JOURNAL ARTICLE

Mobile Cloud Computing: Security Analysis

Abstract

This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one Client. The two scenarios focus on Authentication. Based on the use-case scenarios, the paper presents a generic model for M2C with a description of entities and interactions among them. Based on this model, the paper analyzes potential security threats, in order to specify a set of general security requirements, with an emphasis on Authentication. These requirements could provide guidance to future security solutions or Authentication solutions for M2C communication and/or risk assessment.

Keywords:
Cloud computing Computer science Cloud computing security Computer security Authentication (law) Security analysis Computer security model Focus (optics) Mobile cloud computing Service provider Set (abstract data type) Service (business)

Metrics

1
Cited By
0.56
FWCI (Field Weighted Citation Impact)
13
Refs
0.71
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Security in Mobile Cloud Computing

Hero ModaresJaime LloretAmirhossein MoravejoshariehRosli Salleh

Advances in wireless technologies and telecommunication book series Year: 2013 Pages: 79-91
BOOK-CHAPTER

Mobile Cloud Computing Security Frameworks

Anita Dashti

IGI Global eBooks Year: 2018 Pages: 501-520
BOOK-CHAPTER

Mobile Cloud Computing Security Frameworks

Anita Dashti

Advances in business information systems and analytics book series Year: 2017 Pages: 292-317
BOOK-CHAPTER

Mobile and Cloud Computing Security

Fadi MuheidatLo’ai Tawalbeh

Studies in computational intelligence Year: 2020 Pages: 461-483
© 2026 ScienceGate Book Chapters — All rights reserved.