Mobile Cloud Computing: Security Threats

被引:0
|
作者
Vikas, Solanke S. [1 ]
Gurudatt, Kulkarni A. [2 ]
Pawan, Katgaonkar [3 ]
Shyam, Gupta [1 ]
机构
[1] Siddhant Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
[2] Siddhant Coll Engn, Dept Elect & Telecommun, Pune, Maharashtra, India
[3] Prof Rame Meghe Inst Technol & Res, Dept Comp Engn, Amravati, India
关键词
Cloud; Security; mobile; Computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Within the previous few years, the globe of mobile computing has grown enormously. Devices like PDAs, handhelds and digital cellular phones that started off as gadgets of luxury became a necessity in today's "always-stay-connected" method. To facilitate quality of such devices whereas not disconnection from the network, Mobile scientific discipline came into existence. this permits the mobile node to use 2 scientific discipline addresses: a tough and quick home address and a care-of address that changes at each new purpose of attachment. but with the advantages of Mobile scientific discipline to boot came the disadvantages, the biggest of them being that of security. throughout this paper, we've got a bent to debate a number of the common security threats that mobile scientific discipline networks square measure exposed to what is more as some planned solutions to agitate such threats. The recent years have witnessed an unbelievable growth among the vary of mobile internet users and they would really like for quality support is indispensable for seamless internet property. Mobile scientific discipline may be a top quality support protocol that supports roaming across multiple Access Points whereas not having to reestablish the highest to end affiliation. throughout this paper, we've got a bent to require the position that despite several challenges that Mobile scientific discipline faces, it would sway be the protocol for supporting quality among the longer term. we've got a bent to support our claim by analyzing the factors which will influence the widespread adoption of Mobile scientific discipline which we tend to go any to dialogue the counter claims in a trial to convert the reader that the advantages of Mobile scientific discipline outweighs its disadvantage.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Comparative Analysis of Security Threats in Mobile Cloud Computing Environment
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 385 - 390
  • [2] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [3] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [4] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [5] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [6] Security threats of virtualization in cloud computing
    [J]. Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [7] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32
  • [8] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [9] A Classification and Characterization of Security Threats in Cloud Computing
    Islam, Tariqul
    Manivannan, D.
    Zeadally, Sherali
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 1 - 17
  • [10] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    [J]. 2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111