Abstract
Mobile cloud computing (MCC) is one of the significant inventions in the field of information technology that empowers mobile applications by strengthening computational strength and storage in cloud-connected through the network. But there are several security issues while using MCC that are related to data security, partitioning, offloading, virtualization, mobile application or device, and privacy. Specifically, the security issues in educational institutions are rarely studied. This research aims to identify privacy and security issues while using MCC in educational institutions. Using Qualtrics, an online questionnaire survey is conducted for the study. The result illustrates that spam and network interruptions are the most prevalent security issues followed by viruses and phishing. The issues were found more prevalent in android operating system users and the methods being used to address the issues are not enough to maintain high-level security. Thus, a secure framework is required for safe MCC in educational institutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Openstack (2019). https://www.openstack.org/. Accessed 25 Apr 2019
Apple 2019. https://www.apple.com/icloud/. Accessed 25 Apr 2019
Google (2019). www.google.com/mobile/drive/. Accessed 25 Apr 2019
Mansuri, A.M., Verma, M., Laxkar, P.: Benefit of cloud computing for educational institutions and online marketing. Inf. Secur. Comput. Fraud 2(1), 5–9 (2014)
Wang, M., Chen, Y., Khan, M.: Mobile cloud learning for higher education: a case study of Moodle in the cloud. Int. Rev. Res. Open Distrib. Learn. 15(2), 254–267 (2014)
Hirsch, B., Ng, J.W.: Education beyond the cloud: anytime-anywhere learning in a smart campus environment. In: 2011 International Conference for Internet Technology and Secured Transactions. IEEE (2011)
Lytras, M.D., Zhuhadar, L., Zhang, J.X., Kurilovas, E.: Advances of scientific research on technology enhanced learning in social networks and mobile contexts: towards high effective educational platforms for next generation education. J. UCS 20(10), 1402–1406 (2014)
Hung, Shih, C.-S., Shieh, J.-P., Lee, C.-P., Huang, Y.-H.: Executing mobile applications on the cloud: framework and issues. Comput. Math Appl. 63(2), 573–587 (2012)
Ndeda, L.A., Ogara, S.O., Abeka, S.O.: A framework for secure mobile cloud computing in effective electronic learning (2018)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Khan, A.N., Kiah, M.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(5), 1278–1299 (2013)
Agrawal, N., Tapaswi, S.: A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mob. Comput. 52, 13–28 (2019)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer (2005)
Banerjee, A., Hasan, M., Rahman, M.A., Chapagain, R.: CLOAK: a stream cipher based encryption protocol for mobile cloud computing. IEEE Access 5, 17678–17691 (2017). https://doi.org/10.1109/ACCESS.2017.2744670
Han, J., Liu, Y., Sun, X., Song, L.: Enhancing data and privacy security in mobile cloud computing through quantum cryptography, p. 398. IEEE (2016)
Louk, M., Lim, H.: Homomorphic encryption in mobile multi cloud computing. In: 2015 International Conference on Information Networking (ICOIN). IEEE (2015)
Baharon, M.R., Shi, Q., Llewellyn-Jones, D.: A new lightweight homomorphic encryption scheme for mobile cloud computing. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE (2015)
Zhao, K., Jin, H., Zou, D., Chen, G., Dai, W.: Feasibility of deploying biometric encryption in mobile cloud computing. In: Proceedings - 2013 8th Annual ChinaGrid Conference, ChinaGrid (2013)
EyeprintID (2019). http://www.eyeverify.com/product-technology/core-technology. Accessed 25 Apr 2019
Wang, C., Yan, H.: Study of cloud computing security based on private face recognition. In: 2010 International Conference on Computational Intelligence and Software Engineering. IEEE (2010)
VeriFingerSDK (2019). http://www.neurotechnology.com/verifinger.html
Zeroual, A., Amroune, M., Derdour, M., Meraoumia, A., Bentahar, A.: Deep authentication model in Mobile Cloud Computing. In: 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE (2018)
Derawi, M.O., Yang, B., Busch, C.: Fingerprint recognition with embedded cameras on mobile phones. In: International Conference on Security and Privacy in Mobile Information and Communication Systems. Springer (2011)
Omri, F., Foufou, S., Hamila, R., Jarraya, M.: Cloud-based mobile system for biometrics authentication. In: 2013 13th International Conference on ITS Telecommunications (ITST) (2013)
Pawle, A.A., Pawar, V.P.: Face recognition system (FRS) on cloud computing for user authentication. Int. J. Soft Comput. Eng. (IJSCE) 3(4), 189–192 (2013)
Rassan, I.A., AlShaher, H.: Securing mobile cloud computing using biometric authentication (SMCBA). In: 2014 International Conference on Computational Science and Computational Intelligence. IEEE (2014)
Pointcheval, D., Zimmer, S.: Multi-factor authenticated key exchange. In: International Conference on Applied Cryptography and Network Security. Springer (2008)
Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9), 793–816 (2014)
Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., Sanders, W.: Secloud: a cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37, 215–227 (2013)
Barzamini, R., Hajati, F., Gheisari, S., Motamadinejad, M.B.: Short term load forecasting using multi-layer perception and fuzzy inference systems for Islamic countries. J. Appl. Sci. 12(1), 40–47 (2012)
Pakazad, S.K., Faez, K., Hajati, F.: Face detection based on central geometrical moments of face components. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 4225–4230 (2006)
Hajati, F., Cheraghian, A., Gheisari, S., Gao, Y., Mian, A.S.: Surface geodesic pattern for 3D deformable texture matching. Pattern Recogn. 62, 21–32 (2017)
Ayatollahi, F., Raie, A.A., Hajati, F.: Expression-invariant face recognition using depth and intensity dual-tree complex wavelet transform features. J. Electron. Imaging 24(2), 023031 (2015)
Abdoli, S., Hajati, F.: Offline signature verification using geodesic derivative pattern. In: 22nd Iranian Conference on Electrical Engineering (ICEE), pp. 1018–1023 (2014)
Hussain, S., Sianaki, O.A., Ababneh, N.: A survey on conversational agents/chatbots classification and design techniques. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, Cham (2019)
Sianaki, O.A., et al.: Internet of everything and machine learning applications: issues and challenges. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2018)
Daneshgar, F., Sianaki, O.A., Guruwacharya, P.: Blockchain: a research framework for data security and privacy. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, Cham (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Rana, A., Hajati, F. (2020). A Survey on Privacy and Security in Mobile Cloud Computing. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_99
Download citation
DOI: https://doi.org/10.1007/978-3-030-44038-1_99
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44037-4
Online ISBN: 978-3-030-44038-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)