Classification and Mapping of Adaptive Security for Mobile Computing

被引:11
|
作者
Sajjad, Maryam [1 ]
Ahmad, Aakash [2 ]
Malik, Asad Waqar [1 ]
Altamimi, Ahmed B. [2 ]
Alseadoon, Ibrahim [2 ]
机构
[1] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad 44000, Pakistan
[2] Univ Hail UoH, Coll Comp Sci & Engn CCSE, Hail, Saudi Arabia
关键词
Security; Mobile computing; Mobile handsets; Mobile communication; Servers; Data privacy; Systematics; Autonomic computing; evidence based software engineering; mobile computing; security; mapping study; PROTOCOL;
D O I
10.1109/TETC.2018.2791459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies-published from 2003 to 2017-on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.
引用
收藏
页码:814 / 832
页数:19
相关论文
共 50 条
  • [41] Data Classification for achieving Security in cloud computing
    Shaikh, Rizwana
    Sasikumar, M.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 493 - 498
  • [42] Reactive and Adaptive Security Monitoring in Cloud Computing
    Elbaz, Clement
    Rilling, Louis
    Morin, Christine
    [J]. 2018 IEEE 3RD INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2018, : 5 - 7
  • [43] A Mobile Computing Framework Based on Adaptive Mobile Code Offloading
    Kaya, Mahir
    Kocyigit, Altan
    Eren, P. Erhan
    [J]. 2014 40TH EUROMICRO CONFERENCE SERIES ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2014), 2014, : 479 - 482
  • [44] Security Outlook for Cloud Computing: A Proposed Architectural-Based Security Classification for Cloud Computing
    Khari, Manju
    Gupta, Sana
    Kumar, Manoj
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2153 - 2158
  • [45] An Efficient Security Algorithm in Mobile Computing for Resource Constrained Mobile Devices
    Light, Janet
    David, Deepika
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 113 - 114
  • [46] A Systematic Mapping on Security Threats in Mobile Devices
    Lacerda, Anselmo
    de Queiroz, Ruy
    Barbosa, Marcio
    [J]. 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 286 - 291
  • [47] Cell Classification in Mobile Networks with Reservoir Computing
    Peng Yu
    Guo Jia
    Peng Xi-yuan
    [J]. 2010 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE I2MTC 2010, PROCEEDINGS, 2010,
  • [48] Adaptive Video Streaming in Mobile Cloud Computing
    Tamizhselvi, S. P.
    Muthuswamy, Vijayalakshmi
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1002 - 1005
  • [49] An adaptive location management algorithm for mobile computing
    Chintalapati, RVJ
    Kumar, V
    Datta, A
    [J]. LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 133 - 140
  • [50] A new adaptive checkpointing strategy for mobile computing
    Men, CG
    Zuo, DC
    Yang, XZ
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (01) : 15 - 20