Classification and Mapping of Adaptive Security for Mobile Computing

被引:11
|
作者
Sajjad, Maryam [1 ]
Ahmad, Aakash [2 ]
Malik, Asad Waqar [1 ]
Altamimi, Ahmed B. [2 ]
Alseadoon, Ibrahim [2 ]
机构
[1] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad 44000, Pakistan
[2] Univ Hail UoH, Coll Comp Sci & Engn CCSE, Hail, Saudi Arabia
关键词
Security; Mobile computing; Mobile handsets; Mobile communication; Servers; Data privacy; Systematics; Autonomic computing; evidence based software engineering; mobile computing; security; mapping study; PROTOCOL;
D O I
10.1109/TETC.2018.2791459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies-published from 2003 to 2017-on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.
引用
收藏
页码:814 / 832
页数:19
相关论文
共 50 条
  • [21] Security in CloneCloud for Mobile Cloud Computing
    Patel, Payal
    Patel, Rajan
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 752 - 756
  • [22] Security in Cloud Computing: a Mapping Study
    Cruz Zapata, Belen
    Luis Fernandez-Aleman, Jose
    Toval, Ambrosio
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 12 (01) : 161 - 184
  • [23] Adaptive Computing Resource Allocation for Mobile Cloud Computing
    Liang, Hongbin
    Xing, Tianyi
    Cai, Lin X.
    Huang, Dijiang
    Peng, Daiyuan
    Liu, Yan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [24] Adaptive context-aware service optimization in mobile cloud computing accounting for security aspects
    Nawrocki, Piotr
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    Szynkiewicz, Pawel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18):
  • [25] A survey of adaptive applications in mobile computing
    Al-bar, A
    Wakeman, I
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2001, : 246 - 251
  • [26] Adaptive computing targets mobile wireless
    Frenzel, LE
    [J]. ELECTRONIC DESIGN, 2001, 49 (20) : 30 - 30
  • [27] Adaptive Replication for Mobile Edge Computing
    Chang, Wan-Chi
    Wang, Pi-Chung
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (11) : 2422 - 2432
  • [28] Promoting Mobile Computing and Security Learning Using Mobile Devices
    You, Wanqing
    Qian, Kai
    Lo, Dan Chia-Tien
    Bhattacharya, Prabir
    Chen, Wei
    Rogers, Tamara
    Chern, Johng-Chern
    Yao, Junfeng
    [J]. 2015 5th IEEE Integrated STEM Education Conference (ISEC), 2015, : 205 - 209
  • [29] Adaptive Trust Scenarios for Mobile Security
    Bahtiyar, Serif
    Ermis, Orhan
    Caglayan, Mehmet Ufuk
    [J]. MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016), 2016, 9847 : 137 - 148
  • [30] Security and privacy issues in wireless and mobile computing
    Racherla, G
    Saha, D
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2000, : 509 - 513