Mobile Cloud Computing: Security Threats

被引:0
|
作者
Vikas, Solanke S. [1 ]
Gurudatt, Kulkarni A. [2 ]
Pawan, Katgaonkar [3 ]
Shyam, Gupta [1 ]
机构
[1] Siddhant Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
[2] Siddhant Coll Engn, Dept Elect & Telecommun, Pune, Maharashtra, India
[3] Prof Rame Meghe Inst Technol & Res, Dept Comp Engn, Amravati, India
关键词
Cloud; Security; mobile; Computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Within the previous few years, the globe of mobile computing has grown enormously. Devices like PDAs, handhelds and digital cellular phones that started off as gadgets of luxury became a necessity in today's "always-stay-connected" method. To facilitate quality of such devices whereas not disconnection from the network, Mobile scientific discipline came into existence. this permits the mobile node to use 2 scientific discipline addresses: a tough and quick home address and a care-of address that changes at each new purpose of attachment. but with the advantages of Mobile scientific discipline to boot came the disadvantages, the biggest of them being that of security. throughout this paper, we've got a bent to debate a number of the common security threats that mobile scientific discipline networks square measure exposed to what is more as some planned solutions to agitate such threats. The recent years have witnessed an unbelievable growth among the vary of mobile internet users and they would really like for quality support is indispensable for seamless internet property. Mobile scientific discipline may be a top quality support protocol that supports roaming across multiple Access Points whereas not having to reestablish the highest to end affiliation. throughout this paper, we've got a bent to require the position that despite several challenges that Mobile scientific discipline faces, it would sway be the protocol for supporting quality among the longer term. we've got a bent to support our claim by analyzing the factors which will influence the widespread adoption of Mobile scientific discipline which we tend to go any to dialogue the counter claims in a trial to convert the reader that the advantages of Mobile scientific discipline outweighs its disadvantage.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [32] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    [J]. 11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [33] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [34] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [35] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    [J]. The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [36] Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures
    Brohi, Sarfraz Nawaz
    Bamiah, Mervat Adib
    Brohi, Muhammad Nawaz
    Kamran, Rukshanda
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 151 - 155
  • [37] A Case Study for the Cloud Computing Security Threats in a Governmental Organization
    Albakri, Sameer Hasan
    Shanmgam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 452 - 457
  • [38] The Threats of Security on o Virt Private Cloud Computing Platform
    Fan, ZhengLe
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 419 - 421
  • [39] Dissection and Proposal of Multitudinal Security Threats and Menace in Cloud Computing
    Rawat, Seema
    Dhruv, Bhawna
    Kumar, Praveen
    Mittal, Payal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 123 - 128
  • [40] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191