Skip to main content

The Reality and Future of the Secure Mobile Cloud Computing (SMCC): Survey

  • Conference paper
  • First Online:
Big Data and Networks Technologies (BDNT 2019)

Abstract

Mobile communication and mobile computing has revolutionized the way subscribers across the globe leverage and use a variety of services on the go. Mobile devices have evolved from mere simple handheld mobile phones that enabled voice calls only a few years back to smartphone devices that enable the user to access applications and value-added services anytime, anyplace. All of these, together with the recent reigniting of cloud computing technology, has spearheaded into the opportunistic and economically viable Mobile Cloud Computing (MCC) as the next innovative technology and ultimately a utility wave such as electricity or water. But this has created huge loopholes in facilitating reliable, scalable, performance oriented, safe, secure and auditable trusted services at affordable prices and profitability. Thus, this research proposal aims to create a fully-fledged Mobile Commerce-based Safe Mobile Cloud Computing (MCSMCC) framework to specifically accommodate Safe MCC (SMCC) with economic pricing models and e-trading schemes. As for the safety measures comprising of security, privacy, trust, identity management, audit and digital forensics among other related measures to suit SMCC, the objectives are to define and specify the necessary processes and protocols for secure e-trading, These objectives are further complimented by further defining and specifying SMCC pricing schemes that will be fair and equitable to users and vendors alike, and encourage critical mass market uptake and usage with confidence. Both of these central objectives will be experimented through simulation and prototyping to test and verify their purpose, effectiveness and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.idc.com/getdoc.jsp?containerId=prUS24302813

  2. IBSG Cisco: (i) “Mobile Consumers reach for the Cloud”, 2012 and (ii) “The Road to ‘Cloud Nine” - “How Service Providers Can Monetize Consumer Mobile Cloud”, Henky Agusleo and Neeraj Arora (2013). http://www.cisco.com/web/about/ac79/docs/sp/Mobile-Cloud.pdf

  3. Mell, P., Grance, T.: The NIST definition of Cloud Computing. Special Publication 800-14, vol. 15, September 2011

    Google Scholar 

  4. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing – the business perspective. Decis. Support Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  5. McCarthy, J.: Life in the Cloud, Living with Cloud Computing. http://computinginthecloud.wordpress.com/2008/09/25/utility-cloud-computingflashback-to-1961-prof-john-mccarthy/

  6. Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)

    Article  Google Scholar 

  7. http://www.mobilecloudcomputingforum.com/

  8. Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: The proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages And Applications (OOPSLA), pp. 627–634, October 2009

    Google Scholar 

  9. Liu, L., Moulic, R., Shea, D.: Cloud service portal for mobile device management. In: The proceedings of the IEEE 7th International Conference on e-Business Engineering (ICEBE), p. 474, January 2011

    Google Scholar 

  10. Ahamad, S., Al-Shourbaji, I., Al-Janabi, S.: A secure NFC mobile payment protocol based on biometrics with formal verification. Int. J. Internet Technol. Secur. Trans. 6(2), 103–132 (2016). https://doi.org/10.1504/ijitst.2016.078579. https://www.inderscienceonline.com/doi/pdf/10.1504/IJITST.2016.078579

    Article  Google Scholar 

  11. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Abdelhag, M.: Mobile cloud computing: challenges and future research directions. In: IEEE, 2017 10th International Conference on Developments in eSystems Engineering (DeSE), Paris, pp. 62–67 (2017). https://doi.org/10.1109/dese.2017.21. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8285798&isnumber=8285458

  12. Youseff, L., Butrico, M., Da Silva, D.: Toward a unified ontology of cloud computing. In: Grid Computing Environments Workshop, pp. 1–10. IEEE (2008)

    Google Scholar 

  13. Buyya, R., Yeo, C., Venugopal, S.: Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: The proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, (HPCC 2008), pp. 5–13 (2008)

    Google Scholar 

  14. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  15. https://www.dropbox.com/

  16. Forman, G.H., Zahorjan, J.: The challenges of mobile computing. IEEE Comput. Soc. Mag. 27(4), 38–47 (1994)

    Article  Google Scholar 

  17. Kakerow, R.: Low power design methodologies for mobile communication. In: Proceedings of IEEE International Conference on Computer Design: VLSI in Computers and Processors, p. 8, January 2003

    Google Scholar 

  18. Paulson, L.D.: Low-power chips for high-powered handhelds. IEEE Comput. Soc. Mag. 36(1), 21 (2003)

    Article  Google Scholar 

  19. Davis, J.W.: Power benchmark strategy for systems employing power management. In: The proceedings of the IEEE International Symposium on Electronics and the Environment, p. 117, August 2002

    Google Scholar 

  20. Mayo, R.N., Ranganathan, P.: Energy consumption in mobile devices: why future systems need requirements aware energy scale-down. In: The proceedings of the Workshop on Power-Aware Computing Systems, October 2003

    Google Scholar 

  21. http://aws.amazon.com/s3/

  22. Vartiainen, E., Mattila, K.V.-V.: User experience of mobile photo sharing in the cloud. In: The Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia (MUM), December 2010

    Google Scholar 

  23. Zou, P., Wang, C., Liu, Z., Bao, D.: Phosphor: a cloud based DRM scheme with sim card. In: The proceedings of the 12th International Asia-Pacific on Web Conference (APWEB), p. 459, June 2010

    Google Scholar 

  24. Yang, X., Pan, T., Shen, J.: On 3G mobile e-commerce platform based on cloud computing. In: The proceedings of the 3rd IEEE International Conference on Ubi-Media Computing (U-Media), pp. 198–201, August 2010

    Google Scholar 

  25. Dai, J., Zhou, Q.: A PKI-based mechanism for secure and efficient access to outsourced data. In: The Proceedings of the 2nd International Conference on Networking and Digital Society (ICNDS), vol. 1, p. 640, June 2010

    Google Scholar 

  26. Leina, Z., Tiejun, P., Guoqing, Y.: Research of mobile security solution for fourth party logistics. In: The Proceedings of the 6th International Conference on Semantics Knowledge and Grid (SKG), pp. 383–386, January 2011

    Google Scholar 

  27. Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the middle east. J. Inf. Knowl. Manag. 15(01), 1650007 (2016). https://doi.org/10.1142/s0219649216500076

    Article  Google Scholar 

  28. Al_Janabi, S.: Smart system to create optimal higher education environment using IDA and IOTs. Int. J. Comput. Appl. (2018). https://doi.org/10.1080/1206212x.2018.1512460

  29. Rudenko, A., Reiher, P., Popek, G.J., Kuenning, G.H.: Saving portable computer battery power through remote process execution. In: Journal of ACM SIGMOBILE on Mobile Computing and Communications Review, vol. 2, no. 1 (1998)

    Article  Google Scholar 

  30. Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: MAUI: making smartphones last longer with code offload. In: The Proceedings of the 8th International Conference on Mobile systems, applications, and services, pp. 49–62 (2010)

    Google Scholar 

  31. http://www.flickr.com/

  32. http://www.facebook.com/

  33. http://seekingalpha.com/article/729681-microsoft-s-new-office-software-to-use-cloud-computing-adapt-for-mobile-appsand-devices

  34. Ali, S.H.: Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: IEEE, 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, pp. 259–269 (2013). https://doi.org/10.1109/dese.2013.54

  35. Mun, K.: Mobile Cloud Computing Challenges, September 2010. http://www2.alcatel-lucent.com/techzine/mobile-cloud-computing-challenges/#sthash.0BAMDl9B.dpuf

  36. http://www2.alcatel-lucent.com/techzine/mobile-cloud-computing-challenges/

  37. Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, L., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., Galan, F.: The RESERVOIR model and architecture, for the open federated cloud computing. IBM J. Res. Dev. 53(4), 4 (2009)

    Article  Google Scholar 

  38. Chetan, S., Kumar, G., Dinesh, K., Mathew, K., Abhimanyu, M.: Cloud computing for mobile world. chetan.ueuo.com

  39. Klein, A., Mannweiler, C., Schneider, J., Schotten, H.D.: Access schemes for mobile cloud computing. In: The 11th International Conference on Mobile Data Management (MDM), pp. 387–392 (2010)

    Google Scholar 

  40. http://reviews.cnet.com/8301-6452_7-57602215/iphone-5s-vs-iphone-5c-vs-iphone-5-specs-compared/

  41. Qureshi, S.S., Ahmad, T., Rafique, K., Shuja-ul-Aslam: Mobile cloud computing as future for mobile applications – implementation methods and challenging issues. In: The Proceedings of the IEEE CCISS 2011 (2011)

    Google Scholar 

  42. Chun, B.G., Maniatis, P.: Augmented smartphone applications through clone cloud execution. In: The Proceedings of the 12th Conference on Hot Topics in Operating Systems, Berkeley, CA, USA (2009)

    Google Scholar 

  43. Chun, B., Ihm, S., Maniatis, P., Naik, M., Patti, A.: CloneCloud: elastic execution between mobile device and cloud. In: The Proceedings of the 6th Conference on Computer Systems, pp. 301–314. ACM (2011)

    Google Scholar 

  44. Wen, Y., Zhang, W., Luo, H.: Energy-optimal mobile application execution: taming resource-poor mobile devices with cloud clones. In: INFOCOM IEEE Proceedings, pp. 2716–2720 (2012)

    Google Scholar 

  45. Samimi, F.A., McKinley, P.K., Sadjadi, S.M.: Mobile service clouds: a self-managing infrastructure for autonomic mobile computing services. In: The Proceedings of the 2nd IEEE International Workshop on Self-Managed Networks, Systems and Services (SelfMan), pp. 130–141 (2006)

    Chapter  Google Scholar 

  46. Zhang, X., Jeong, S., Kunjithapatham, A., Gibbs, S.: Towards an elastic application model for augmenting computing capabilities of mobile platforms. In: The 3rd International ICST Conference proceedings on Mobile Wireless Middleware, Operating Systems, pp. 161–174 (2010)

    Google Scholar 

  47. Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: ThinkAir: dynamic resource allocation and parallel execution in cloud for mobile code offloading. In: The INFOCOM IEEE Proceedings, pp. 945–953 (2012)

    Google Scholar 

  48. Yang, L., Cao, J., Tang, S., Li, T., Chan, A.T.S.: A Framework for partitioning and execution of data stream applications in mobile cloud computing. In: The Proceeding of the 5th International Conference on Cloud Computing (CLOUD), pp. 794–802. IEEE (2012)

    Google Scholar 

  49. Al-Janabi, S., Al-Shourbaji, I.: A hybrid Image steganography method based on genetic algorithm. In: 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, pp. 398–404 (2016). https://doi.org/10.1109/setit.2016.7939903

  50. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Shamshirband, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18(2), 113–122 (2017). https://doi.org/10.1016/j.eij.2016.11.001. http://www.sciencedirect.com/science/article/pii/S1110866516300482, ISSN 1110-8665

    Article  Google Scholar 

  51. Al-Janabi, S.: Pragmatic miner to risk analysis for intrusion detection (PMRA-ID). In: Mohamed, A., Berry, M., Yap, B. (eds.) Soft Computing in Data Science, SCDS 2017. Communications in Computer and Information Science, vol. 788. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-7242-0_23

    Google Scholar 

  52. Freier, A.O., Karlton, P., Kocher: The SSL Protocol. PC (1996). http://home.netscape.com/eng/ssl3/ssl-toc.hml

  53. Drew, G.N.: Using SET for Secure Electronic Commerce. Prentice-Hall Inc., Upper Saddle River (1999)

    Google Scholar 

  54. Liu, D.: Research of the two electronic commerce payment protocols: SSL and SET. Secur. Saf. Magzine 4, 61–63 (2003)

    Google Scholar 

  55. Chan, H.-W.: Mobile A gent Security and Reliability Issues in Electronic Commerce. Master thesis. The Chinese University of Hong Kong (2002)

    Google Scholar 

  56. Zhao, S., Xin, F.-Q., Ma, J.-Z.: Research on secure mobile agent-based electronic commerce. China Acad. J. Electron. Publ. House, 10–11 (2007)

    Google Scholar 

  57. Zhang, D.-L., Lin, C.: Security model of mobile agent in e-commerce. China Acad. J. Electron. Publ. House 25(6), 1271–1273 (2005)

    Google Scholar 

  58. Wang, R.-Y., Liang, L., Liu, W.-F.: Research of mobile agent-based security in the e-commerce. J. Appl. Res. Comput. 11, 137–141 (2004)

    Google Scholar 

  59. Kannammal, A., Iyengar, N.: A model for mobile agent security in e-business applications. Int. J. Bus. Inf. 2(2), 185–198 (2007)

    Google Scholar 

  60. Yu, B., Yi, X.: Mobile agent-based encryption transmission system. Masters thesis. The GuiZhou University, China (2006)

    Google Scholar 

  61. Wang, Y., Wang, Z., Wei, L.-F.: A migration mechanism of mobile agent system supporting security and fault-tolerance. J. Comput. Technol. Dev. 17(3), 169–175 (2007)

    Google Scholar 

  62. Krzyzanowski, P.: Process synchronization and election algorithms. Lecture Notes on Distributed Systems (2000). http://www.cs.rutgers.edu/~pxk/rutgers/notes/content/06-mutex.pdf

  63. Antoniou, G., Sterling, L., Gritzalis, S., Udaya, P.: Privacy and forensics investigation process: the ERPINA protocol. J. Comput. Sci. Interface. 30(4), 229–236 (2008). http://www.w3.org/P3P/Platform-for-Privacy-Preferences-(P3P)-Project

    Article  Google Scholar 

  64. Al_Janabi, S., Mahdi, M.A.: Evaluation prediction techniques to achievement an optimal biomedical analysis. Int. J. Grid Util. Comput. (2019)

    Google Scholar 

  65. Son, S., Jung, G., Jun, S.: An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider. J. Supercomput. 64, 606–637 (2013)

    Article  Google Scholar 

  66. Izakian, H., Abraham, A., Ladani, B.T.: An auction method for resource allocation in computational grids. Futur. Gener. Comput. Syst. 26, 228–235 (2010)

    Article  Google Scholar 

  67. Buyya, R., Stockinger, H., Giddy, J., Abrams, D.: Economic models for management of resources in grid computing. J. Concurr. Comput. 14, 1507–1542 (2002)

    Article  Google Scholar 

  68. Hausheer, D., Stiller, B. (eds.): Implementation of economic grid traffic management and security mechanisms. In: Deliverable D4.1 of the EC-GIN Project, May 2009. http://www.csg.uzh.ch/research/ec-gin/publications/D4.1.pdf

  69. Wang, X., Sun, J., Huang, M., Wu, C.: A resource auction based allocation mechanism in the cloud computing environment. In: The 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), pp. 2111–2115 (2012)

    Google Scholar 

  70. Fujiwara, I., Aida, K., Ono, I.: Applying double-sided combinational auctions to resource allocation in cloud computing. In: 2010, The 10th IEEE/IPSJ International Symposium Applications and the Internet (SAINT), 14 July 2010

    Google Scholar 

  71. Muhammad, S., Furqan, Z., Guha, R.K: Understanding the intruder through attacks on cryptographic protocols. In: The Proceedings of the 44th ACM Southeast Conference (ACMSE2006), pp. 667–672, March 2006

    Google Scholar 

  72. Stallings, W.: Cryptography and Network Security: Principles and Practices, 5th edn. Pearson Education (2011). ISBN-10: 0131873164, ISBN-13: 9780131873162

    Google Scholar 

  73. Cremers, C.J.F.: Scyther - Semantics and Verification of Security Protocols, Ph.D. thesis, Eindhoven University of Technology (2006)

    Google Scholar 

  74. Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: The Proceedings of Computer Aided Verification (CAV 2005). Lecture Notes in Computer Science, vol. 3576, pp. 281–285. Springer (2005). http://dl.acm.org/citation.cfm?id=2153265

  75. Smyth, B.: Formal verification of cryptographic protocols with automated reasoning, Ph.D. thesis, School of Computer Science, College of Engineering and Physical Sciences, University of Birmingham, March 2011

    Google Scholar 

  76. Cremers, C., Lafourcade, P.: Comparing state spaces in automatic security protocol verification. Electronically published in Electronic Notes in Theoretical Computer Science from AVoCS 2007. http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-avocs07.pdf

  77. Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.88: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial 1, INRIA Paris-Rocquencourt, Paris, France (2013). http://prosecco.gforge.inria.fr/personal/bblanche/proverif/manual.pdf

  78. Nogueira, J.H.M.: Mobile intelligent agents to fight cyber intrusions. Int. J. Forensic Comput. Sci. (2006)

    Google Scholar 

  79. Strassner, J., Raymer, D.: Implementing next generation services using policy based management and autonomic computing principles. In: The proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium – NOMS (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samaher Al_Janabi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al_Janabi, S., Hussein, N.Y. (2020). The Reality and Future of the Secure Mobile Cloud Computing (SMCC): Survey. In: Farhaoui, Y. (eds) Big Data and Networks Technologies. BDNT 2019. Lecture Notes in Networks and Systems, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-030-23672-4_18

Download citation

Publish with us

Policies and ethics