A New Design Security Issues Addressing and Challenges in Mobile Cloud Computing

  • Nirmal Kumar Gupta Jaypee University Anoopshahr, Anoopshahr, India
  • Gaurav Raj Jaypee University Anoopshahr, Anoopshahr, India
Keywords: Mobile cloud computing, Cloud security, Privacy, Data security, Challenges


The emergence of cloud computing has brought tremendous impact on software organiza-tions and software architecture design. With the development of cloud computing and mo-bile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile de-vices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchro-nization over the Internet. This research paper provides the review on mobile cloud compu-ting, its security issues, challenges and suggests some solutions.


Luo, J.Z., Jin, J.H., Song, A.B. and Dong, F., 2011. Cloud computing: architecture and key technologies. Journal of China Institute of Communications, 32(7), pp.3-21.

Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.

Prasad, M.R., Gyani, J. and Murti, P.R.K., 2012. Mobile cloud computing: Implications and challenges. Journal of Information Engineering and Applications, 2(7), pp.7-15.

Padma, M. and Neelima, M.L., 2014. Mobile Cloud Computing: Issues from a Security Perspective. International Journal of Computer Science and Mobile Computing, 3(5), pp.972-977.

Krutz, R.L. and Vines, R.D., 2010. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.

Mell, P. and Grance, T., 2009. Effectively and securely using the cloud computing paradigm. NIST, Information Technology Laboratory, 2(8), pp.304-311.

Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges. Information Sciences, 305, pp.357-383.

Donald, A.C., Oli, S.A. and Arockiam, L., 2013. Mobile cloud security issues and challenges: A perspective. International Journal of Electronics and Information Technology (IJEIT), ISSN, pp.2277-3754.

Gartner: Seven cloud-computing security risks. InfoWorld. 2008-07-02. http://www.infoworld.com/d/security-central/gartnerseven-cloudcomputing-security-risks-853.

Chen, S., Nepal, S. and Liu, R., 2011, September. Secure connectivity for intra-cloud and inter-cloud communication. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on (pp. 154-159). IEEE.

Rohrmann, C.A., Cunha, S.R. and Falci, J., 2015. Some legal aspects of cloud computing contracts. J. Int't Com. L. & Tech., 10, p.37.

Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), pp.372-386.

Los, R., Shackleford, D. and Sullivan, B., 2013. The notorious nine cloud computing top threats in 2013. Cloud Security Alliance.

Bhadauria, R. and Sanyal, S., 2012. Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764.

Das, S., Kagan, M. and Crupnicoff, D., 2010. Faster and efficient VM migrations for improving SLA and ROI in cloud infrastructures. DC CAVES.

Everett, C., 2009. Cloud computing–A question of trust. Computer Fraud & Security, 2009(6), pp.5-7.

Sathya, M. R., & Ansari, M. M. T. (2015). Load frequency control using Bat inspired algorithm based dual mode gain scheduling of PI controllers for interconnected power system. International Journal of Electrical Power & Energy Systems, 64, 365-374.