Survey on Security Issues in Mobile Cloud Computing and Preventive Measures

  • Rahul NewareEmail author
  • Kalyani Ulabhaje
  • Gaurav Karemore
  • Hiteshree Lokhande
  • Vijay Dandige
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 767)


Mobile Cloud Computing (MCC) is a recent technology used by various people worldwide. In 2015, more than 240 million users used mobile cloud computing which earns a profit of $5.2 billion for service providers. MCC is a combination of mobile computing and cloud computing that presents various challenges like network access, elasticity, management, availability, security, privacy etc. Here, the security issues involved in both mobile computing and cloud computing, such as data security, virtualisation security, partitioning security, mobile cloud application security and mobile device security are considered extremely important. This paper presents a detailed study of security issues in mobile cloud computing and enumerates their preventive measures.


Mobile computing Cloud computing Security Virtualisation Privacy Authentication Storage 


  1. 1.
  2. 2.
    A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011:
  3. 3.
    Z. Sanaei, S. Abolfazli, A. Gani, M. Shiraz, in SAMI: Service-Based Arbitrated Multi-tier Infrastructure for Mobile Cloud Computing. 1st IEEE International Conference on Communications in China Workshops (ICCC) (2012), pp. 14–19Google Scholar
  4. 4.
    R. Neware, Computer forensics for private web browsing of UC browser. IOSR J. Comput. Eng. (IOSR-JCE) 19(4), 56–60 (2017)Google Scholar
  5. 5.
    L. Lei, S. Sengupta, T. Pattanaik, J. Gao, in MCloudDB: A Mobile Cloud Database Service Framework. 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (2015), pp. 6–15Google Scholar
  6. 6.
    W. Zhu, C. Luo, J. Wang, S. Li, Multimedia cloud computing. Sig. Process. Mag. IEEE 28, 59–69 (2011)CrossRefGoogle Scholar
  7. 7.
    D. Kovachev, D. Renzel, R. Klamma, Y. Cao, in Mobile Community Cloud Computing: Emerges and Evolves. Eleventh International Conference on Mobile Data Management (MDM) (2010), pp. 393–395Google Scholar
  8. 8.
    Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications (2016),
  9. 9.
    US National Security Agency: Information Assurance (2016),
  10. 10.
    M.B. Mollah, K.R. Islam, S.S. Islam, in Next Generation of Computing Through Cloud Computing Technology. 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (2012), pp. 1–6Google Scholar
  11. 11.
    R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25, 599–616 (2009)CrossRefGoogle Scholar
  12. 12.
    N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29, 84–106 (2013)CrossRefGoogle Scholar
  13. 13.
    R. Neware, A. Khan, in Cloud Computing Digital Forensic Challenges. 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018), Coimbatore, India (2018)Google Scholar
  14. 14.
    R. Neware, Recent threats to cloud computing data and its prevention measures. Int. J. Eng. Sci. Res. Technol. 6(11), 234–238 (n.d.)Google Scholar
  15. 15.
    R. Sharma, S. Kumar, M.C. Trivedi, Mobile, in Cloud Computing: Bridging the Gap between Cloud and Mobile Devices. 5th International Conference on Computational Intelligence and Communication Networks (CICN) (2013), pp. 553–555Google Scholar
  16. 16.
    R. Neware, N. Walde, Survey on security issues of fog computing. Int. J. Innovative Res. Comput. Commun. Eng. 5(10), 15731–15736 (2017). Scholar
  17. 17.
    V. Prokhorenko, K.-K.R. Choo, H. Ashman, Web application protection techniques: a taxonomy. J. Netw. Comput. Appl. 60, 95–112 (2016)CrossRefGoogle Scholar
  18. 18.
    J. Peng, K.-K.R. Choo, H. Ashman, User profiling in intrusion detection: a review. J. Netw. Comput. Appl. 72, 14–27 (2016)CrossRefGoogle Scholar
  19. 19.
    D. Quick, K.-K. R. Choo, Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. (2016)Google Scholar
  20. 20.
    L. Liu, X. Zhang, G. Yan, S. Chen, in Exploitation and Threat Analysis of Open Mobile Devices. Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (2009), pp. 20–29Google Scholar
  21. 21.
    R. Racic, D. Ma, H. Chen, Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. Securecomm Workshops 2006, 1–10 (2006)Google Scholar
  22. 22.
    M.B. Mollah, M.A.K. Azad, A. Vasilakos, Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Comput. 4, 34–42 (2017)CrossRefGoogle Scholar
  23. 23.
    M. Sookhak, A. Gani, M.K. Khan, R. Buyya, Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)CrossRefGoogle Scholar
  24. 24.
    V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M.K. Khan, K.-K. R. Choo, Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces (2016)Google Scholar
  25. 25.
    Y. Li, K. Gai, Z. Ming, H. Zhao, M. Qiu, Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 12, 67 (2016)Google Scholar
  26. 26.
    H.S. Alqahtani, G. Kouadri-Mostefaou, in Multi-clouds Mobile Computing for the Secure Storage of Data. Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (2014), pp. 495–496Google Scholar
  27. 27.
    H. Liang, C. Han, D. Zhang, D. Wu, A lightweight security isolation approach for virtual machines deployment, in Information Security and Cryptology (2014), pp. 516–529Google Scholar
  28. 28.
    Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, Q. Li, in SMOC: A Secure Mobile Cloud Computing Platform. 2015 IEEE Conference on Computer Communications (INFOCOM) (2015), pp. 2668–2676Google Scholar
  29. 29.
    N. Paladi, C. Gehrmann, A. Michalas, Providing user security guarantees in public infrastructure clouds. IEEE Trans. Cloud Comput. (2016)Google Scholar
  30. 30.
    S. Jin, J. Ahn, J. Seol, S. Cha, J. Huh, S. Maeng, H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor. IEEE Trans. Comput. 64, 2833–2846 (2015)MathSciNetCrossRefGoogle Scholar
  31. 31.
    S.Y. Vaezpour, R. Zhang, K. Wu, J. Wang, G.C. Shoja, A new approach to mitigating security risks of phone clone co-location over mobile clouds. J. Netw. Comput. Appl. (2016)Google Scholar
  32. 32.
    Y. Duan, M. Zhang, H. Yin, Y. Tang, in Privacy-Preserving Offloading of Mobile App to the Public Cloud. 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15) (2015)Google Scholar
  33. 33.
    M. Al-Mutawa, S. Mishra, in Data Partitioning: An Approach to Preserving Data Privacy in Computation Offload in Pervasive Computing Systems. Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (2014), pp. 51–60Google Scholar
  34. 34.
    S.A. Saab, F. Saab, A. Kayssi, A. Chehab, I.H. Elhajj, Partial mobile application offloading to the cloud for energy-efficiency with security measures. Sustain. Comput. Inf. Syst. 8, 38–46 (2015)Google Scholar
  35. 35.
    A.N. Khan, M.M. Kiah, M. Ali, S. Shamshirband, A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13, 651–675 (2015)CrossRefGoogle Scholar
  36. 36.
    S.L. Tang, L. Ouyang, W.T. Tsai, in Multi-factor web API Security for Securing Mobile Cloud. 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) (2015), pp. 2163–2168Google Scholar
  37. 37.
    D. Popa, M. Cremene, M. Borda, K. Boudaoud, in A Security Framework for Mobile Cloud Applications. 2013 11thRoedunet International Conference (RoEduNet) (2013), pp. 1–4Google Scholar
  38. 38.
    Z. Sitová, J. Šeděnka, Q. Yang, G. Peng, G. Zhou, P. Gasti et al., HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11, 877–892 (2016)CrossRefGoogle Scholar
  39. 39.
    Device Policy for Android: Overview for Users (2016),
  40. 40.
    J. Imgraben, A. Engelbrecht, K.-K.R. Choo, Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33, 1347–1360 (2014)CrossRefGoogle Scholar
  41. 41.
    R. Neware, Internal intrusion Detection for Data Theft and Data Modification using Data Mining. Int. J. Sci. Res. (IJSR) 6(8), 2176–2178 (2017).

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Rahul Neware
    • 1
    Email author
  • Kalyani Ulabhaje
    • 1
  • Gaurav Karemore
    • 1
  • Hiteshree Lokhande
    • 1
  • Vijay Dandige
    • 2
  1. 1.Computer Science and Engineering DepartmentG H Raisoni College of EngineeringNagpurIndia
  2. 2.Department of EnglishMNLUNagpurIndia

Personalised recommendations