2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755144
|View full text |Cite
|
Sign up to set email alerts
|

Security frameworks for mobile cloud computing: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…This creates a number of security vulnerabilities that mostly arise with the architectural and infrastructural modifications in 5G. Therefore, the open architecture of MCC and the versatility of mobile terminals create vulnerabilities through which adversaries could launch threats and breach privacy in mobile clouds [10].…”
Section: Security Challenges In Mobile Clouds and Mecmentioning
confidence: 99%
“…This creates a number of security vulnerabilities that mostly arise with the architectural and infrastructural modifications in 5G. Therefore, the open architecture of MCC and the versatility of mobile terminals create vulnerabilities through which adversaries could launch threats and breach privacy in mobile clouds [10].…”
Section: Security Challenges In Mobile Clouds and Mecmentioning
confidence: 99%
“…In recent years, a number of reviews and surveys have been published to analyze MCC in secondary studies [8][9][10][11] and are considered as related to this study. David et al [8] focused on the various encryption techniques (and their variants) that are presently being utilized, and on possible future works that could improve privacy-oriented encryption techniques and security.…”
Section: Related Workmentioning
confidence: 99%
“…Also, Kulkarni et al [9] concentrated on the existing frameworks of MCC, although they did not mention other solutions. In addition, Bhatia and Verma [10] presented a state-of-the-…”
Section: Related Workmentioning
confidence: 99%
“…This creates a number of security vulnerabilities that mostly arise with the architectural and infrastructural modifications in 5G. Therefore, the open architecture of MCC and the versatility of mobile terminals create vulnerabilities through which adversaries could launch threats and breach privacy in mobile clouds [5].…”
Section: A Security Challenges In Mobile Cloudsmentioning
confidence: 99%