2016
DOI: 10.4236/oalib.1102377
|View full text |Cite
|
Sign up to set email alerts
|

Data Security of Mobile Cloud Computing on Cloud Server

Abstract: Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage services, althoug… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…According to a number of researchers [16,1,7,11,12,17,4,15], the different key data security issues of cloud computing are discussed as follows.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…According to a number of researchers [16,1,7,11,12,17,4,15], the different key data security issues of cloud computing are discussed as follows.…”
Section: Discussionmentioning
confidence: 99%
“…The specifics of site of infrastructure or component devices are not known to most of the end-users, user do not require to comprehensively appreciate or control the technology infrastructure that supports their computing activities and the users do not necessarily have their own resources. [17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main purpose of the proposed architecture is to minimize Service Delay [26] [27], proposed the task scheduling algorithm is to minimize average Cloudlet Delay by using ETC matrix replica. The description of scheduling as follows: Let explain task set I = t1, t2, t3, t4, t5, tn, it is referred as meta-task submitted to scheduler.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In an additional part, a lot of works have a discussion about on how to pre-estimate the real boost in terms of energy [13]. For a code complication, offloading might consume more energy than that of local processing when the size of codes is small [14]. The study [15] suggests a program partitioning based on the assessment of the energy consumption (communication energy and computation energy) before the program execution.…”
Section: Related Workmentioning
confidence: 99%