Mobile Cloud Computing: Issues, Applications and Scope in COVID-19

  • Conference paper
  • First Online: 27 March 2022
  • Cite this conference paper

research paper on mobile cloud computing 2020

  • Hariket Sukesh Kumar Sheth   ORCID: orcid.org/0000-0001-5283-7716 15 &
  • Amit Kumar Tyagi   ORCID: orcid.org/0000-0003-2657-8700 16  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 418))

Included in the following conference series:

  • International Conference on Intelligent Systems Design and Applications

1879 Accesses

12 Citations

As the world is transitioning into a tech-savvy era, the twenty-first century is evidence of many technological advancements in the field of AI, IoT, ML, etc. Mobile Cloud computing (MCC) is one such emerging technology, providing services regardless of the time and place, contours the limitations of mobile devices to process bulk data, providing multi-platform support and dynamic provisioning. Not only there is an enhancement in computation speed, energy efficiency, execution, integration, but also incorporates considerate issues in terms of client-to-cloud and cloud-to-client authentication, privacy, trust, and security. Reviewing and overcoming addressed concerns is essential to provide reliable yet efficient service in nearing future. Mobile Cloud Computing has the potential to bring wonders in the fields such as education, medical science, biometry, forensics, and automobiles, which could counter the challenges faced in the ongoing COVID-19 Pandemic. To combat the prevailing challenges due to COVID-19, it has become critical that more efficient and specialized technologies like Mobile Cloud Computing are accepted that enable appropriate reach and delivery of vital services by involving gamification, cloud rendering, and collaborative practices. This paper provides a detailed study about MCC, mitigated security and deployment attacks, issues, applications of MCC, providing developers and practitioners opportunities for future enhancements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Conflict of Interest

The authors have thoroughly discussed about the contents of these research paper and declare that they surely do not have any conflicts of interest.

Shahzad, A., Hussain, M: Security issues and challenges of mobile cloud computing. Int. J. Grid Distrib. Comput. 6 , 37–50 (2013). www.sersc.org

Mobile Cloud Market – Growth, Trends, COVID-19 Impact, and Forecasts (2021–26). https://www.mordorintelligence.com/industry-reports/global-mobile-cloud-market-industry

Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Blockchain for secure EHRs sharing of mobile cloud based E-Health systems. IEEE Access 7 , 66792–66806 (2019). https://doi.org/10.1109/ACCESS.2019.2917555

Article   Google Scholar  

Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic medical records sharing using blockchain. AMIA Annu. Symp. Proc. 2017 , 650–659 (2018). PMID: 29854130; PMCID: PMC5977675

Google Scholar  

Holbl, M., Kompara, M., Kamisalic, A., Zlatolas, L.N.: A systematic review of the use of blockchain in healthcare. Symmetry 10 (10), 470 (2018). https://doi.org/10.3390/sym10100470

Elazhary, H.: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions. J. Netw. Comput. Appl. 128 , 105–140 (2019). https://doi.org/10.1016/j.jnca.2018.10.021

Eom, H., Figueiredo, R., Cai, H., Zhang, Y., Huang, G.: MALMOS: machine learning-based mobile offloading scheduler with online training. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 51–60 (2015). https://doi.org/10.1109/MobileCloud.2015.19

Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Silva, F.J.d.S.e.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 123–128 (2015). https://doi.org/10.1109/PERCOMW.2015.7134005

Hernandez, L., Cao, H., Wachowicz, M.: Implementing an Edge-fog-cloud Architecture for Stream Data Management. Cornell University Library (2017). https://arxiv.org/abs/1708.00352

UST Global. Internet of Medical Things (IoMT) Connecting Healthcare for a Better Tomorrow (2017). https://www.ust-global.com/sites/default/files/internet_of_medical_things_iomt.pdf

Alvi, S.A., Shah, G.A., Mahmood, W.: Energy efficient green routing protocol for internet of multimedia things. In: 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6 (2015). https://doi.org/10.1109/ISSNIP.2015.7106958

Amit Kumar, T., Shamila, M.: Spy in the crowd: how user’s privacy is getting affected with the integration of Internet of Thing’s devices (March 20, 2019). In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26-28, 2019

Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. Proc. IEEE INFOCOM 2012 , 945–953 (2012)

Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59 , 46–54 (2016)

Banerjee, X., Chen, J.E., Gopalakrishnan, V., Lee, S., Van Der Merwe, J.: MOCA. In: Proceedings of the Eighth ACM International Workshop on Mobility in the Evolving Internet architecture, pp. 11–16, ACM, Miami, FL, USA (2013)

Lin, Y., Kämäräinen, T., Di Francesco, M., Ylä-Jääski, A.: Performance evaluation of remote display access for mobile cloud computing. Comput. Commun. 72 , 17–25 (2015). https://doi.org/10.1016/j.comcom.2015.05.006

Khan, A.N., Kiah, M.L., Ali, M., Shamshirband, S.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13 (4), 651–675 (2015)

Kaur, S., Sohal, H.S.: Hybrid application partitioning and process offloading method for the mobile cloud computing. Proc. First Int. Conf. Intell. Comput. Commun. 87 , 95 (2016). https://doi.org/10.1007/978-981-10-2035-3_10

Gu, Y., March, V., Sung Lee, B.: GMoCA: Workshop on Green and Sustainable Software GREENS), Zurich, 3–3 June 2012, pp 15–20, Print ISBN: 978-1-4673-1833-4. https://doi.org/10.1109/GREENS.2012.6224265

Cao, J., Yu, B., Dong, F., Zhu, X., Xu, S.: Entropy-based denial-of-service attack detection in cloud data center. Concurrency Computat. Pract Exper. 27 , 5623–5639 (2015). https://doi.org/10.1002/cpe.3590

Tong, Z., Zhu, Z., Wang, Z., Wang, L., Zhang, Y., Liu, Y.: Cache side-channel attacks detection based on machine learning. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 919–926 (2020). https://doi.org/10.1109/TrustCom50675.2020.00123

Donald, A.C., Arockiam, L., Kalaimani, S.: ORBUA: An effective data access model for MobiCloud environment. Int. J. Pure Appl. Math. 118 , 79–84 (2018)

Bhatia, T., Verma, A.K., Sharma, G.: Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurr. Computat. Pract. Exper. 32 , e5520 (2020). https://doi.org/10.1002/cpe.5520

Irshad, A., Chaudhry, S.A., Shafiq, M., Usman, M., Asif, M., Ghani, A.: A provable and secure mobile user authentication scheme for mobile cloud computing services. Int. J. Commun. Syst. 32 , e3980 (2019). https://doi.org/10.1002/dac.3980

Yadav, H., Dave, M.: Secure data storage operations with verifiable outsourced decryption for mobile cloud computing. In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), pp. 1–5 (2014). https://doi.org/10.1109/ICRAIE.2014.6909236

Rashidi, O., Azzahra Mohd Zaifuddin, F., Mohd Hassan, Z.: Carotenoid biosynthesis regulatory mechanisms in plants. J. Oleo Sci. 63 (8), 753–760 (2014). Released July 29, 2014, [Advance publication] Released July 14, 2014, Online ISSN 1347-3352, Print ISSN 1345-8957 https://doi.org/10.5650/jos.ess13183

Mathew, S.M.: Implementation of cloud computing in education - a revolution. Int. J. Comput. Theory Eng. 4 , 473–475 (2012). https://doi.org/10.7763/IJCTE.2012.V4.511

Agrawal, S.: A survey on recent applications of cloud computing in education: COVID-19 perspective. J. Phys. Conf. Ser. 1828 (1), 012076 (2021). https://doi.org/10.1088/1742-6596/1828/1/012076

Dadhich, P., Kavita, Dr.: Cloud Computing Impact on Healthcare Services During COVID-19 Pandemic (2021)

Popadina, O., Salah, A.-M., Jalal, K.: Voice analysis framework for asthma-COVID-19 early diagnosis and prediction: AI-based mobile cloud computing application. IEEE Conf. Russian Young Res. Electr. Electron. Eng. (ElConRus) 2021 , 1803–1807 (2021). https://doi.org/10.1109/ElConRus51938.2021.9396367

Sharma, A., Bahl, S., Bagha, A.K., Javaid, M., Shukla, D.K., Haleem, A.: Blockchain technology and its applications to combat COVID-19 pandemic. Res. Biomed. Eng. 1 , 8 (2020). https://doi.org/10.1007/s42600-020-00106-3

Download references

Acknowledgement

We thank our college, Vellore Institute of Technology, Chennai for their constant support, encouragement and support. The authors have properly acknowledged and cited the scholars whose articles or content were consulted for this manuscript. The authors extend their gratitude to authors/editors/publishers of all those articles, journals and books. All the diagrams/figures/illustrations used and added in the paper are made using Open-Source software, ensuring no copyright issues.

Author information

Authors and affiliations.

School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, 600127, India

Hariket Sukesh Kumar Sheth

Centre for Advanced Data Science, Vellore Institute of Technology, Chennai, Tamil Nadu, 600127, India

Amit Kumar Tyagi

You can also search for this author in PubMed   Google Scholar

Contributions

All persons who meet authorship criteria are listed as authors and took the public responsibility for the content, including participation in the concept, analysis, writing, and revision of the manuscript. All authors revised and gave final approval for the version submitted.

Corresponding author

Correspondence to Hariket Sukesh Kumar Sheth .

Editor information

Editors and affiliations.

Scientific Network for Innovation and Research Excellence, Machine Intelligence Research Labs (MIR Labs), Auburn, WA, USA

Ajith Abraham

Niketa Gandhi

Institut für Wirtschaftsinformatik, Fachhochschule Nordwestschweiz, Olten, Switzerland

Thomas Hanne

Department of Computer Science and information Engineering, National University of Kaohsiung, Kaohsiung, Taiwan

Tzung-Pei Hong

Federal University of Bahia, Ondina, Brazil

Tatiane Nogueira Rios

Nantong University, Nantong Shi, Jiangsu, China

Weiping Ding

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Sheth, H.S.K., Tyagi, A.K. (2022). Mobile Cloud Computing: Issues, Applications and Scope in COVID-19. In: Abraham, A., Gandhi, N., Hanne, T., Hong, TP., Nogueira Rios, T., Ding, W. (eds) Intelligent Systems Design and Applications. ISDA 2021. Lecture Notes in Networks and Systems, vol 418. Springer, Cham. https://doi.org/10.1007/978-3-030-96308-8_55

Download citation

DOI : https://doi.org/10.1007/978-3-030-96308-8_55

Published : 27 March 2022

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-96307-1

Online ISBN : 978-3-030-96308-8

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Mobile Cloud Computing Research – Issues, Challenges and Needs

Profile image of International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

2020, International Journal of Scientific Research in Computer Science, Engineering and Information Technology

With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC). This paper first discusses the market trend and related business driving forces and opportunities. Then it presents an overview of MCC in terms of its concepts, distinct features, research scope and motivations, as well as advantages and benefits. Moreover, it discusses its opportunities, issues and challenges. Furthermore, the paper highlights a research roadmap for MCC.

RELATED PAPERS

HOANG DINH THAI , Dusit Niyato

International Journal of Information Systems and Computer Technologies

Rizwan Amin

Dipayan Dev

Dr. Amit Sinhal

Esam Aloufi

Ibrahim Al-Shourbaji

Journal of Computer Networks and Communications

Ahmed Aliyu

2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)

Samson Ooko

Mobile Networks and Applications

Nalini Venkatasubramanian

Daniela Villafañe

IAEME PUBLICATION

IAEME Publication

M.Rajendra Prasad , R. Lakshman Naik , Dr. Manjula Bairam

International Journal of Computer Applications

Ali Newaz Bahar

IEEE COMSOC Multimedia Communications …

Rerohit Kumar

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

Academic journal of Nawroz University

Amira Bibo Sallow

INFORMATION TECHNOLOGY IN INDUSTRY

Prasanthi Gottumukkala

International Journal of Scientific Research

Satish Kumar

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here .

Loading metrics

Open Access

Peer-reviewed

Research Article

Privacy and data protection in mobile cloud computing: A systematic mapping study

Roles Conceptualization, Investigation, Methodology, Software, Validation, Visualization, Writing – original draft, Writing – review & editing

Affiliations Faculty of Computing Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia, Faculty of Computer Science and Information Technology, Albaha University, Albaha, Saudi Arabia

ORCID logo

Roles Conceptualization, Methodology, Project administration, Resources, Software, Supervision, Writing – review & editing

* E-mail: [email protected]

Affiliation Faculty of Computing Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia

Roles Methodology, Writing – original draft, Writing – review & editing

  • Hussain Mutlaq Alnajrani, 
  • Azah Anir Norman, 
  • Babiker Hussien Ahmed

PLOS

  • Published: June 11, 2020
  • https://doi.org/10.1371/journal.pone.0234312
  • Reader Comments

Fig 1

As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.

Citation: Alnajrani HM, Norman AA, Ahmed BH (2020) Privacy and data protection in mobile cloud computing: A systematic mapping study. PLoS ONE 15(6): e0234312. https://doi.org/10.1371/journal.pone.0234312

Editor: He Debiao, Wuhan University, CHINA

Received: December 7, 2019; Accepted: May 24, 2020; Published: June 11, 2020

Copyright: © 2020 Alnajrani et al. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Data Availability: All relevant data are within the manuscript.

Funding: The author(s) received no specific funding for this work.

Competing interests: The authors have declared that no competing interests exist.

1. Introduction

In recent years, mobile cloud computing (MCC) is playing a crucial role in connectivity and accessibility to services and applications [ 1 ]. MCC is a major area of interest evolving out of mobile devices and cloud computing [ 1 – 3 ]. It is an approach that aims to enable mobile terminals to access robust and reliable cloud-based computing that facilitates the optimal utilization of resources.

As an effect of a major concern of cloud users, the issue of privacy and data protection has received considerable attention in the field. A number of researchers have reported that privacy in the definition adopted by the organization for Economic Cooperation and Development [ 4 ] is “any information relating to a recognized or identifiable individual (data subject).” In fact, the concept of privacy has a different perspective, depending on countries, cultures, or jurisdictions.

Recently, researchers have shown an increased interest in MCC. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, the results of the existing studies in privacy and data protection are not highlighted. Also, no particular research demonstrates the ongoing trends, measures to assess current solutions, and open research issues, including future research directions for privacy and data protection in MCC.

In this study, a systematic mapping study (SMS) was conducted to analyses the existing research literature that addresses privacy and data protection in MCC [ 3 ]. In fact, SMS is a clear and precise method of identifying, evaluating, and explaining all obtainable research relevant to a specific research question, thematic area, or phenomenon of importance [ 3 ]. Furthermore, the purpose of SMS is to present an adjustable, impartial, and reliable assessment of a particular research topic [ 3 ].

The study presented in this paper aims to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues in the domain. In this examination, a systematic mapping study (SMS) was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the contribution of this study is declared as follows:

  • Demonstrate existing threats and attacks on data privacy and solutions to serve personal data.
  • Outline metrics and measures that are used to assess the current solutions for privacy in MCC.
  • Illustrate the current state-of-the-art of data privacy exercises utilized in MCC and highlight the types of research and contribution areas that are used in mobile cloud computing.
  • Highlight open research issues of privacy and data protection in MCC.

This article is constructed as follows: Section 2 presents background and motivation for the study. Section 3 presents the related work. Section 4 describes the research method. Section 5 presents conducting the study. Section 6 shows and discusses the results. Section 7 illustrates the key findings. Section 8 clarifies the thread to the validity. Section 9 presents the conclusion of this study.

2. Background and motivation

This section presents a general background of mobile cloud computing, privacy and data protection, and the needs for a systemic mapping study.

2.1. Mobile cloud computing

Today, mobile devices such as smartphones provide users with greater connectivity and accessibility to services and applications [ 1 ]. Even though mobile technology continues to expand, modern mobile terminals suffer limitations associated with poor computational resources, low memory size, and small disk capacity [ 1 ]. Cloud computing provides a robust approach to the delivery of services by incorporating existing computing technologies. In cloud computing, three service delivery models appear to account for most deployments: Infrastructure-as-a-service (IaaS), Software-as-a-Service (SaaS), and Platform-as-a-Service (PaaS) [ 5 ].

The concept of Mobile Cloud Computing (MCC) has emerged out of mobile technology and cloud computing [ 1 – 3 ]. It is an approach that aims to enable mobile terminals to access robust and reliable cloud-based computing that facilitates the optimal utilization of resources. Moreover, MCC presents opportunities for improving the portability and scalability of services [ 1 ].

2.2. Privacy and data protection

Several researchers have reported that privacy in the definition adopted by the organization for Economic Cooperation and Development [ 4 ] is “any information relating to a recognized or identifiable individual (data subject).” In fact, the concept of privacy is vast and has a different perspective depending on countries, cultures, or jurisdictions.

To be more precise, privacy is not just about hiding information, but it is a legitimate control over personal data since no one may get personal information without the consent of the owner unless there are laws that allow access to such information [ 6 ], for example, income information that the tax authorities can get from employers [ 6 ].

The issue of privacy in MCC is getting nowadays more attention; however, numerous existing privacy laws and regulations are needed to impose the standards for the collection, maintenance, use, and disclosure of personal information that must be satisfied even by cloud providers [ 7 ]. In addition, a number of studies reported that there is always increasing the privacy risk in hosting your data in someone else’s hands [ 7 ].

2.3. The need for a systematic mapping study

Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, our research group has found the following:

  • The results of the existing studies in privacy and data protection were not highlighted.
  • The ongoing trends in privacy and data protection were not determined.
  • The metrics used to assess current solutions were not aggregated.
  • The research type facets and the contribution type facets used in MCC were not aggregated.
  • The current open research issues with future research directions were not demonstrated.

The aim of this investigation is to highlight the results of the existing studies in privacy and data protection in MCC through a systematic mapping study (SMS). The purpose of a systematic mapping study is to present an adjustable, impartial, and reliable assessment of a particular research topic [ 3 ]. Also, SMS is used to highlight the current state-of-the-art and to determine the trends of the research domain.

3. Related works

In recent years, a number of reviews and surveys have been published to analyze MCC in secondary studies [ 8 – 11 ] and are considered as related to this study. David et al. [ 8 ] focused on the various encryption techniques (and their variants) that are presently being utilized, and on possible future works that could improve privacy-oriented encryption techniques and security. Moreover, the authors tried to provide the audience with a conception about the difficulty of the algorithm being utilized in each of the studied encryption techniques. However, they did not cover other solutions or discuss current attacks and threats related to MCC.

Also, Kulkarni et al. [ 9 ] concentrated on the existing frameworks of MCC, although they did not mention other solutions. In addition, Bhatia and Verma [ 10 ] presented a state-of-the-art organization of cryptographic techniques and data security schemes in an innovative delimitation on chronological order. However, the survey only focused on threats and attacks related to the mobile cloud. Moreover, Rahimi et al. [ 11 ], investigated various security frameworks for the MCC environment, whereby most of them offload processor-heavy jobs to the cloud. The study [ 11 ] suggested some of the challenges that service providers need to address to achieve security and privacy in the MCC environment [ 11 ]. Finally, even though several reviews and surveys have been reported, two limitations remain:

  • There is a need for a more systematic way of summarizing the current knowledge in MCC. It is known that the popularity of these studies is as informal literature surveys, which do not include specific research questions, search process, or defined data analysis processor data extractions.
  • A few secondary studies focused on privacy and data protection in MCC, while applications based on these platforms continue to multiply.

4. Research method

A systematic mapping study (SMS) is a secondary study that provides a structure of the type of research papers and aggregates the results that have been declared in the domain. Also, SMS is a method for categorizing the published studies, often gives a visual summary, and map the results to highlight the current state-of-the-art and to determine the trends [ 12 ].

In this paper, we have derived the formal guidelines of SMS from Petersen et al. [ 12 ]. As in the directive of SMS [ 12 ], SMS is performed in five steps where the outcome from each step provides the input for the next step. Fig 1 shows the SMS method, as demonstrated in Petersen et al. [ 12 ]. As shown in Fig 1 , SMS is implemented as follows [ 12 ]:

  • Step 1 : Define research questions and objectives to provide a general scope for the study.
  • Step 2 : Define the search strategy to find the published studies from the available digital libraries.
  • Step 3 : Screening process using inclusion and exclusion criteria to choose the relevant studies.
  • Step 4 : Keywording to enable classification and data extraction.
  • Step 5: Data extraction and mapping process.

thumbnail

  • PPT PowerPoint slide
  • PNG larger image
  • TIFF original image

https://doi.org/10.1371/journal.pone.0234312.g001

4.1. Research aim questions and objectives

The study aims to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues in the domain. Table 1 shows our research questions and the objective of each research question.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t001

4.2. Search strategy

As in the SMS guideline [ 13 ], the primary studies are identified by using a search string [ 13 ] derived from the research questions. An excellent way to create the search string is to structure them in terms of population, intervention, comparison, and outcome (PICO) [ 13 ]. Based on our research questions in Table 1 , PICO is implemented as follows:

  • Population : Published studies.
  • Intervention : Privacy, data protection, mobile cloud computing, and MCC.
  • Comparison : Not applicable.
  • Outcome : Published studies in privacy and data protection in mobile cloud computing.

Based on PICO, we constructed our search string as presented in Fig 2 . In this SMS, the search string in Fig 2 is handled to search for studies in the available digital libraries.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g002

4.3. Inclusion-exclusion criteria

Based on SMS guidelines [ 13 ], applying inclusion and exclusion criteria is crucial to filter the results [ 13 ]. Inclusion and exclusion criteria aim to obtain relevant primary studies to answer the defined research questions [ 13 ]. Table 2 illustrates our inclusion and exclusion criteria.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t002

4.4 Keywording and classification for data extraction

For the SMS data extraction and classification, the SMS method [ 14 ] declared the following:

  • ➢. Ensure that the desired results were covered in the SMS [ 14 ].
  • ➢. Aid in introducing a set of categories that represent the underlying population for the study [ 14 ].
  • ➢. Develop a high-level understanding of the nature and contribution of the selected primary studies [ 13 ].
  • ➢. First, read the abstracts and searched for keywords [ 14 ].
  • ➢. Second, identify the context related to the objective of the study and the scheme will be updated [ 14 ].
  • Scheme: When having the classification scheme in place, the relevant articles are sorted into the scheme, i.e., the actual data extraction takes place [ 13 ].

As presented in Fig 3 , the classification scheme is implemented as follows:

  • Keywording: is the process of reading the abstract and searching for keywords to identify the context related to the objective of the SMS [ 14 ].
  • Sort Article into scheme: is the process of sorting the scheme after adding an article into scheme [ 14 ].
  • Update scheme: is the process of modifying the scheme after adding a primary study context to the scheme [ 14 ].

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g003

4.5 Data extraction and mapping process

As demonstrated in the SMS method [ 13 ], in this study, we use a data extraction form to gather the SMS data. In addition, when having the classification scheme in place, the actual data extraction of the relevant articles in this study is sorted into the scheme as follows:

  • Excel tables were utilized to document the data extraction process [ 13 ].
  • The frequencies of publications in each category were analyzed from the final table [ 13 ].

To investigate the trends, as in the SMS method [ 13 ], we focused on the frequencies of publications for each category to identify which categories have been emphasized in past research and thus to identify gaps and possibilities for future research. Also, different ways of presenting and analyzing the results were utilized as follows:

  • The summary of the statistics is illustrated in the form of tables, showing the frequencies of publications in each category [ 13 ].
  • A bubble plot is illustrated to report the frequencies [ 13 ]. Bubble plot is basically two x-y scatterplots with bubbles in category intersections. The size of a bubble is proportional to the number of articles that are in the pair of categories corresponding to the bubble coordinates [ 13 ].

5. Conducting SMS

In this section, we present the systematic mapping study that we have conducted using the SMS method presented in Section 4.

5.1. Selecting and filtering relevant studies

In this study, we applied PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines [ 15 ] as an evidence-based for reporting the outcome of the search results to clarify the eligible, included or excluded primary studies in this investigation. Fig 4 demonstrates the resulting articles from each database and the screened primary studies for this study using the PRISMA guideline.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g004

As Fig 4 , in this investigation, five digital databases we selected to search for relevant studies, including IEEE Xplore, Science Direct, Springer Link, ACM Digital Library, and Scopus. Then, we utilized our search string, as presented in Fig 2 , to search for studies in the selected databases. As a result, 1711 studies were obtained and screened as follows:

  • By article type: only the studies presented in conferences, magazines, and journals venues initially selected.
  • By subject: only the studies related to privacy, data protection, mobile cloud computing, and MCC initially nominated.
  • By title: only the studies related to mobile cloud computing initially nominated.

Finally, after screening by year, article type, subject, and title, a total of 215 studies were initially selected and presented in Table 3 .

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t003

In filtering the retrieved studies, a total of 87 studies were excluded based on our inclusion and exclusion criteria ( Table 2 ). Also, 39 duplicated studies were eliminated. In addition, we read a sum of 89 studies in a comprehensive analysis. The comprehensive analysis is a process of reading the whole primary study and decide to include or exclude it after a complete investigation on the actual contribution on exactly and only on the privacy and data protection in mobile cloud computing. Finally, a total of 74 primary studies were selected for SMS. Table 4 shows the results of filtering the retrieved studies.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t004

5.3. Analysis and classification

In this study, we carried out a classification scheme through keywording as declared in Section 4.4. First, we read the abstracts of the 74 selected primary studies and searched for keywords. In addition, we read the introduction and conclusion sections of each of the selected primary studies to produce the classification scheme. As an outcome, Fig 5 shows our classification scheme.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g005

As presented in Fig 5 , seven main aspects were defined as follows:

  • Data privacy exercises: It denotes the methods of controlling and implementing privacy solutions in mobile cloud computing [ 16 ]. Also, it concerns the demonstration of practice policies of data access using different mechanisms [ 17 ] that governed by the policies of MCC service providers, state regulations and roles.
  • ➢. Threat: Potential for infringement of security, which exists when there is a situation, capacity, activity, or occasion that could violate security and cause harm. That is, a risk is a possible peril that may misuse a vulnerability [ 18 ].
  • ➢. Attack : A violation of system security that derives from an intelligent threat. This intelligent work is a purposed attempt (especially in the concept of a technique or method) to avoid the security policy of a system and security services [ 18 ].
  • Privacy Solutions : These are computational methods serving issues related to authentication, authorization, encryption, access control, and trust.
  • Metrics : Privacy metrics are the privacy parameters that are required in measuring the level of privacy in MCC or the privacy service provided by a given solution to MCC [ 19 ].
  • Research type : We adopted an existing classification (Wieringa, Maiden, Mead, & Rolland, 2006), which is divided into six classifications: Validation Research, Solution Proposal, Evaluation Research, Philosophical Paper, Opinion Paper, and Experience Paper [ 20 ]. S1 Appendix of Appendix A shows the types of research with the definitions [ 20 ] used in our mapping study.
  • Contribution type : For the contribution type facets, we have used the categories from Petersen et al., (2008): Model, Formal Study, Method, System, and Experience [ 20 ]. S1 Appendix of Appendix B shows the definitions of the contribution type facets used in our mapping study.
  • Open research issues : is a new challenge noted by the researchers in the existing studies in the area.

6. Results and discussion

In this section, we present and discuss the answers to the research questions of this study.

6.1. RQ1: What are the current data privacy exercises in MCC?

In this study, we have identified eight data privacy exercises; these eight exercises have been highlighted in the selected primary studies for implementing privacy solutions in MCC. Table 5 illustrates the identified data privacy exercises in the selected primary studies.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t005

In addition, more details are necessary to understand those exercises presented in Table 5 ; those data privacy exercises are defined as follows:

  • Setup: is concerning the adaptation of the initial public parameters of system, account, and algorithm for privacy and data protection in MCC [ 26 , 27 ].
  • Cryptography: is defined as the method of preserving information by using codes, such that it can only be read and interpreted by those for whom the information is targeted [ 18 ].
  • Authentication: it denotes the assurance that the communicating entity is the one that it claims to be [ 18 ].
  • Accounts creation: It represents the registration of a mobile device or user to a cloud server is an onetime process wherein the user information (ID, password) are Setup, and some encrypted files are exchanged [ 70 ].
  • Verification: is utilized to illustrate the information that corroborates the binding between the entity and the identifier [ 18 ].
  • Access control: is the prevention of unauthorized use of a resource [ 18 ].
  • Steganography: is used for hiding plaintext messages by concealing the existence of the message [ 18 ].
  • Reputation: is one of the components of trustworthiness measures. The reputation establishes based on the recommendations from the MCC users [ 78 ].

Fig 6 shows the percentage of studies related to data privacy exercises based on the number of studies. As presented in Fig 6 , the results show that the selected primary studies focused on setup, cryptography, authentication, account creation, and verification in 25%, 22%, 21%, 14%, and 11% of studies, respectively. On the other hand, access control, steganography, and reputation have scored the lowest percentage with less than 5% each.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g006

Moreover, Fig 7 is a bubble plot of data privacy exercises in the selected primary studies; the X-axis represents the years, and the Y-axis represents the data privacy exercises. As illustrated in Fig 7 , the number of research rises towards the setup, cryptography, authentication, and accounts creation. Conversely, the number of research decreased towards verification, access control, steganography, and reputation.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g007

6.2. RQ 2: What are the existing data privacy threats and attacks in MCC?

In this investigation, we have identified 17 data privacy threats and attacks in MCC. Table 6 shows the identified threats and attacks in the selected primary studies.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t006

Fig 8 displays the percentage of primary studies related to threats and attacks based on the number of studies. As demonstrated in Fig 8 , the most common threats and attacks are unauthorized threats and attacks including users, persons, and access with 18% (34), data privacy with 15% (29), leakage of user privacy 13% (24), data misuse (21) and untrusted service provider (21) represented 11% each. On the other hand, disclosing information or data (11) represented 6%, man-in-the-middle attacks (9) represented 5%, and the rest of the threats got 21%, respectively.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g008

Furthermore, Fig 9 is a bubble plot of threats and attacks, the X-axis represents the years, and the Y-axis represents the threats and attacks. The results show that unauthorized, data privacy, leakage of user privacy, and phishing attacks are relatively dominant in the field. In contrast, eavesdropping attacks, internal attacks, improper security policies and practices in some locations, internal multi-layer attacks, inference attacks on user privacy, and data breach threats are losing momentum.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g009

6.3. RQ3: What are the privacy solutions proposed to serve personal data protection in MCC?

As shown in Table 7 , four solutions used to preserve the privacy in MCC in the selected primary studies. The solutions include encryption, authentication, access control, and trust.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t007

Fig 10 displays the percentage of studies related to privacy solutions based on the number of studies. The outcome shows that the research focused on encryption, authentication, and access control solutions in 50%, 28%, and 19% of studies, respectively. We observed that researchers have started to propose trust as a solution in this domain since we found two studies presented the trust solutions.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g010

Moreover, Fig 11 is a bubble plot of privacy solutions with the X-axis representing the years and the Y-axis representing data privacy solutions. The result in Fig 11 determines that the amount of research is increasing towards the encryption and the authentication data privacy solutions. On the other hand, research into trust data privacy solutions is abating.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g011

6.4. RQ4: What are the metrics and measures that are used to assess the current solutions of privacy and data protection in MCC?

As shown in Table 8 , we divided the answer into two parts as follows:

  • The first part of Table 8 presents the resources usage metrics, where we found that the highest utilized metric is time consumption, which is represented in 32 studies, followed by communication overhead in 26 studies. The results display that energy consumption, memory consumption on mobile devices, and turnaround-time resources usage metrics received the least attention in the selected primary studies.
  • The second part of Table 8 shows the contained solution robustness metrics. The results show two studies for each of the effective recommendation rate, accuracy, authentication request, and authentication response. Also, the results show one study for each of the data randomization, a malicious node detection and management performance (MDP), the addition of new users, operations required, authorities, and privacy and reliability factors.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t008

As illustrated in Fig 12 , the time consumption is the most used metric resulted in 43%. Followed by communication overhead metrics with 35%. Finally, energy consumption, memory consumption, and turnaround time are presented in 15%, 4%, and 3%, respectively.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g012

As expounded in Fig 13 , the effective recommendation rate, accuracy, authentication response, and authentication request are the most used metrics with 15%, 15%, 14%, and 14%, respectively. One the other hand, the result shows that most of the solution robustness metrics were employed in less than 8% of the selected primary studies.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g013

For recognizing metrics and measures trends in MCC, we present the trends in a bubble plot in Fig 14 , the X-axis represents the years, and the Y-axis represents metrics and measures. The outcome indicates that the amount of research in the selected primary studies is increasing towards time consumption, overhead communication, and energy consumption metrics. On the other hand, the number of studies in memory consumption and turnaround time is receiving less attention.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g014

6.5. RQ 5: What research type facets and contribution type facets are used in MCC?

To answer the first part of this question, we studied the proportion of papers by research type, as shown in Table 9 and Fig 15 . Our studies found the solution proposals are the most published studies with 31 papers (42%), followed by the evaluation research with 23 papers (31%). In contrast, there are 11 philosophical papers (14%), five validation research (6%), and four opinion papers (5%).

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g015

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t009

To answer the second part of the question, we studied the proportion of papers by research type, as shown in Table 9 and Fig 16 . Our studies found the most popular contribution type is the model with 33 papers (45%), followed by the method with 22 papers (30%). In contrast, there are only ten system contributions (13%), and nine Formal studies (12%).

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g016

To discover the research type facets in MCC trends, we illustrate the trends in a bubble plot ( Fig 17 ), the X-axis represents the years, and the Y-axis represents the research type. As demonstrated in Fig 17 , the amount of research in the selected primary studies is increasing towards the solution proposal and the evaluation research. On the other hand, the number of validation research and opinion paper research type facets are decreasing.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g017

To discover the contribution type facets in MCC, we illustrate the trends in a bubble plot ( Fig 18 ), the X-axis represents the years, and the Y-axis represents the contribution type. The outcome shows that the models and the methods are relatively dominant in the field, and the systems and the formal studies are losing momentum in the domain.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g018

6.6. RQ 6: What are the currently open research issues of privacy and data protection in MCC?

In this study, we have identified nine main open research issues with 23 examples of future research directions suggested by the authors in privacy and data protection in MCC. Table 10 shows the identified open research issues in the selected primary studies.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.t010

Furthermore, Fig 19 displays the open research issues in privacy and data protection based on the number of studies. As illustrated in Fig 19 , security, authentication, privacy, and encryption were getting momentum in 31%, 13%, 13%, and 13%, respectively. On the other hand, energy consumption, trust, various attacks, architectures, and testing addressed in less than 10% of the selected primary studies for each of them.

thumbnail

https://doi.org/10.1371/journal.pone.0234312.g019

7. Key findings

In this study, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a set of 74 primary studies were selected. In this section, we summaries the key findings of this study as follows:

  • The current data privacy exercise in MCC : This study shows that the exercises of cryptography, authentication, account creation, and verification were getting significant attention in 93% of the selected primary studies. In contrast, access control, steganography, and reputation with less attention in less than 8% of the selected primary studies. Also, our results show that the amount of research is increasing in the setup, cryptography, authentication, and accounts creation. Conversely, the outcome shows that the research in verification, access control, steganography, and reputation are losing momentum.
  • The data privacy threats and attacks in MCC : The results of this SMS show that the issues of unauthorized, data privacy, leakage of user privacy, data misuse, and untrusted service provider were receiving the most consideration in 68% of the selected primary studies. On the other hand, internal attacks, improper security policies and practices in some locations, internal multi-layer attacks, inference attacks on user privacy, and data breach threats were received less consideration with fewer than 6% of the selected primary studies. Also, our results show that unauthorized, data privacy, leakage of user privacy, and phishing attacks are relatively dominant. Conversely, the outcome indicates that the research in eavesdropping attacks, internal attacks, improper security policies and practices in some locations, internal multi-layer attacks, inference attacks on user privacy, and data breach threats have the lowest studies in the domain.
  • The privacy solutions proposed to serve personal data protection in MCC : The results of this SMS show that the encryption, authentication, and access control of the solutions in MCC were getting the highest attention in 97% of the selected primary studies. Trust solutions had the lowest concern in the field with less than 4%. Furthermore, the amount of research is increasing in encryption and the authentication of data privacy solutions in MCC. Contrary to expectations, the outcome shows that the research in the trust solutions in MCC is less likely than expected with only 3% of the selected primary studies.
  • ➢. It is interesting to note that this study identified five resources usage metrics and ten solution robustness metrics. In resource usage metrics, around 78% of primary studies assess the time consumption and the communication overhead. In solution robustness metrics, an effective recommendation rate and accuracy were gotten 30% of primary studies.
  • ➢. In resource usage metrics, the amount of research is increasing in time consumption and communication overhead metrics and measures. In contrast, energy consumption, memory consumption, and turnaround time are utilized in less than 23% of the selected papers. Furthermore, less than 4% of the primary studies used turnaround time metrics, which indicated that the turnaround time measures are less popular in the domain.
  • ➢. In solution robustness metrics, the recognized data randomization, a malicious node detection and the management performance, the addition of new users, operations required, authorities, privacy and reliability factors, authentication requests, and authentication, were gotten less than 8% of the selected papers. On the other hand, the amount of research is increasing in accuracy and effective recommendation of metrics and measures in MCC. Conversely, the outcome shows that the research on privacy and reliability is not dominant in the area.
  • The research type facets in MCC: The results show that the solution proposals and evaluation research got considerable attention in 73% of the selected primary studies. The validation research and the opinion papers with the lowest examinations with less than 13% of the selected primary studies. The amount of research is increasing in the solution proposal and evaluation research type. Conversely, the outcome shows that the research in the validation research and opinion paper is losing momentum.
  • The Contribution type facets in MCC: The results of this SMS show that the models and the methods got the highest attention in 75% of the selected primary studies. Also, systems and formal studies had gotten the lowest studies in the field with less than 26% of the selected primary studies. In addition, our results show that the amount of research is increasing in the models and the methods of the contribution type facets. Surprisingly, the research in the systems and formal studies are decreased in the selected primary studies.
  • Open research issues: In this study, we identified the new challenges in privacy and data protection in MCC, which were noted by the researchers in the selected primary studies. As presented in the previous SMS [ 95 ], the issues that emerged ten years ago are still considered open issues [ 95 ]. Our exploration shows that there are open research issues in encryption, authentication, security, trust, signature-based privacy, architectures, various attacks, testing, and energy consumption. In this SMS, as illustrated in Table 10 , 23 examples of future research directions suggested by the authors are useful for research activities in the future.

8. Threats to validity

The process of SMS is not infallible as with any secondary research method. There are many risks to consider for ensuring the validity of this SMS study. In this part, we describe and relieve the risks to the validity of this study to mitigate the potential risks. The risks include the search criteria, digital databases, and inclusion and exclusion criteria [ 96 ].

8.1. Search criteria

In this examination, the highest attention paid for choosing the most useful search strings. In particular, the construction of the search string is a threat to the validity of this study [ 96 ]. To mitigate this threat, our search string is derived based on PICO criteria [ 13 ]. PICO criteria are popular and widely used in the SMS, and this would enable us to retrieve the wanted studies in the search result and mitigate the threat.

8.2. Digital databases

For this study, the selection of databases, including IEEE Xplore, Science Direct, Springer Link, ACM Digital Library, and Scopus is a threat to the validity of the study since related studies would not be included in those databases. To mitigate this threat, as presented in Kitchenham et al. [ 97 ], and pointed out by Dyba et al. [ 98 ], the selection of IEEE, ACM, and any two databases are enough to save time and effort for general rather than searching multiple publishers’ digital databases [ 97 , 98 ]. Accordingly, in this examination, we selected five databases, including IEEE and ACM, which will mitigate the threat.

8.3. Inclusion and exclusion criteria

In this exploration, the rules and conditions of our inclusion and exclusion criteria are defined to be ranged with the scope of the study. The criteria stemmed from discussions within the research team. However, producing rules to recognize the initial literature to review; means that there is a threat that relevant research may be ignored if it employs various terms to that of the criteria. However, primary search terms of the study’s, namely Privacy, data protection in mobile cloud computing (MCC), are traditional, well-defined and accepted terms, which should decrease the number of ignored studies. Moreover, as the study is focused on identifying the main research in privacy and data protection in the mobile cloud computing, there is not as much of a concern with capturing research that is loosely related to the domain.

9. Conclusion

Mobile cloud computing (MCC) is a significant area of research emerging out of mobile devices and cloud computing [ 3 ]. In recent years, a significant number of studies have been published with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific research identified the current trends and open issues in privacy and data protection in MCC. This study highlighted current trends and open issues in privacy and data protection in MCC using the results of existing primary studies published from 2009 to 2019.

In this study, a systematic mapping study (SMS) was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a set of 74 primary studies were selected. As a result, the existing threats and attacks on data privacy and solutions to serve personal data were demonstrated. Also, the metrics and measures that are used to assess the current solutions for privacy in mobile cloud computing were aggregated. In addition, the current state-of-the-art of data privacy exercises used in the domain was identified. Moreover, the research type’s facets and the contribution type facets that are used in MCC were highlighted. Furthermore, the open research issues of privacy and data protection in MCC were demonstrated.

This result of this study shows that, for the current data privacy exercise in MCC, the number of investigations is increasing regarding the setup, cryptography, authentication, and accounts creation of data privacy exercise. Also, for data privacy threats and attacks in MCC, the results of this study show the need for research in eavesdropping attacks, internal attacks, improper security policies and practices in some locations, internal multi-layer attacks, inference attacks on user privacy, and data breach threats. In addition, our exploration shows that there are open research issues in encryption, authentication, security, trust, privacy, architectures, various attacks, energy consumption, and testing. Overall, this SMS highlighted the current state-of-the-art, and demonstrated open research issues which in turn allows us to understand the required research into privacy and data protection in MCC.

Finally, this study provides for researchers and practitioners the current state of research in the privacy and data protection in MCC, to help in implementing privacy and data protection in their applications or their investigations. In future work, we plan to conduct a survey to assess possible solutions for preserving privacy and protection in MCC.

Supporting information

S1 appendix. the contribution type facets definitions for systematic mapping study (sms) [ 20 ]..

https://doi.org/10.1371/journal.pone.0234312.s001

S1 Checklist. PRISMA 2009 checklist (Adapted for KIN 4400).

https://doi.org/10.1371/journal.pone.0234312.s002

S1 Fig. PRISMA 20009 flow diagram.

https://doi.org/10.1371/journal.pone.0234312.s003

  • View Article
  • Google Scholar
  • 2. Al-Janabi S., Al-Shourbaji I., Shojafar M., & Abdelhag M. (2017). Mobile cloud computing: challenges and future research directions. In 2017 10th International Conference on Developments in eSystems Engineering (DeSE) (pp. 62–67). IEEE.
  • 3. Juárez D. X. J., & Cedillo P. (2017). Security of mobile cloud computing: A systematic mapping study. In Ecuador Technical Chapters Meeting (ETCM), 2017 IEEE (pp. 1–6). IEEE.
  • 4. Organisation for Economic Co-operation and Development. (2002). OECD guidelines on the protection of privacy and transborder flows of personal data. OECD Publishing.
  • 8. David S., Xavier B., & Kathrine J. W. (2017). A panoramic overview on fast encryption techniques for outsourced data in mobile cloud computing environment. In Inventive Computing and Informatics (ICICI), International Conference on (pp. 476–480). IEEE.
  • 9. Kulkarni P., Khanai R., & Bindagi G. (2016). Security frameworks for mobile cloud computing: A survey. In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on (pp. 2507–2511). IEEE.
  • 16. Ahn G. J. (2014). U.S. Patent No. 8,799,984. Washington, DC: U.S. Patent and Trademark Office.
  • 18. Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson Education India.
  • 24. Ragini , Mehrotra P., & Venkatesan S. (2014). An efficient model for privacy and security in Mobile Cloud Computing. In 2014 International Conference on Recent Trends in Information Technology, ICRTIT 2014. Institute of Electrical and Electronics Engineers Inc.
  • 25. Bahrami M., Khan A., & Singhal M. (2016). An energy efficient data privacy scheme for IoT devices in mobile cloud computing. In Proceedings—2016 IEEE International Conference on Mobile Services, MS 2016(pp. 190–195). Institute of Electrical and Electronics Engineers Inc.
  • 28. Nasiraee H., & Ashouri-Talouki M. (2018). Dependable and Robust Attribute-Based Encryption in Mobile Cloud Computing. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1536–1541). IEEE.‏
  • 29. Lyu M., Li X., & Li H. (2017). Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing. In Data Science in Cyberspace (DSC), 2017 IEEE Second International Conference on (pp. 195–204). IEEE.‏
  • 34. Han J., Liu Y., Sun X., & Song L. (2016). Enhancing data and privacy security in mobile cloud computing through quantum cryptography. In Software Engineering and Service Science (ICSESS), 2016 7th IEEE International Conference on (pp. 398–401). IEEE.
  • 38. Wu H., & Huang D. (2014). Modeling multi-factor multi-site risk-based offloading for mobile cloud computing. In Network and Service Management (CNSM), 2014 10th International Conference on (pp. 230–235). IEEE.
  • 40. Suguna M., & Shalinie S. M. (2017). Privacy preserving data auditing protocol for secure storage in mobile cloud computing. In Wireless Communications, Signal Processing and Networking (WiSPNET), 2017 International Conference on (pp. 2725–2729). IEEE.
  • 42. Ahmad W., Wang S., Ullah A., & Mahmood Z. (2018). Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing. IEEE Access, 6, 46363–46381.
  • 44. Inani A., Verma C., & Jain S. (2019). A Machine Learning Algorithm TsF K-NN Based on Automated Data Classification for Securing Mobile Cloud Computing Model. In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS) (pp. 9–13). IEEE.
  • 46. Khan A. N., Kiah M. M., Khan S. U., Madani S. A., & Khan A. R. (2013). A study of incremental cryptography for security schemes in mobile cloud computing environments. In 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA) (pp. 62–67). IEEE. https://doi.org/10.1109/tbcas.2013.2257955 pmid:24020062
  • 49. Liu W., Wang X., Peng W., & Xing Q. (2019). Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services. IEEE Access, 7, 137770–137783.
  • 50. Zhou, Z., & Huang, D. (2012). Efficient and secure data storage operations for mobile cloud computing. In Proceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012 (pp. 37–45).
  • 51. Zhu, Y., Ma, D., Huang, D., & Hu, C. (2013). Enabling secure location-based services in mobile cloud computing. In MCC 2013—Proceedings of the 2nd, 2013 ACM SIGCOMM Workshop on Mobile Cloud Computing (pp. 27–32).
  • 52. Li, F., Rahulamathavan, Y., Rajarajan, M., & Phan, R. C. W. (2013). Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In Proceedings—2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013 (pp. 573–577).
  • 55. Baharon M. R., Shi Q., & Llewellyn-Jones D. (2015). A new lightweight homomorphic encryption scheme for mobile cloud computing. In Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015(pp. 618–625). Institute of Electrical and Electronics Engineers Inc.
  • 56. Ribeiro R., Santin A., Abreu V., Marynowski J., & Viegas E. (2016). Providing security and privacy in smart house through mobile cloud computing. In Communications (LATINCOM), 2016 8th IEEE Latin-American Conference on (pp. 1–6). IEEE.
  • 61. Huang D., Zhou Z., Xu L., Xing T., & Zhong Y. (2011). Secure data processing framework for mobile cloud computing. In 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011 (pp. 614–618).
  • 64. Suguna M., Anusia R., Shalinie S. M., & Deepti S. (2017). Secure identity management in mobile cloud computing. In Nextgen Electronic Technologies: Silicon to Software (ICNETS2), 2017 International Conference on (pp. 42–45). IEEE.
  • 68. Neog P., Debnath H., Shan J., Paiker N. R., Gehani N., Curtmola R. et al. (2016). FaceDate: A mobile cloud computing app for people matching. In Proceedings of the 11th EAI, International Conference on Body Area Networks (pp. 184–190). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  • 69. Alizadeh M., Hassan W. H., & Khodadadi T. (2014). Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 615–618). IEEE.
  • 71. Han Z., Yang L., & Liu Q. (2017). A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing. In 2017 International Conference on Networking and Network Applications (NaNA) (pp. 341–346). IEEE.
  • 72. Abdo J. B., Demerjian J., Chaouchi H., Atechian T., & Bassil C. (2015). Privacy using mobile cloud computing. In Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference on (pp. 178–182). IEEE.
  • 73. Dey S., Sampalli S., & Ye Q. (2013). Message digest as authentication entity for mobile cloud computing. In 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) (pp. 1–6). IEEE.
  • 74. Goyal D., & Krishna M. B. (2015). Secure framework for data access using Location based service in Mobile Cloud Computing. In India Conference (INDICON), 2015 Annual IEEE (pp. 1–6). IEEE.
  • 75. Abuarqoub A. (2019). A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing. In Proceedings of the 3rd International Conference on Future Networks and Distributed Systems (p. 29). ACM.
  • 76. Bahrami M., & Singhal M. (2015). A light-weight permutation based method for data privacy in mobile cloud computing. In Proceedings—2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015(pp. 189–196). Institute of Electrical and Electronics Engineers Inc.
  • 79. Arfan M. (2016). Mobile cloud computing security using cryptographic hash function algorithm. In Information Technology, Computer, and Electrical Engineering (ICITACEE), 2016 3rd International Conference on (pp. 1–5). IEEE.
  • 80. Carchiolo V., Longheu A., Malgeri M., Ianniello S., Marroccia M., & Randazzo A. (2019). Authentication and authorization issues in mobile cloud computing: A case study. In CLOSER 2019—Proceedings of the 9th International Conference on Cloud Computing and Services Science (pp. 249–256). SciTePress.
  • 81. Zhao K., Jin H., Zou D., Chen G., & Dai W. (2013). Feasibility of deploying biometric encryption in mobile cloud computing. In Proceedings—2013 8th Annual ChinaGrid Conference, ChinaGrid 2013 (pp. 28–33).
  • 82. Kumar R., & Rajalakshmi S. (2013). Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems. In 2013 International Conference on Computer Sciences and Applications (pp. 663–669). IEEE.
  • 83. Zhang H., Wen Y., Yu N., & Zhang X. (2013). Privacy-preserving computation for location-based information survey via mobile cloud computing. In 2013 IEEE/CIC International Conference on Communications in China, ICCC 2013 (pp. 100–105).
  • 85. Khaledi M., Khaledi M., & Kasera S. K. (2016). Profitable task allocation in mobile cloud computing. In Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks (pp. 9–17).
  • 88. Xing T., Liang H., Huang D., & Cai L. X. (2012). Geographic-based service request scheduling model for mobile cloud computing. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 1446–1453).
  • 89. Eom H., Juste P. S., Figueiredo R., Tickoo O., Illikkal R., & Iyer R. (2013). OpenCL-based remote offloading framework for trusted mobile cloud computing. In Proceedings of the International Conference on Parallel and Distributed Systems—ICPADS (pp. 240–248). IEEE Computer Society.
  • 90. Kang J., Yu R., Huang X., Maharjan S., & Zhang Y. (2016). On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing. In Cyber Security and Cloud Computing (CSCloud), 2016 IEEE 3rd International Conference on (pp. 136–141). IEEE.
  • 91. Yan Y., Han D., & Shu T. (2017). Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on (pp. 1084–1093). IEEE.
  • 92. Kulkarni G., Shelke R., Palwe R., Solanke V., Belsare S., & Mohite S. (2014). Mobile cloud computing-bring your own device. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 565–568). IEEE.
  • 93. Owens R., & Wang W. (2013). Preserving data query privacy in mobile mashups through mobile cloud computing. In Proceedings—International Conference on Computer Communications and Networks, ICCCN.
  • 98. Dyba T., Dingsoyr T., & Hanssen G. K. (2007). Applying systematic reviews to diverse study types: An experience report. In First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007) (pp. 225–234). IEEE.
  • Corpus ID: 235741956

Mobile cloud computing – Literature review

  • Jai M. Mehta
  • Published 2021
  • Computer Science, Engineering

31 References

The potential of utilizing mobile cloud computing in mobile devices, mobile cloud computing: issues and challenges, mobile cloud computing in the technology era: an overview of the factors influencing the adoption process, mobile cloud computing research - issues, challenges and needs, mobile cloud computing: a survey and propose solution framework, surveying and analyzing security issues in mobile cloud computing, heterogeneity model for wireless mobile cloud computing & its future challenges, a lightweight authentication scheme for mobile cloud computing, mission swachhta : mobile application based on mobile cloud computing, mobile clouds computing: current state, architecture and problems, related papers.

Showing 1 through 3 of 0 Related Papers

Data Security in Mobile Cloud Computing: A State of the Art Review

Rida Qayyum, Hina Ejaz, " Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science (IJMECS), Vol. 12, No. 2, pp. 30-35, April 2020. DOI: 10.5815/ijmecs.2020.02.04

6 Pages Posted: 18 Feb 2021

Rida Qayyum

Government College Women University Sialkot

Date Written: April 8, 2020

Due to tremendous use of smartphones the concern of cloud computing in mobile devices emerges, which is known as Mobile Cloud Computing (MCC). It involves the usage of mobile devices and cloud computing to perform resource intensive tasks using the internet with minimum impact on cellular resources. Nowadays, people are relying on mobile devices due to their small size and user friendly interface but due to its limited storage capacity, people can no more rely on internal RAM. Therefore, this promotes a drastic need for technology to make it possible for anyone to access their data anywhere anytime. As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user’s security, respectively. However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud. Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently. Moreover, this work will contribute a state-of-the-art roadmap to research and development communities for the right selection of proposed approach.

Keywords: Mobile Cloud Computing (MCC);data security;Secure Data Sharing in Clouds (SeDaSC), Homomorphic Encryption, data integrity, confidentiality, data storage

Suggested Citation: Suggested Citation

Rida Qayyum (Contact Author)

Government college women university sialkot ( email ), do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, computer science education ejournal.

Subscribe to this fee journal for more curated articles on this topic

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings
  • My Bibliography
  • Collections
  • Citation manager

Save citation to file

Email citation, add to collections.

  • Create a new collection
  • Add to an existing collection

Add to My Bibliography

Your saved search, create a file for external citation management software, your rss feed.

  • Search in PubMed
  • Search in NLM Catalog
  • Add to Search

Privacy and data protection in mobile cloud computing: A systematic mapping study

Affiliations.

  • 1 Faculty of Computing Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia.
  • 2 Faculty of Computer Science and Information Technology, Albaha University, Albaha, Saudi Arabia.
  • PMID: 32525944
  • PMCID: PMC7289432
  • DOI: 10.1371/journal.pone.0234312

As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.

PubMed Disclaimer

Conflict of interest statement

The authors have declared that no competing interests exist.

Fig 1. The process steps of systematic…

Fig 1. The process steps of systematic mapping [12].

Fig 2. Search string.

Fig 3. Classification scheme [14].

Fig 4. PRISMA flow diagram.

Fig 5. A classification scheme for a…

Fig 5. A classification scheme for a systematic mapping study in MCC.

Fig 6. Data privacy exercises.

Fig 7. Bubble plot of the data…

Fig 7. Bubble plot of the data privacy exercises.

Fig 8. Threats and attacks.

Fig 9. Bubble plot of the threats…

Fig 9. Bubble plot of the threats and attacks.

Fig 10. Privacy solutions.

Fig 11. Bubble plot of privacy solutions.

Fig 12. Resources usage metrics.

Fig 13. Solution robustness metrics.

Fig 14. Bubble plot of the metrics…

Fig 14. Bubble plot of the metrics and measures.

Fig 15. Research type facets for MCC.

Fig 16. Contribution type facets for MCC.

Fig 17. Bubble plot of the research…

Fig 17. Bubble plot of the research type facets.

Fig 18. Bubble plot of the contribution…

Fig 18. Bubble plot of the contribution type facets.

Fig 19. Open research issues in privacy…

Fig 19. Open research issues in privacy and data protection.

Similar articles

  • The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR). Hassan J, Shehzad D, Habib U, Aftab MU, Ahmad M, Kuleev R, Mazzara M. Hassan J, et al. Comput Intell Neurosci. 2022 Jun 7;2022:8303504. doi: 10.1155/2022/8303504. eCollection 2022. Comput Intell Neurosci. 2022. Retraction in: Comput Intell Neurosci. 2023 Nov 29;2023:9838129. doi: 10.1155/2023/9838129. PMID: 35712069 Free PMC article. Retracted. Review.
  • A Comprehensive Survey on Security and Privacy for Electronic Health Data. Oh SR, Seo YD, Lee E, Kim YG. Oh SR, et al. Int J Environ Res Public Health. 2021 Sep 14;18(18):9668. doi: 10.3390/ijerph18189668. Int J Environ Res Public Health. 2021. PMID: 34574593 Free PMC article. Review.
  • Legal framework for health cloud: A systematic review. Zandesh Z, Ghazisaeedi M, Devarakonda MV, Haghighi MS. Zandesh Z, et al. Int J Med Inform. 2019 Dec;132:103953. doi: 10.1016/j.ijmedinf.2019.103953. Epub 2019 Aug 31. Int J Med Inform. 2019. PMID: 31630064
  • eHealth Cloud Security Challenges: A Survey. Al-Issa Y, Ottom MA, Tamrawi A. Al-Issa Y, et al. J Healthc Eng. 2019 Sep 3;2019:7516035. doi: 10.1155/2019/7516035. eCollection 2019. J Healthc Eng. 2019. PMID: 31565209 Free PMC article. Review.
  • An innovative privacy preserving technique for incremental datasets on cloud computing. Aldeen YA, Salleh M, Aljeroudi Y. Aldeen YA, et al. J Biomed Inform. 2016 Aug;62:107-16. doi: 10.1016/j.jbi.2016.06.011. Epub 2016 Jun 28. J Biomed Inform. 2016. PMID: 27369566
  • Implementation of cloud computing in the German healthcare system. Putzier M, Khakzad T, Dreischarf M, Thun S, Trautwein F, Taheri N. Putzier M, et al. NPJ Digit Med. 2024 Jan 13;7(1):12. doi: 10.1038/s41746-024-01000-3. NPJ Digit Med. 2024. PMID: 38218892 Free PMC article. Review.
  • Ferreira J. A. L. and da Silva A. R. (2014). Mobile cloud computing. Open journal of Mobile Computing and Cloud Computing, 1(2), 59–77.
  • Al-Janabi S., Al-Shourbaji I., Shojafar M., & Abdelhag M. (2017). Mobile cloud computing: challenges and future research directions In 2017 10th International Conference on Developments in eSystems Engineering (DeSE) (pp. 62–67). IEEE.
  • Juárez D. X. J., & Cedillo P. (2017). Security of mobile cloud computing: A systematic mapping study In Ecuador Technical Chapters Meeting (ETCM), 2017 IEEE; (pp. 1–6). IEEE.
  • Organisation for Economic Co-operation and Development. (2002). OECD guidelines on the protection of privacy and transborder flows of personal data OECD Publishing.
  • Kumar P. R., Raj P. H., & Jelciana P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697.

Publication types

  • Search in MeSH

Related information

Grants and funding, linkout - more resources, full text sources.

  • Europe PubMed Central
  • PubMed Central
  • Public Library of Science

Research Materials

  • NCI CPTC Antibody Characterization Program

full text provider logo

  • Citation Manager

NCBI Literature Resources

MeSH PMC Bookshelf Disclaimer

The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited.

cloud computing Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Simulation and performance assessment of a modified throttled load balancing algorithm in cloud computing environment

<span lang="EN-US">Load balancing is crucial to ensure scalability, reliability, minimize response time, and processing time and maximize resource utilization in cloud computing. However, the load fluctuation accompanied with the distribution of a huge number of requests among a set of virtual machines (VMs) is challenging and needs effective and practical load balancers. In this work, a two listed throttled load balancer (TLT-LB) algorithm is proposed and further simulated using the CloudAnalyst simulator. The TLT-LB algorithm is based on the modification of the conventional TLB algorithm to improve the distribution of the tasks between different VMs. The performance of the TLT-LB algorithm compared to the TLB, round robin (RR), and active monitoring load balancer (AMLB) algorithms has been evaluated using two different configurations. Interestingly, the TLT-LB significantly balances the load between the VMs by reducing the loading gap between the heaviest loaded and the lightest loaded VMs to be 6.45% compared to 68.55% for the TLB and AMLB algorithms. Furthermore, the TLT-LB algorithm considerably reduces the average response time and processing time compared to the TLB, RR, and AMLB algorithms.</span>

An improved forensic-by-design framework for cloud computing with systems engineering standard compliance

Reliability of trust management systems in cloud computing.

Cloud computing is an innovation that conveys administrations like programming, stage, and framework over the web. This computing structure is wide spread and dynamic, which chips away at the compensation per-utilize model and supports virtualization. Distributed computing is expanding quickly among purchasers and has many organizations that offer types of assistance through the web. It gives an adaptable and on-request administration yet at the same time has different security dangers. Its dynamic nature makes it tweaked according to client and supplier’s necessities, subsequently making it an outstanding benefit of distributed computing. However, then again, this additionally makes trust issues and or issues like security, protection, personality, and legitimacy. In this way, the huge test in the cloud climate is selecting a perfect organization. For this, the trust component assumes a critical part, in view of the assessment of QoS and Feedback rating. Nonetheless, different difficulties are as yet present in the trust the board framework for observing and assessing the QoS. This paper talks about the current obstructions present in the trust framework. The objective of this paper is to audit the available trust models. The issues like insufficient trust between the supplier and client have made issues in information sharing likewise tended to here. Besides, it lays the limits and their enhancements to help specialists who mean to investigate this point.

Cloud Computing Adoption in the Construction Industry of Singapore: Drivers, Challenges, and Strategies

An extensive review of web-based multi granularity service composition.

The paper reviews the efforts to compose SOAP, non-SOAP and non-web services. Traditionally efforts were made for composite SOAP services, however, these efforts did not include the RESTful and non-web services. A SOAP service uses structured exchange methodology for dealing with web services while a non-SOAP follows different approach. The research paper reviews the invoking and composing a combination of SOAP, non-SOAP, and non-web services into a composite process to execute complex tasks on various devices. It also shows the systematic integration of the SOAP, non-SOAP and non-web services describing the composition of heterogeneous services than the ones conventionally used from the perspective of resource consumption. The paper further compares and reviews different layout model for the discovery of services, selection of services and composition of services in Cloud computing. Recent research trends in service composition are identified and then research about microservices are evaluated and shown in the form of table and graphs.

Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges

Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems.

Cloud Computing and Undergraduate Researches in Universities in Enugu State: Implication for Skills Demand

Cloud building block chip for creating fpga and asic clouds.

Hardware-accelerated cloud computing systems based on FPGA chips (FPGA cloud) or ASIC chips (ASIC cloud) have emerged as a new technology trend for power-efficient acceleration of various software applications. However, the operating systems and hypervisors currently used in cloud computing will lead to power, performance, and scalability problems in an exascale cloud computing environment. Consequently, the present study proposes a parallel hardware hypervisor system that is implemented entirely in special-purpose hardware, and that virtualizes application-specific multi-chip supercomputers, to enable virtual supercomputers to share available FPGA and ASIC resources in a cloud system. In addition to the virtualization of multi-chip supercomputers, the system’s other unique features include simultaneous migration of multiple communicating hardware tasks, and on-demand increase or decrease of hardware resources allocated to a virtual supercomputer. Partitioning the flat hardware design of the proposed hypervisor system into multiple partitions and applying the chip unioning technique to its partitions, the present study introduces a cloud building block chip that can be used to create FPGA or ASIC clouds as well. Single-chip and multi-chip verification studies have been done to verify the functional correctness of the hypervisor system, which consumes only a fraction of (10%) hardware resources.

Study On Social Network Recommendation Service Method Based On Mobile Cloud Computing

Cloud-based network virtualization in iot with openstack.

In Cloud computing deployments, specifically in the Infrastructure-as-a-Service (IaaS) model, networking is one of the core enabling facilities provided for the users. The IaaS approach ensures significant flexibility and manageability, since the networking resources and topologies are entirely under users’ control. In this context, considerable efforts have been devoted to promoting the Cloud paradigm as a suitable solution for managing IoT environments. Deep and genuine integration between the two ecosystems, Cloud and IoT, may only be attainable at the IaaS level. In light of extending the IoT domain capabilities’ with Cloud-based mechanisms akin to the IaaS Cloud model, network virtualization is a fundamental enabler of infrastructure-oriented IoT deployments. Indeed, an IoT deployment without networking resilience and adaptability makes it unsuitable to meet user-level demands and services’ requirements. Such a limitation makes the IoT-based services adopted in very specific and statically defined scenarios, thus leading to limited plurality and diversity of use cases. This article presents a Cloud-based approach for network virtualization in an IoT context using the de-facto standard IaaS middleware, OpenStack, and its networking subsystem, Neutron. OpenStack is being extended to enable the instantiation of virtual/overlay networks between Cloud-based instances (e.g., virtual machines, containers, and bare metal servers) and/or geographically distributed IoT nodes deployed at the network edge.

Export Citation Format

Share document.

research paper on mobile cloud computing 2020

ACM Digital Library home

  • Advanced Search

Server placement in mobile cloud computing: : A comprehensive survey for edge computing, fog computing and cloudlet

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options, recommendations, all one needs to know about fog computing and related edge computing paradigms: a complete survey.

With the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages ...

Next generation cloud computing

The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now ...

Towards the Decentralised Cloud: Survey on Approaches and Challenges for Mobile, Ad hoc, and Edge Computing

Cloud computing emerged as a centralised paradigm that made “infinite” computing resources available on demand. Nevertheless, the ever-increasing computing capacities present on smart connected things and devices calls for the decentralisation of Cloud ...

Information

Published in.

Elsevier Science Publishers B. V.

Netherlands

Publication History

Author tags.

  • Mobile cloud computing
  • Server placement
  • Edge computing
  • Fog computing
  • Review-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IMAGES

  1. (PDF) Cloud and Mobile Computing

    research paper on mobile cloud computing 2020

  2. Mobile Cloud Computing In Business

    research paper on mobile cloud computing 2020

  3. Research on Mobile Cloud Computing: Review, Trend

    research paper on mobile cloud computing 2020

  4. (PDF) A Research on Mobile Cloud Computing and Future Trends

    research paper on mobile cloud computing 2020

  5. Cloud Computing Essay Topics

    research paper on mobile cloud computing 2020

  6. Top 11 Advantages of Cloud Computing in 2020

    research paper on mobile cloud computing 2020

VIDEO

  1. Mobile Cloud computing Overview part 3

  2. Mobile Cloud computing Overview part 6

  3. Cloud Computing|| Research paper based||@learnprogramming5090 Review paper

  4. Mobile Cloud Computing Assignment Video

  5. The Future of Mobile Applications

  6. The Future of Mobile Computing

COMMENTS

  1. (PDF) Mobile Cloud Computing: A Review

    ABSTRACT. In today's world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud. computing services, made the Mobile Cloud Computing (MCC) selected as a ...

  2. Mobile Cloud Computing Research

    In this section, we discuss the research issues, challenges, and needs in five different areas: a) privacy in mobile cloud computing, b) mobile SaaS. engineering, c) mobile cloud infrastructures ...

  3. Research on Mobile Cloud Computing: Review, Trend and Perspectives

    1) Framework: cloud computing systems actually can be considered as a collection of different services, thus the framework of cloud computing is divided into three layers, which are infrastructure layer, platform layer, and application layer (see Fig. 2). Fig. 2: The Framework of Cloud Computing.

  4. Mobile Cloud Computing Research

    An overview of MCC in terms of its concepts, distinct features, research scope and motivations, as well as advantages and benefits are presented and a research roadmap for MCC is highlighted. With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This drives a strong demand for mobile cloud applications and ...

  5. Mobile Cloud Computing: Issues, Applications and Scope in ...

    Artificial Intelligence, IoT (Internet of Things) integration with Mobile Cloud Computing can propose solutions for real-world problems. Additionally, give practical solutions in the ongoing COVID-19 Pandemic in various sectors such as Healthcare, Education, logistics, management by addressing the research gaps, comparing the solutions proposed till now, and analyzing the contributions made in ...

  6. Mobile cloud computing models security issues: A systematic review

    1. Introduction. Due to the massive number of cloud-based mobile applications used in many domains of our life such as education, banking, and healthcare, the security of data and communications has become a high-priority issue (Stergiou and Psannis, 2020; Al-Ahmad and Kahtan, 2018a).Among the technology models that enable mobile devices to use cloud services is mobile cloud computing (MCC ...

  7. (PDF) Cloud Computing Trends: A Literature Review

    Researchers to solve the issues and difficulties associated with cloud computing, including privacy and security threats, mobile cloud computing, and cloud computing governance. Keywords—Cloud ...

  8. Mobile Cloud Computing Research

    This brings out a great business and research opportunity in mobile cloud November-December-2020 computing (MCC). This paper first discusses the market trend and related business driving forces and opportunities. ... been a focused subject in both academic and industry. As Computing mobile apps become more sophisticated, they III. Mobile Cloud ...

  9. Mobile cloud computing models security issues: A systematic review

    Mobile cloud computing (MCC) is a trending technology employed in several domains to overcome the limitations of mobile devices by using cloud capabilities. Communication between mobile devices and clouds is maintained via wireless media to make use of cloud services. Hence, MCC models show vital security issues related to many disciplines, especially authentication, privacy, and trust.

  10. A Survey of Mobile Cloud Computing Applications: Perspectives and

    For each of the challenges, a survey of existing solutions, identify research gaps, and suggest future research areas are provided to move forward from mobile computing to mobile cloud computing for building the next generation mobile cloud applications. As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges resulting from ...

  11. Privacy and data protection in mobile cloud computing: A ...

    As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in ...

  12. Mobile cloud computing

    The privacy and security issues faced by the Mobile Cloud Computing (MCC) technology are described and the issue faced in integrating green computing technology is discussed in this research paper. The high-speed development and renaissance in mobile devices have produced a fast-growing market. The remarkable progress made within the mobile applications allows the users to accomplish most of ...

  13. Mobile cloud computing: Current development and research challenges

    Mobile cloud computing has been introduced to be a powerful technology for mobile services by combining mobile computing and cloud computing technology. Though, a direct integration of two technologies can overcome a many of hurdles related to the performance, flexibility, security, and dynamic management discussed in mobile computing. Mobile cloud computing can address these problems by ...

  14. Data Security in Mobile Cloud Computing: A State of the Art Review

    As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user's security, respectively.

  15. Enhancing Security of Mobile Cloud Computing by Trust‐ and Role‐Based

    1. Introduction. In the early, computing takes place through desktops, but nowadays, users prefer mobile devices, like smartphones and tablets. According to a recent review [], the IP channel is occupied with the utilization of mobile devices, and users are interested in computing through mobile devices.Still, computing over mobile devices fails to provide good performance due to its ...

  16. A Survey of Mobile Cloud Computing Challenges and Solutions

    MCC. is a combination of cloud computing, mobile computing, and. wireless networking, that aims to provide cloud-based. servic es to the mobile device's customers [5]. When MCC is. fully deploye ...

  17. Mobile Cloud Computing Research

    The rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC). This paper first discusses the market trend and related business driving ...

  18. Privacy and data protection in mobile cloud computing: A ...

    Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 ...

  19. Mobile Edge Computing: Survey and Research Outlook

    mobile computing, from the centralized Mobile Cloud Computing towards Mobile Edge Computing (MEC). The main feature of MEC is to push mobile computing, network control and storage to the network edges (e.g., base stations and access points) so as to enable computation-intensive and latency-critical applications at the resource-limited mobile ...

  20. cloud computing Latest Research Papers

    The paper further compares and reviews different layout model for the discovery of services, selection of services and composition of services in Cloud computing. Recent research trends in service composition are identified and then research about microservices are evaluated and shown in the form of table and graphs. Download Full-text.

  21. Server placement in mobile cloud computing: : A comprehensive survey

    The growing technology of the fifth generation (5G) of mobile telecommunications has led to the special attention of cloud service providers (CSPs) to mobile cloud computing (MCC). Due to the limitations in processing power, storage space and energy capacity of mobile devices, cloud resources can be moved to the edge of the network to improve ...

  22. Cloud Computing: A Systematic Literature Review and Future Agenda

    review is thought to inspire enterprises and managers that would like to use cloud computing in. terms of the scope, solution methods, factors, dimensions, and the results achieved in a holistic ...

  23. PDF Mobile Cloud Computing Research

    Mobile Cloud Computing Research ... November-December-2020 ... This brings out a great business and research opportunity in mobile cloud computing (MCC). This paper first discusses the market ...

  24. (PDF) Past, Present, and Future of Cloud Computing: An ...

    Gartner (20 19) forecasted that there will b e a 17 percent growth of cloud computing in 2020, which totals to 266.4. billion USD in m arket value from 227.8 billion USD in 2019. Sub sequently ...