Issues Contribution Techniques Implementation Metrics Limitations CMReS [38 ] Security and privacy issue after migration to the cloud Scheme Encryption scheme Mobile phone, an Android mobile application developed computer, and WIFI (i) Turnaround time (ii) Energy consumption (iii) Resource utilization Encryption and decryption of task offloading are not considered ESACSM [39 ] Security challenges in mobile cloud Secured access for mobile cloud Architecture and algorithm. Mobile devices, computing devices, and wireless network (i) Response time (ii) Encryption time (iii) Decryption time (iv) Latency Increase in access time due to the deployment of cloudlet and encryption-decryption approach RMTAC [40 ] Due to the absence of fine-grained secure access control model to protect privacy information from unauthorized access Secured fine-grained access control Reputation and trustworthy scheme OPNET, wireless mesh backbone, and a cloud service platform (i) Effective recommendation rate, accuracy rate and utility for RMTAC (ii) Successful acceptance rate and success rate of malicious access Encryption/signature based privacy preserving skill are not considered EACDAC [41 ] Issue of secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computing Framework for data access control, including an encryption scheme Framework and scheme Mobi-cloud platform and Android smart phones (i) Computation overhead Time increase due to complex encryption-decryption scheme PADMC [42 ] Lack of efficient authentication scheme for distributed mobile cloud computing services Single key authentication scheme Authentication scheme based on bilinear pairing cryptosystem and dynamic nonce generation Not mentioned Computation time Cryptographic techniques are computationally cumbersome for the real-time execution