Simplicity usage, accessibility and the lack of internationally agreed overall service access / safety protocols allow the mobile cloud vulnerable to various forms of violence. The introduction of smartphones and the extensive usage of other technology such as smartphones has brought significant changes to cloud storage, providing a higher level of versatility in data access, and thus increasing the need for security protocols. Unlike many problems, when dealing with business goals, financial activity and health care, protection and confidentiality are critical. In this study, we discuss mobile cloud computing in detail, then the model and role of the whole technology. Finally, we dragged some solutions for the three-level security and privacy concerns.