Abstract
Cloud computing is the coming new era of information processing and has proved its benefits in high scalability and functional diversity. However, almost all cloud-computing architectures including SaaS, PaaS, and IaaS are vulnerable to serious security issues. Similarly, Mobile Cloud Computing (MCC) is vital to overcoming mobile limited storage and computing capabilities. MCC authentication and authorization issues must be provided on two levels: login password control and the environment from where the cloud is accessed. MCC has overcome the barrier of limited storage by providing remote storage but requires a strict security system that is responsible for retrievability, integrity, and seamless storage access. Elasticity and connectivity are also of major concern in MCC because delays and jitters cause degradation in the user experience. Cloud-computing architecture creates more challenges in maintaining security because of the liberty of users to choose any MCC architecture. Thus in this paper we discuss current cloud computing issues and future directions.

Similar content being viewed by others
References
ABIResearch: Mobile Cloud Computing—Next Generation Browsers, Widgets, SIM, Network-as-a-Service, and Platform-as-a-Service, 3Q 2009. [Online]. Available: http://www.abiresearch.com/research/1003385
Chen K, Zheng W (2009) Cloud Computing System examples and current research situation [J]. Softw J 5:1337–1348
Chen Q, Deng Q. Cloud Computing and its key techniques. Computing Applications. 100 I - 908 1 (2009) 09 - 2562 - 06
Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2009) Above the clouds: A Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep
Kang C, WeiMing Z (2009) Cloud computing: system. Instance and current research. J Softw 20(5):1337–1347
Dietrich K, Winter J. Towards a trustworthy, lightweight cloud computing framework for embedded systems. Proceedings of the 4th international conference on Trust and trustworthy computing, June 22–24, 2011, Pittsburgh, PA
Sandhu R, Boppana R, Krishnan R, Reich J, Wolff T, Zachry J. Towards a discipline of mission-aware cloud computing, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, October 08-08, 2010, Chicago, Illinois, USA
Zhang X, Kunjithapatham A, Jeong S, Gibbs S (2011) Towards an elastic application model for augmenting the computing capabilities of mobile devices with Cloud Computing. Mob Netw Appl 16(3):270–284
Chang F, Dean J, Ghemawat S, Hsieh W, Wallach D, Burrows M, Chandra T, Fikes A, Gruber R (2006) Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI’06)
Duvall M. Cloud, Mobile Computing Raise Security Fears: Study. Information Management Online, November 10, 2010, http://www.information-management.com/news/cloud-computing-security-risk-10019083-1.html
Bregman M. Five Guidelines for Cloud Computing and Device Security in The ‘Always Able’ Era. 29/04/2011 by Cloud Security Alliance (CSA), http://www.infosecurity-us.com/blog/2011/4/29/five-guidelines-for-cloud-computing-and-device-security-in-the-always-able-era/332.aspx
Violino B. Five cloud security trends experts see for 2011, December 16, 2010, CSO http://www.csoonline.com/article/647128/five-cloud-security-trends-experts-see-for-2011?page=1
Cox PA (2011) Mobile cloud computing: Devices, trends, issues, and the enabling technologies. IBM developer Works, http://www.ibm.com/developerworks/cloud/library/cl-mobilecloudcomputing/
Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Schemes for Mobile Cloud Computing. In: 2010 Eleventh International Conference on Mobile Data Management, pp 387–392
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z. Authentication in the Clouds: A Framework and its Application to Mobile Users. CCSW’10, October 8, 2010, Chicago, Illinois, USA
Tsai C, Lin U, Chang AY, Chen C (2010) Information security issue of enterprises adopting the application of cloud computing. In: Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, pp 645–649
Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security
Itani W, Kayssi A, Chehab A (2010) 2010 International Conference on Energy Aware Computing. In: 2010 International Conference on Energy Aware Computing (ICEAC), pp 1–2
Liu W, Zhang L, Wu C, Cai H, Qin L (2010) A Computing Mode Suitable for Medium and Small-Sized Enterprises Cloud Computing. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp 57–60
Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky: dependable and secure storage in a cloud-of-clouds. In: EuroSys ’11: Proceedings of the sixth conference on Computer systems
Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U (2011) 3 dimensional security in cloud computing. In: 2011 3rd International Conference on Computer Research and Development (ICCRD), vol. 3, pp 198–201
Wang C, Wang Q, Ren K, Lou W. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing. (Accepted, but not yet published)
Zheng Q, Xu S (2011) Fair and dynamic proofs of retrievability. In: CODASPY ’11: Proceedings of the first ACM conference on Data and application security and privacy
Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Scheme for Mobile Cloud Computing. Eleventh International Conference on Mobile Data Management, pp 387–392
Liu Q, Jian X, Hu J, Zhao H, Zhang S (2009) An Optimized Solution for Mobile Environment Using Mobile Cloud Computing. Wireless Communications, Networking and Mobile Computing, pp 1–5
Park J, Yu H, Chung K, Lee E (2011) Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud Computing. Advanced Information Networking and Applications (WAINA), pp 520–525
Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. ACM/IFIP/USENIX International Conference on Middleware (Middleware ’09), pp 1–20
Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. ACM workshop on Cloud computing security (CCSW ’09), pp 127–134
Satyanarayanan M, Bahl V, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–28
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance. December 2009
Cloud Architecture Reference Models: A Survey. NIST, NIST CCRATWG 004 v2, January 25, 2011
Interoperable Clouds: A White Paper from the Open Cloud Standards Incubator. DMTF, DSP-ISO101, November 11, 2009
Cloud computing Use Cases White Paper Version 4.0. Cloud Computing Use Case Discussion Group, July 2, 2010
IBM Smart Analytics Cloud. IBM, September 2010
Cisco Cloud Computing Data Center Strategy, Architecture, and Solutions. Cisco, 2009
Romano SP, Amirante A, Castaldi T, Miniero L, Buono A. IETF internet-draft, Cloud Reference Framework. IETF, July 2011
Open Security Architecture (OSA). Cloud Computing Patterns. http://www.opensecurityarchitecture.org/cms/library/patternlandscape/251-pattern-cloud-computing
Cloud Computing Initiative: May 6, 2009 Summit Briefing Book. GSA, May 13, 2009
Cloud Ready Data Center Reference Architecture. Jupiter Networks, February 2011
Cloud Storage for Cloud Computing. SNIA (Advancing storage & information technology), September 2009
Charlton S (2008) Cloud Computing and the Next Generation of Enterprise Architecture. Elastra
Top Threats to Cloud Computing V1.0. Cloud Security Alliance, March 2010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shon, T., Cho, J., Han, K. et al. Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction. Mobile Netw Appl 19, 404–413 (2014). https://doi.org/10.1007/s11036-014-0509-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-014-0509-8