Incremental cryptography and application to virus protection
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Communications of the ACM
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
NetFPGA--An Open Platform for Gigabit-Rate Network Switching and Routing
MSE '07 Proceedings of the 2007 IEEE International Conference on Microelectronic Systems Education
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Programming amazon web services
Programming amazon web services
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Scientific Cloud Computing: Early Definition and Experience
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
AlfredO: an architecture for flexible interaction with electronic devices
Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware
Future Generation Computer Systems
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Virtual Infrastructure Management in Private and Hybrid Clouds
IEEE Internet Computing
Securing elastic applications on mobile devices for cloud computing
Proceedings of the 2009 ACM workshop on Cloud computing security
Calling the cloud: enabling mobile phones as interfaces to cloud applications
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
A Taxonomy and Survey of Cloud Computing Systems
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A virtual cloud computing provider for mobile devices
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Enabling public verifiability and data dynamics for storage security in cloud computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Mobility Can Help: Protect User Identity with Dynamic Credential
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Editorial: Special section: Federated resource management in grid and cloud computing systems
Future Generation Computer Systems
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
SOSE '10 Proceedings of the 2010 Fifth IEEE International Symposium on Service Oriented System Engineering
The reservoir model and architecture for open federated cloud computing
IBM Journal of Research and Development
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Augmented smartphone applications through clone cloud execution
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
Authentication in the clouds: a framework and its application to mobile users
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
WOWMOM '10 Proceedings of the 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
DENS: Data Center Energy-Efficient Network-Aware Scheduling
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Mobile Networks and Applications
Scalable and Energy-Efficient Scheduling Techniques for Large-Scale Systems
CIT '11 Proceedings of the 2011 IEEE 11th International Conference on Computer and Information Technology
Addressing cloud computing security issues
Future Generation Computer Systems
A Security Framework of Group Location-Based Mobile Applications in Cloud Computing
ICPPW '11 Proceedings of the 2011 40th International Conference on Parallel Processing Workshops
A Survey of Research on Mobile Cloud Computing
ICIS '11 Proceedings of the 2011 10th IEEE/ACIS International Conference on Computer and Information Science
Energy-Aware High Performance Computing: A Taxonomy Study
ICPADS '11 Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems
Energy-efficient and multifaceted resource management for profit-driven virtualized data centers
Future Generation Computer Systems
T-Alloc: A practical energy efficient resource allocation algorithm for traditional data centers
Future Generation Computer Systems
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing
The Journal of Supercomputing
The Journal of Supercomputing
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectations. According to the recent survey conducted by the International Data Corporation, most IT Executives and CEOs are not interested in adopting such services due to the risks associated with security and privacy. The security threats have become a hurdle in the rapid adaptability of the mobile cloud computing paradigm. Significant efforts have been devoted in research organizations and academia to build secure mobile cloud computing environments and infrastructures. In spite of the efforts, there are a number of loopholes and challenges that still exist in the security policies of mobile cloud computing. This literature review: (a) highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, (b) identifies the potential problems, and (c) provides a taxonomy of the state of the art.