computing, mobile devices no need to a powerful
configuration (e.g., CPU speed and memory capacity)
since all the data and elaborated computing modules
can be processed in the clouds [2, 5].The more and
more information that is located in the cloud by indi-
viduals and initiatives, the more and more they be-
come vulnerable to attacks and threats the Internet
has to present. The assure of cloud computing to ac-
quire fast access to business applications and boost-
ing their infrastructure resources with decreased
CAPEX put the business world into a more risky
environment. In this paper, we discuss the summary
of cloud computing technology together with the
challenges and predicts cloud computing does not
offer that conventional computing models. The dif-
ferent issues that rises with the emergence of mobile
cloud computing have been described and discussed,
thus drawing and recognizing the security risks the
cloud environment has to offer.
2. CLOUD COMPUTING
2.1 Cloud Services
Cloud computing service offerings are generally clas-
sified into three delivery models: the Infrastructure as
a Service (IaaS); the Platform as a Service (PaaS);
and the Software as a Service (SaaS) [1, 3, 4, 6].
Software as a Service (SaaS) offers finish and
completed applications on demand. A single instance
of the software runs on the cloud and services multi-
ple end users or client organizations. It is a model of
software deployment where an application is hosted
as a service provided to customers throughout the
Internet. By excreting the need to install and run the
application on the customer’s own computer, SaaS
facilitates the customer’s loading of software mainte-
nance, ongoing operation, and support.
International Journal of Innovatory research in Science and Management - IJIRSM
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 14
[Fig. 1] Cloud Computing Service Offerings
The provider allots the customer only to use its appli-
cations. Most widely used examples of SaaS include
Gmail, Google Docs, and 144
Platform as a Service (PaaS) extends an operat-
ing system and can allow for every phase of software
development and testing as well as suites of pro-
gramming languages that users can use to develop
their own applications. It allows a set of software and
development tools hosted on the provider’s servers.
Commercial examples include Microsoft Windows
Azure and Google App Engine.
Infrastructure as a Service (IaaS) provides
end users direct access to processing, storage and
other computing resources over the network. It pro-
vides virtual servers with single IP addresses and
blocks of storage on demand Examples of IaaS in-
clude Amazon Elastic Compute Cloud (EC2), Joyent,
Rackspace, and IBM Computing on Demand.
2.2 CLOUD APPLICATION
DEPLOYMENT MODELS
Cloud computing architects must take into circum-
stance the three cloud application deployment and
consumption models: public, private, or hybrid
clouds.
Public Clouds: Public clouds are owned and han-
dled by Providers, and applications from different
customers are likely to be combined together on the
cloud’s servers, storage systems, and networks. Pub-
lic clouds are most often hosted aside from customer
precedes, and they provide a way to decrease cus-
tomer risk and cost by providing a flexible, even pro-
visional extension to endeavor infrastructure.
Private Clouds: Private clouds are client dedicat-
ed and are established for the exclusive use of one
client, providing the utmost control over data, securi-
ty, and quality of service. The initiative owns the
infrastructure and has control over how applications
are deployed on it. Private clouds may be deployed in
an initiative datacenter, and they also may be de-
ployed at a co-location facility.
Hybrid Clouds: Hybrid clouds combined both
public and private cloud models. They can help to
provide on-demand, externally provisioned scale. The
power to augment a private cloud with the resources
of a public cloud can be used to assert service levels
in the face of quick workload fluctuations.
2.3 Mobile Cloud Computing
Mobile cloud computing refers to the utilization of
cloud computing in combining with mobile devices.
It is a grouping between mobile network and cloud
computing, thereby allowing optimum services for
mobile users. Cloud computing survives when tasks
and data are kept on the internet instead of individual
devices, allowing on-demand access. Applications
are run on a remote server and then sent to the user
[2, 5]. Figure 2 shows an overview of the mobile
cloud computing architecture.
[Fig. 2] Mobile Cloud Computing Architecture
Overview
3. MOBILE CLOUD COM-
PUTING SECURITY
Assuring mobile cloud computing user’s privacy and
integrity of data or applications is one of the key is-
sues most cloud providers are given aid. Since mobile
cloud computing is a combining of mobile networks
and cloud computing, the security concerned issues
are then divided into two classes: Mobile network
user’s security; and cloud security [8, 9, 10].
International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 15
[Fig. 3] Mobile Cloud Computing Security Architec-
ture Overview
3.1 Mobile Network User’s Security
Numerous threats and security vulnerabilities such as
malicious codes are known to the different mobile
devices such as Smart phones, PDAs, cellular
phones, laptops, and the like. Some applications to
these devices can induce privacy issues for mobile
users [10]. There are two main issues referring the
subscriber’s security
Security for mobile applications: The sim-
plest ways to find security threats will be installing
and running security software and antivirus programs
on mobile devices. But since mobile devices are re-
strained with processing and power limitations, pro-
tecting them from these threats could be more diffi-
cult equated to even computers.
Privacy: allowing private information such as
showing your current location and user’s important
information produces scenarios for privacy issues.
For example, the use of location based services
(LBS) provided by global positioning system (GPS)
devices. Threats for displaying private information
could be minimized through selecting and analyzing
the initiative needs and need only assigned services
to be gained and moved to the cloud.
3.2 Securing Information on the
Cloud
Individuals and initiative take advantage of the bene-
fits for storing large amount of data or applications
on a cloud. However, issues in terms of their integri-
ty, authentication, and digital rights must be taken
care of [10].
Integrity: Every mobile cloud user must assure the
integrity of their information stored on the cloud.
Every accession they make must me authenticated
and verified. Different approaches in maintaining
integrity for one’s information that is stored on the
cloud is being proposed. For example, every infor-
mation stored by each individual or initiative in the
cloud is tagged or initialized to them wherein they are
the only one to have accession (move, update or de-
lete) such information. Every accession they make
must be authenticated ensuring that it is their own
information and thus confirming its integrity.
Authentication:Different authentication mechanisms
have been represented and suggested using cloud
computing to ensure the data access desirable for
mobile environments. Some uses the open standards
and even supports the integration of several authenti-
cation methods. For example, the use of access or
log-in IDs, passwords or PINS, authentication re-
quests, etc.
Digital rights management: Illegal distribu-
tion and piracy of digital contents such as video, im-
age, and audio, and e-book, programs becomes more
and more popular. Some solutions to protect these
contents from illegal access are implemented such as
provision of encryption and decryption keys to ap-
proach these contents. A coding or decoding platform
must be done before any mobile user can have access
to such digital contents.
4. CONCLUSION
Cloud computing applies a substantial assure as a
transformative technology that can change the very
nature of computing specifically to business initia-
tive. It allow on-demand network access to a shared
pool of set up computing resources (e.g., networks,
servers, storage, applications, and services) that can
be quickly provisioned and issued with minimal
management effort or service provider interaction.
Mobile cloud computing is one of mobile technology
trends in the future since it combines the advantages
of both mobile computing and cloud computing,
hence providing optimal services for mobile users.
This paper have talked about security issues with
regard to mobile cloud computing. Assuring mobile
cloud computing user’s privacy and integrity of data
or applications is one of the key issues most cloud
providers are given attending. Since mobile cloud
computing is a combining of mobile networks and
cloud computing, the security concerned issues are
then divided into two classes: mobile network user’s
security; and mobile cloud security.
International Journal of Innovatory research in Science and Management - IJIRSM
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 16
REFERENCES
[1] NEC Company, Ltd. and Information and Privacy
Commissioner, Ontario, Canada. “Modeling Cloud
Computing Architecture Without Compromising Pri-
vacy: A Privacy by Design Approach, (2010),
http://www.ipc.on.ca/images/Resources/pbd-NEC-
cloud.pdf..
[2] http://www.smartdevelopments.org/?p=84
.
[3]https://wiki.cloudsecurityalliance.org/guidance/ind
ex.php/Cloud_Computing_Architectural_Framework.
[4] http://andromida.hubpages.com/hub/cloud-
computing-architecture.
[5]http://www.readwriteweb.com/archives/why_clou
d_computing_is_the_future_of_mobile.php.
[6] Sun Microsystems, Inc., “Introduction to Cloud
Computing Architecture”, White Paper, 1st Edition,
(2009)June.
[7] P. Mell and T. Grance, “The NIST Definition of
Cloud Computing”, National Institute of Standards
and Technology, Information Technology Laborato-
ry, Version 15, 10-7-09 (2009).
[8] D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong,
“Secure Data Processing Framework for Mobile
Cloud Computing”, IEEE INFOCOM 2011 Work-
shop on Cloud Computing, 978-1-4244-9920-
5/11/$26.00 ©2011IEEE, (2011) pp. 620-624.
[9] S. Morrow, “Data Security in the Cloud”, Cloud
Computing: Principles and Paradigms, Edited by
RajkumarBuyya, James Broberg and Andrzej
Goscinski Copyright 2011 John Wiley & Sons, Inc.,
(2011) pp.

Weitere ähnliche Inhalte

Was ist angesagt?

A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud securityIJCSEA Journal
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 

Was ist angesagt? (20)

489 493
489 493489 493
489 493
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
H046053944
H046053944H046053944
H046053944
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud security
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 

Andere mochten auch

Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...IJIR JOURNALS IJIRUSA
 
Sharing Promising Practices Internally and Externally: Lessons Learned from PCI
Sharing Promising Practices Internally and Externally: Lessons Learned from PCISharing Promising Practices Internally and Externally: Lessons Learned from PCI
Sharing Promising Practices Internally and Externally: Lessons Learned from PCIAPLICwebmaster
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIJIR JOURNALS IJIRUSA
 
Adding valuethroughdatacuration
Adding valuethroughdatacurationAdding valuethroughdatacuration
Adding valuethroughdatacurationAPLICwebmaster
 
Final exam review game (5) (2)
Final exam review game (5) (2)Final exam review game (5) (2)
Final exam review game (5) (2)Sharoyal Nicole
 
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...IJIR JOURNALS IJIRUSA
 
Astrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantAstrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantSanjeev166
 
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...APLICwebmaster
 
Show and Tell : Medium
Show and Tell : MediumShow and Tell : Medium
Show and Tell : MediumAPLICwebmaster
 
Adding value : the foundation on which to build community
Adding value : the foundation on which to build communityAdding value : the foundation on which to build community
Adding value : the foundation on which to build communityAPLICwebmaster
 
APLIC 2014 - Sharing IS the point
APLIC 2014 - Sharing IS the pointAPLIC 2014 - Sharing IS the point
APLIC 2014 - Sharing IS the pointAPLICwebmaster
 
laxman final new cv
laxman final new cvlaxman final new cv
laxman final new cvLaxman Das
 
La revolució del gessamí
La revolució del gessamíLa revolució del gessamí
La revolució del gessamíNúria Martos
 
Improving awareness pescador san diego air & space museum
Improving awareness  pescador san diego air & space museumImproving awareness  pescador san diego air & space museum
Improving awareness pescador san diego air & space museumAPLICwebmaster
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLICwebmaster
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIJIR JOURNALS IJIRUSA
 
Repzo presentation
Repzo presentationRepzo presentation
Repzo presentationHassan Atmeh
 

Andere mochten auch (20)

Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
 
Sharing Promising Practices Internally and Externally: Lessons Learned from PCI
Sharing Promising Practices Internally and Externally: Lessons Learned from PCISharing Promising Practices Internally and Externally: Lessons Learned from PCI
Sharing Promising Practices Internally and Externally: Lessons Learned from PCI
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
 
Adding valuethroughdatacuration
Adding valuethroughdatacurationAdding valuethroughdatacuration
Adding valuethroughdatacuration
 
Hello sp
Hello spHello sp
Hello sp
 
Final exam review game (5) (2)
Final exam review game (5) (2)Final exam review game (5) (2)
Final exam review game (5) (2)
 
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
 
Astrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantAstrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultant
 
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...
APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to ...
 
Show and Tell : Medium
Show and Tell : MediumShow and Tell : Medium
Show and Tell : Medium
 
Perilaku dalam teori sosial
Perilaku dalam teori sosialPerilaku dalam teori sosial
Perilaku dalam teori sosial
 
Adding value : the foundation on which to build community
Adding value : the foundation on which to build communityAdding value : the foundation on which to build community
Adding value : the foundation on which to build community
 
APLIC 2014 - Sharing IS the point
APLIC 2014 - Sharing IS the pointAPLIC 2014 - Sharing IS the point
APLIC 2014 - Sharing IS the point
 
laxman final new cv
laxman final new cvlaxman final new cv
laxman final new cv
 
La revolució del gessamí
La revolució del gessamíLa revolució del gessamí
La revolució del gessamí
 
Improving awareness pescador san diego air & space museum
Improving awareness  pescador san diego air & space museumImproving awareness  pescador san diego air & space museum
Improving awareness pescador san diego air & space museum
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content Curation
 
ad web
ad webad web
ad web
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
 
Repzo presentation
Repzo presentationRepzo presentation
Repzo presentation
 

Ähnlich wie Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 

Ähnlich wie Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing (18)

G0314043
G0314043G0314043
G0314043
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 

Kürzlich hochgeladen

Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...amitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsJoseMangaJr1
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Pooja Nehwal
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 

Kürzlich hochgeladen (20)

Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing

  • 1. ISSN: XXXX-XXXX Volume X, Issue X, Month Year A Survey on Security Circumstances for Mobile Cloud Computing Poornima K M Dept of Computer Science and Engineering BTL Institute of Technology Bangalore, India poorni091@gmail.com ABSTRACT: Establishing applications on on- demand infrastructures rather of building applica- tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo- bile cloud computing environment is. 1. INTRODUCTION Cloud computing means the accessibility of software, processing power and storage on demand. Its key features include legerity, decreased Cost, device in- dependence, dependability (multiple redundant sites), scalability, security and reduced maintenance. It is already a permanent fixture of consumer orientated, services such as email, storage and social media [4]. The chances, allowed by cloud computing becomes available to initiatives of all sizes that enables them to deliver more scalable and resilient services to employees, partners and cus- tomers at lower cost and with higher business legerity [1].Mobile cloud computing concerns to the accessi- bility of cloud computing services in a mobile envi- ronment. It integrates the elements of mobile net- works and cloud computing, thereby providing optimum services for mobile users. In mobile cloud computing, mobile devices no need to a powerful configuration (e.g., CPU speed and memory capacity) since all the data and elaborated computing modules can be processed in the clouds [2, 5].The more and more information that is located in the cloud by indi- viduals and initiatives, the more and more they be- come vulnerable to attacks and threats the Internet has to present. The assure of cloud computing to ac- quire fast access to business applications and boost- ing their infrastructure resources with decreased CAPEX put the business world into a more risky environment. In this paper, we discuss the summary of cloud computing technology together with the challenges and predicts cloud computing does not offer that conventional computing models. The dif- ferent issues that rises with the emergence of mobile cloud computing have been described and discussed, thus drawing and recognizing the security risks the cloud environment has to offer. 2. CLOUD COMPUTING 2.1 Cloud Services Cloud computing service offerings are generally clas- sified into three delivery models: the Infrastructure as a Service (IaaS); the Platform as a Service (PaaS); and the Software as a Service (SaaS) [1, 3, 4, 6]. Software as a Service (SaaS) offers finish and completed applications on demand. A single instance of the software runs on the cloud and services multi- ple end users or client organizations. It is a model of software deployment where an application is hosted as a service provided to customers throughout the Internet. By excreting the need to install and run the application on the customer’s own computer, SaaS facilitates the customer’s loading of software mainte- nance, ongoing operation, and support.
  • 2. International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 14 [Fig. 1] Cloud Computing Service Offerings The provider allots the customer only to use its appli- cations. Most widely used examples of SaaS include Gmail, Google Docs, and 144 Platform as a Service (PaaS) extends an operat- ing system and can allow for every phase of software development and testing as well as suites of pro- gramming languages that users can use to develop their own applications. It allows a set of software and development tools hosted on the provider’s servers. Commercial examples include Microsoft Windows Azure and Google App Engine. Infrastructure as a Service (IaaS) provides end users direct access to processing, storage and other computing resources over the network. It pro- vides virtual servers with single IP addresses and blocks of storage on demand Examples of IaaS in- clude Amazon Elastic Compute Cloud (EC2), Joyent, Rackspace, and IBM Computing on Demand. 2.2 CLOUD APPLICATION DEPLOYMENT MODELS Cloud computing architects must take into circum- stance the three cloud application deployment and consumption models: public, private, or hybrid clouds. Public Clouds: Public clouds are owned and han- dled by Providers, and applications from different customers are likely to be combined together on the cloud’s servers, storage systems, and networks. Pub- lic clouds are most often hosted aside from customer precedes, and they provide a way to decrease cus- tomer risk and cost by providing a flexible, even pro- visional extension to endeavor infrastructure. Private Clouds: Private clouds are client dedicat- ed and are established for the exclusive use of one client, providing the utmost control over data, securi- ty, and quality of service. The initiative owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an initiative datacenter, and they also may be de- ployed at a co-location facility. Hybrid Clouds: Hybrid clouds combined both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The power to augment a private cloud with the resources of a public cloud can be used to assert service levels in the face of quick workload fluctuations. 2.3 Mobile Cloud Computing Mobile cloud computing refers to the utilization of cloud computing in combining with mobile devices. It is a grouping between mobile network and cloud computing, thereby allowing optimum services for mobile users. Cloud computing survives when tasks and data are kept on the internet instead of individual devices, allowing on-demand access. Applications are run on a remote server and then sent to the user [2, 5]. Figure 2 shows an overview of the mobile cloud computing architecture. [Fig. 2] Mobile Cloud Computing Architecture Overview 3. MOBILE CLOUD COM- PUTING SECURITY Assuring mobile cloud computing user’s privacy and integrity of data or applications is one of the key is- sues most cloud providers are given aid. Since mobile cloud computing is a combining of mobile networks and cloud computing, the security concerned issues are then divided into two classes: Mobile network user’s security; and cloud security [8, 9, 10].
  • 3. International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 15 [Fig. 3] Mobile Cloud Computing Security Architec- ture Overview 3.1 Mobile Network User’s Security Numerous threats and security vulnerabilities such as malicious codes are known to the different mobile devices such as Smart phones, PDAs, cellular phones, laptops, and the like. Some applications to these devices can induce privacy issues for mobile users [10]. There are two main issues referring the subscriber’s security Security for mobile applications: The sim- plest ways to find security threats will be installing and running security software and antivirus programs on mobile devices. But since mobile devices are re- strained with processing and power limitations, pro- tecting them from these threats could be more diffi- cult equated to even computers. Privacy: allowing private information such as showing your current location and user’s important information produces scenarios for privacy issues. For example, the use of location based services (LBS) provided by global positioning system (GPS) devices. Threats for displaying private information could be minimized through selecting and analyzing the initiative needs and need only assigned services to be gained and moved to the cloud. 3.2 Securing Information on the Cloud Individuals and initiative take advantage of the bene- fits for storing large amount of data or applications on a cloud. However, issues in terms of their integri- ty, authentication, and digital rights must be taken care of [10]. Integrity: Every mobile cloud user must assure the integrity of their information stored on the cloud. Every accession they make must me authenticated and verified. Different approaches in maintaining integrity for one’s information that is stored on the cloud is being proposed. For example, every infor- mation stored by each individual or initiative in the cloud is tagged or initialized to them wherein they are the only one to have accession (move, update or de- lete) such information. Every accession they make must be authenticated ensuring that it is their own information and thus confirming its integrity. Authentication:Different authentication mechanisms have been represented and suggested using cloud computing to ensure the data access desirable for mobile environments. Some uses the open standards and even supports the integration of several authenti- cation methods. For example, the use of access or log-in IDs, passwords or PINS, authentication re- quests, etc. Digital rights management: Illegal distribu- tion and piracy of digital contents such as video, im- age, and audio, and e-book, programs becomes more and more popular. Some solutions to protect these contents from illegal access are implemented such as provision of encryption and decryption keys to ap- proach these contents. A coding or decoding platform must be done before any mobile user can have access to such digital contents. 4. CONCLUSION Cloud computing applies a substantial assure as a transformative technology that can change the very nature of computing specifically to business initia- tive. It allow on-demand network access to a shared pool of set up computing resources (e.g., networks, servers, storage, applications, and services) that can be quickly provisioned and issued with minimal management effort or service provider interaction. Mobile cloud computing is one of mobile technology trends in the future since it combines the advantages of both mobile computing and cloud computing, hence providing optimal services for mobile users. This paper have talked about security issues with regard to mobile cloud computing. Assuring mobile cloud computing user’s privacy and integrity of data or applications is one of the key issues most cloud providers are given attending. Since mobile cloud computing is a combining of mobile networks and cloud computing, the security concerned issues are then divided into two classes: mobile network user’s security; and mobile cloud security.
  • 4. International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 16 REFERENCES [1] NEC Company, Ltd. and Information and Privacy Commissioner, Ontario, Canada. “Modeling Cloud Computing Architecture Without Compromising Pri- vacy: A Privacy by Design Approach, (2010), http://www.ipc.on.ca/images/Resources/pbd-NEC- cloud.pdf.. [2] http://www.smartdevelopments.org/?p=84 . [3]https://wiki.cloudsecurityalliance.org/guidance/ind ex.php/Cloud_Computing_Architectural_Framework. [4] http://andromida.hubpages.com/hub/cloud- computing-architecture. [5]http://www.readwriteweb.com/archives/why_clou d_computing_is_the_future_of_mobile.php. [6] Sun Microsystems, Inc., “Introduction to Cloud Computing Architecture”, White Paper, 1st Edition, (2009)June. [7] P. Mell and T. Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology, Information Technology Laborato- ry, Version 15, 10-7-09 (2009). [8] D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, “Secure Data Processing Framework for Mobile Cloud Computing”, IEEE INFOCOM 2011 Work- shop on Cloud Computing, 978-1-4244-9920- 5/11/$26.00 ©2011IEEE, (2011) pp. 620-624. [9] S. Morrow, “Data Security in the Cloud”, Cloud Computing: Principles and Paradigms, Edited by RajkumarBuyya, James Broberg and Andrzej Goscinski Copyright 2011 John Wiley & Sons, Inc., (2011) pp.