2017
DOI: 10.1007/s11227-016-1945-y
|View full text |Cite
|
Sign up to set email alerts
|

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 88 publications
0
17
0
Order By: Relevance
“…In recent years, a number of reviews and surveys have been published to analyze MCC in secondary studies [8][9][10][11] and are considered as related to this study. David et al [8] focused on the various encryption techniques (and their variants) that are presently being utilized, and on possible future works that could improve privacy-oriented encryption techniques and security.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, a number of reviews and surveys have been published to analyze MCC in secondary studies [8][9][10][11] and are considered as related to this study. David et al [8] focused on the various encryption techniques (and their variants) that are presently being utilized, and on possible future works that could improve privacy-oriented encryption techniques and security.…”
Section: Related Workmentioning
confidence: 99%
“…In the case of SQL Server databases, the user authentication data can be stored encrypted in another database, not even visible to the database administrator. Also, an implementation that does not take account of the vulnerabilities of such application may allow attackers to steal data using SQL injection (Gicev et al, 2013; Bhatia, 2017), which are still one of the most significant databases weaknesses.…”
Section: Information Security Challenges -Vulnerabilities Brought By mentioning
confidence: 99%
“…Authentication confirms the consumer's right to access the information, and preserve the user's account from stealing identity and fraud. In the proposed model, the equation of authentication (9) uses four parameters [30], [31]: passwordbased, smart card based, one-time password-based and biometrics-based.…”
Section: F Authentication (Tv 5 )mentioning
confidence: 99%