Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges
-
Published:2019-04-10
Issue:04
Volume:13
Page:20
-
ISSN:1865-7923
-
Container-title:International Journal of Interactive Mobile Technologies (iJIM)
-
language:
-
Short-container-title:Int. J. Interact. Mob. Technol.
Author:
Annane Boubakeur,Ghazali Osman
Abstract
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of the security expert’s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.
Publisher
International Association of Online Engineering (IAOE)
Subject
Computer Networks and Communications,Computer Science Applications
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance Analysis of Different Hypervisors Using Memory and Workloads in OS Virtualization;Intelligent Technologies for Automated Electronic Systems;2024-03-04
2. Proxy-3S;International Journal of Information Security and Privacy;2022-01