UIJRT » United International Journal for Research & Technology

Security, Privacy Issues and Solutions of Mobile Cloud Computing

Mohammed Lawal Toro, Nuraddeen Ado Muhammad, Aliyu Rabiu Shu’aibu, Muhammad Amin Garba, Abdulrazaq Abdulaziz and Kasim Musa

Total Views / Downloads: 94 

Cite ➜

Toro, M.L., Muhammad, N.A., Shu’aibu, A.R., Garba, M.A., Abdulaziz, A. and Musa, K., 2021. Security, Privacy Issues and Solutions of Mobile Cloud Computing. United International Journal for Research & Technology (UIJRT), 2(7), pp.112-117.


Simplicity usage, accessibility and the lack of internationally agreed overall service access / safety protocols allow the mobile cloud vulnerable to various forms of violence. The introduction of smartphones and the extensive usage of other technology such as smartphones has brought significant changes to cloud storage, providing a higher level of versatility in data access, and thus increasing the need for security protocols. Unlike many problems, when dealing with business goals, financial activity and health care, protection and confidentiality are critical. In this study, we discuss mobile cloud computing in detail, then the model and role of the whole technology. Finally, we dragged some solutions for the three-level security and privacy concerns.

Keywords: Mobile cloud computing, Technology, privacy issues, security.


  1. IDC 2016, ‘Worldwide Cloud IT Infrastructure Spend Grew 21.9% to $29.0 Billion in 2015’, Press release, Framingham, viewed May 2016, http://www.idc.com/getdoc.jsp?containerId=prUS41176716
  2. Cisco 2016, ‘Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020’, Cisco Systems, pp. 5. viewed Jun 2016, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visualnetworking-index-vni/mobile-white-paper-c11-520862.htm
  3. Akhil Behl 2011, ‘Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation’, 2011 World Congress on Information and Communication Technologies, pp. 217-222, December
  4. Talukdar, A. K. (2010). Mobile Computing, 2E. Tata McGraw-Hill Education.
  5. Stojmenovic, I. (2002). Handbook of wireless networks and mobile computing. New York: Wiley.
  6. Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multitier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp. 14–19.
  7. Bahrami, M., Singhal, M., 2015. A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 189–198.
  8. Flores, H., Srirama, S. N., & Paniagua, C. (2012). Towards mobile cloud applications. International Journal of Pervasive Computing and Communications.M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
  9. Mishra, J., Dash, S. K., & Dash, S. (2012, January). Mobile-cloud: A framework of cloud computing for mobile application. In International Conference on Computer Science and Information Technology (pp. 347-356). Springer, Berlin, Heidelberg.
  10. Yin, Z., Yu, F. R., & Bu, S. (2014, December). Joint cloud computing and wireless networks operations: a game theoretic approach. In 2014 IEEE Global Communications Conference (pp. 4977-4982). IEEE.
  11. Sharifloo, A. M., & Metzger, A. (2017). Mcaas: Model checking in the cloud for assurances of adaptive systems. In Software Engineering for Self-Adaptive Systems III. Assurances (pp. 137-153). Springer, Cham.
  12. Song, W., & Su, X. (2011, May). Review of mobile cloud computing. In 2011 IEEE 3rd International Conference on Communication Software and Networks (pp. 1-4). IEEE.
  13. Kumar, R., & Rajalakshmi, S. (2013, December). Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems. In 2013 International Conference on Computer Sciences and Applications (pp. 663-669). IEEE.
  14. Vikas, S. S., Pawan, K., Gurudatt, A. K., & Shyam, G. (2014, February). Mobile cloud computing: Security threats. In 2014 international conference on electronics and communication systems (ICECS) (pp. 1-4). IEEE.
  15. Jo, M., Maksymyuk, T., Strykhalyuk, B., & Cho, C. H. (2015). Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications, 22(3), 50-58.
  16. Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
  17. Liu, F., Shu, P., Jin, H., Ding, L., Yu, J., Niu, D., & Li, B. (2013). Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications. IEEE Wireless Communications, 20(3), 14-22.
  19. Li, H., Shou, G., Hu, Y., & Guo, Z. (2016, March). Mobile edge computing: Progress and challenges. In 2016 4th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 83-84). IEEE.
  20. Koe, A. S. V., & Lin, Y. (2019). Offline privacy-preserving proxy re-encryption in mobile cloud computing. Pervasive and Mobile Computing, 59, 101081.
  21. Jiang, X., Kong, W., Jin, X., & Shen, J. (2019, September). A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing. In International Conference on Machine Learning for Cyber Security (pp. 94-111). Springer, Cham.
  22. Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., & Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Generation Computer Systems, 72, 273-287.
  23. Li, H., Shou, G., Hu, Y., & Guo, Z. (2016, March). Mobile edge computing: Progress and challenges. In 2016 4th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 83-84). IEEE.
  24. Xing, T., Liang, H., Huang, D., & Cai, L. X. (2012, June). Geographic-based service request scheduling model for mobile cloud computing. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1446-1453). IEEE.

For Conference & Paper Publication​

UIJRT Publication - International Journal