Skip to main content
Log in

Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Cloud computing is the coming new era of information processing and has proved its benefits in high scalability and functional diversity. However, almost all cloud-computing architectures including SaaS, PaaS, and IaaS are vulnerable to serious security issues. Similarly, Mobile Cloud Computing (MCC) is vital to overcoming mobile limited storage and computing capabilities. MCC authentication and authorization issues must be provided on two levels: login password control and the environment from where the cloud is accessed. MCC has overcome the barrier of limited storage by providing remote storage but requires a strict security system that is responsible for retrievability, integrity, and seamless storage access. Elasticity and connectivity are also of major concern in MCC because delays and jitters cause degradation in the user experience. Cloud-computing architecture creates more challenges in maintaining security because of the liberty of users to choose any MCC architecture. Thus in this paper we discuss current cloud computing issues and future directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. ABIResearch: Mobile Cloud Computing—Next Generation Browsers, Widgets, SIM, Network-as-a-Service, and Platform-as-a-Service, 3Q 2009. [Online]. Available: http://www.abiresearch.com/research/1003385

  2. Chen K, Zheng W (2009) Cloud Computing System examples and current research situation [J]. Softw J 5:1337–1348

    Google Scholar 

  3. Chen Q, Deng Q. Cloud Computing and its key techniques. Computing Applications. 100 I - 908 1 (2009) 09 - 2562 - 06

  4. Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2009) Above the clouds: A Berkeley view of cloud computing. University of California, Berkeley, Tech. Rep

  5. Kang C, WeiMing Z (2009) Cloud computing: system. Instance and current research. J Softw 20(5):1337–1347

    Google Scholar 

  6. Dietrich K, Winter J. Towards a trustworthy, lightweight cloud computing framework for embedded systems. Proceedings of the 4th international conference on Trust and trustworthy computing, June 22–24, 2011, Pittsburgh, PA

  7. Sandhu R, Boppana R, Krishnan R, Reich J, Wolff T, Zachry J. Towards a discipline of mission-aware cloud computing, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, October 08-08, 2010, Chicago, Illinois, USA

  8. Zhang X, Kunjithapatham A, Jeong S, Gibbs S (2011) Towards an elastic application model for augmenting the computing capabilities of mobile devices with Cloud Computing. Mob Netw Appl 16(3):270–284

    Article  Google Scholar 

  9. Chang F, Dean J, Ghemawat S, Hsieh W, Wallach D, Burrows M, Chandra T, Fikes A, Gruber R (2006) Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI’06)

  10. Duvall M. Cloud, Mobile Computing Raise Security Fears: Study. Information Management Online, November 10, 2010, http://www.information-management.com/news/cloud-computing-security-risk-10019083-1.html

  11. Bregman M. Five Guidelines for Cloud Computing and Device Security in The ‘Always Able’ Era. 29/04/2011 by Cloud Security Alliance (CSA), http://www.infosecurity-us.com/blog/2011/4/29/five-guidelines-for-cloud-computing-and-device-security-in-the-always-able-era/332.aspx

  12. Violino B. Five cloud security trends experts see for 2011, December 16, 2010, CSO http://www.csoonline.com/article/647128/five-cloud-security-trends-experts-see-for-2011?page=1

  13. Cox PA (2011) Mobile cloud computing: Devices, trends, issues, and the enabling technologies. IBM developer Works, http://www.ibm.com/developerworks/cloud/library/cl-mobilecloudcomputing/

  14. Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Schemes for Mobile Cloud Computing. In: 2010 Eleventh International Conference on Mobile Data Management, pp 387–392

  15. Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z. Authentication in the Clouds: A Framework and its Application to Mobile Users. CCSW’10, October 8, 2010, Chicago, Illinois, USA

  16. Tsai C, Lin U, Chang AY, Chen C (2010) Information security issue of enterprises adopting the application of cloud computing. In: Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, pp 645–649

  17. Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security

  18. Itani W, Kayssi A, Chehab A (2010) 2010 International Conference on Energy Aware Computing. In: 2010 International Conference on Energy Aware Computing (ICEAC), pp 1–2

  19. Liu W, Zhang L, Wu C, Cai H, Qin L (2010) A Computing Mode Suitable for Medium and Small-Sized Enterprises Cloud Computing. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp 57–60

  20. Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky: dependable and secure storage in a cloud-of-clouds. In: EuroSys ’11: Proceedings of the sixth conference on Computer systems

  21. Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U (2011) 3 dimensional security in cloud computing. In: 2011 3rd International Conference on Computer Research and Development (ICCRD), vol. 3, pp 198–201

  22. Wang C, Wang Q, Ren K, Lou W. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing. (Accepted, but not yet published)

  23. Zheng Q, Xu S (2011) Fair and dynamic proofs of retrievability. In: CODASPY ’11: Proceedings of the first ACM conference on Data and application security and privacy

  24. Klein A, Mannweiler C, Schneider J, Schotten HD (2010) Access Scheme for Mobile Cloud Computing. Eleventh International Conference on Mobile Data Management, pp 387–392

  25. Liu Q, Jian X, Hu J, Zhao H, Zhang S (2009) An Optimized Solution for Mobile Environment Using Mobile Cloud Computing. Wireless Communications, Networking and Mobile Computing, pp 1–5

  26. Park J, Yu H, Chung K, Lee E (2011) Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud Computing. Advanced Information Networking and Applications (WAINA), pp 520–525

  27. Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. ACM/IFIP/USENIX International Conference on Middleware (Middleware ’09), pp 1–20

  28. Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. ACM workshop on Cloud computing security (CCSW ’09), pp 127–134

  29. Satyanarayanan M, Bahl V, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–28

    Article  Google Scholar 

  30. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance. December 2009

  31. Cloud Architecture Reference Models: A Survey. NIST, NIST CCRATWG 004 v2, January 25, 2011

  32. Interoperable Clouds: A White Paper from the Open Cloud Standards Incubator. DMTF, DSP-ISO101, November 11, 2009

  33. Cloud computing Use Cases White Paper Version 4.0. Cloud Computing Use Case Discussion Group, July 2, 2010

  34. IBM Smart Analytics Cloud. IBM, September 2010

  35. Cisco Cloud Computing Data Center Strategy, Architecture, and Solutions. Cisco, 2009

  36. Romano SP, Amirante A, Castaldi T, Miniero L, Buono A. IETF internet-draft, Cloud Reference Framework. IETF, July 2011

  37. Open Security Architecture (OSA). Cloud Computing Patterns. http://www.opensecurityarchitecture.org/cms/library/patternlandscape/251-pattern-cloud-computing

  38. Cloud Computing Initiative: May 6, 2009 Summit Briefing Book. GSA, May 13, 2009

  39. Cloud Ready Data Center Reference Architecture. Jupiter Networks, February 2011

  40. Cloud Storage for Cloud Computing. SNIA (Advancing storage & information technology), September 2009

  41. Charlton S (2008) Cloud Computing and the Next Generation of Enterprise Architecture. Elastra

  42. Top Threats to Cloud Computing V1.0. Cloud Security Alliance, March 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taeshik Shon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shon, T., Cho, J., Han, K. et al. Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction. Mobile Netw Appl 19, 404–413 (2014). https://doi.org/10.1007/s11036-014-0509-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-014-0509-8

Keywords

Navigation