Review Article

Mobile Cloud Computing: Taxonomy and Challenges

Table 3

Summary of security and privacy techniques in MCC.

IssuesContributionTechniquesImplementationMetricsLimitations

CMReS [38]Security and privacy issue after migration to the cloudSchemeEncryption schemeMobile phone, an Android mobile application developed computer, and WIFI(i) Turnaround time
(ii) Energy consumption
(iii) Resource utilization
Encryption and decryption of task offloading are not considered

ESACSM [39]Security challenges in mobile cloudSecured access for mobile cloudArchitecture and algorithm.Mobile devices, computing devices, and wireless network(i) Response time
(ii) Encryption time
(iii) Decryption time
(iv) Latency
Increase in access time due to the deployment of cloudlet and encryption-decryption approach

RMTAC [40]Due to the absence of fine-grained secure access control model to protect privacy information from unauthorized accessSecured fine-grained access controlReputation and trustworthy schemeOPNET, wireless mesh backbone, and a cloud service platform(i) Effective recommendation rate, accuracy rate and utility for RMTAC
(ii) Successful acceptance rate and success rate of malicious access
Encryption/signature based privacy preserving skill are not considered

EACDAC [41]Issue of secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computingFramework for data access control, including an encryption schemeFramework and schemeMobi-cloud platform and Android smart phones(i) Computation overheadTime increase due to complex encryption-decryption scheme

PADMC [42]Lack of efficient authentication scheme for distributed mobile cloud computing servicesSingle key authentication schemeAuthentication scheme based on bilinear pairing cryptosystem and dynamic nonce generationNot mentionedComputation timeCryptographic techniques are computationally cumbersome for the real-time execution