메뉴 건너뛰기




Volumn 29, Issue 5, 2013, Pages 1278-1299

Towards secure mobile cloud computing: A survey

Author keywords

Cloud computing; Mobile cloud computing; Privacy; Security; Virtualization

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; SECURITY SYSTEMS; SURVEYS; VIRTUALIZATION;

EID: 84866668858     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2012.08.003     Document Type: Article
Times cited : (291)

References (71)
  • 3
    • 77955515023 scopus 로고    scopus 로고
    • Federated resource management in grid and cloud computing systems
    • R. Buyya, R. Ranjan, Federated resource management in grid and cloud computing systems, Future Generation Computer Systems 26 (8) (2006) 1189-1191.
    • (2006) Future Generation Computer Systems , vol.26 , Issue.8 , pp. 1189-1191
    • Buyya, R.1    Ranjan, R.2
  • 12
    • 77957936026 scopus 로고    scopus 로고
    • September 02
    • Google App Engine, September 02, 2011. https://developers.google.com/ appengine/.
    • (2011) Google App Engine
  • 13
    • 84888016274 scopus 로고    scopus 로고
    • September 06
    • Force.com Apex Code Developer's Guide, September 06, 2011. http://www.salesforce.com/us/developer/docs/apexcode/index.htm.
    • (2011) Force.Com Apex Code Developer's Guide
  • 16
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy?
    • K. Kumar, Y.H. Lu, Cloud computing for mobile users: can offloading computation save energy? IEEE Journal Computer 43 (4) (2010) 51-56.
    • (2010) IEEE Journal Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.H.2
  • 17
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems 28 (3) (2012) 583-592.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 18
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications 34 (1) (2011) 1-11.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 19
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems 25 (6) (2009) 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 24
    • 84863944102 scopus 로고    scopus 로고
    • Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and makespan in large-scale distributed systems
    • P. Lindberg, J. Leingang, D. Lysaker, S.U. Khan, J. Li, Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and makespan in large-scale distributed systems, Journal of Supercomputing 59 (1) (2012) 323-360.
    • (2012) Journal of Supercomputing , vol.59 , Issue.1 , pp. 323-360
    • Lindberg, P.1    Leingang, J.2    Lysaker, D.3    Khan, S.U.4    Li, J.5
  • 25
    • 84857368698 scopus 로고    scopus 로고
    • T-alloc: A practical energy efficient resource allocation algorithm for traditional data centers
    • D.M. Quan, F. Mezza, D. Sannenli, R. Giafreda, T-alloc: a practical energy efficient resource allocation algorithm for traditional data centers, Future Generation Computer Systems 28 (5) (2012) 791-800.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.5 , pp. 791-800
    • Quan, D.M.1    Mezza, F.2    Sannenli, D.3    Giafreda, R.4
  • 27
    • 79960305908 scopus 로고    scopus 로고
    • A weighted sum technique for the joint optimization of performance and power consumption in data centers
    • S.U. Khan, C. Ardil, A weighted sum technique for the joint optimization of performance and power consumption in data centers, International Journal of Electrical, Computer, and Systems Engineering 3 (1) (2009) 35-40.
    • (2009) International Journal of Electrical, Computer, and Systems Engineering , vol.3 , Issue.1 , pp. 35-40
    • Khan, S.U.1    Ardil, C.2
  • 29
    • 80053551895 scopus 로고    scopus 로고
    • Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
    • W. Ren, L. Yu, R. Gao, F. Xiong, Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing, Journal of Tsinghua Science and Technology 16 (5) (2011) 520-528.
    • (2011) Journal of Tsinghua Science and Technology , vol.16 , Issue.5 , pp. 520-528
    • Ren, W.1    Yu, L.2    Gao, R.3    Xiong, F.4
  • 32
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • in press
    • H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Wireless Communication and Mobile Computing. http://dx.doi.org/10.1002/wcm.1203 (in press).
    • Wireless Communication and Mobile Computing
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 46
    • 79961227180 scopus 로고    scopus 로고
    • Provable data possession of resource constrained mobile devices in cloud computing
    • J. Yang, H. Wang, J. Wang, C. Tan, D. Yu1, Provable data possession of resource constrained mobile devices in cloud computing, Journal of Networks 6 (7) (2011) 1033-1040.
    • (2011) Journal of Networks , vol.6 , Issue.7 , pp. 1033-1040
    • Yang, J.1    Wang, H.2    Wang, J.3    Tan, C.4    Yu, D.5
  • 51
    • 84862956001 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • Z. Zhou, D. Huang, Efficient and secure data storage operations for mobile cloud computing, IACR Cryptology ePrint Archive: 185, 2011.
    • (2011) IACR Cryptology ePrint Archive , vol.185
    • Zhou, Z.1    Huang, D.2
  • 53
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Communications of the ACM 22 (11) (1979) 612-616.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-616
    • Shamir, A.1
  • 55
    • 79956070044 scopus 로고    scopus 로고
    • Towards an elastic application model for augmenting computing capabilities of mobile platforms
    • X. Zhang, S. Jeong, A. Kunjithapatham, S. Gibbs, Towards an elastic application model for augmenting computing capabilities of mobile platforms, Journal of Mobile Networks and Applications 16 (3) (2011) 270-284.
    • (2011) Journal of Mobile Networks and Applications , vol.16 , Issue.3 , pp. 270-284
    • Zhang, X.1    Jeong, S.2    Kunjithapatham, A.3    Gibbs, S.4
  • 66
    • 80052758369 scopus 로고    scopus 로고
    • Meetings through the cloud: Privacy-preserving scheduling on mobile devices
    • Special Issue on Mobile Applications: Status and Trends
    • I. Bilogrevica, M. Jadliwalaa, P. Kumarb, S.S. Waliab, J.P. Hubauxa, I. Aadc, V. Niemic, Meetings through the cloud: privacy-preserving scheduling on mobile devices, Journal of Systems and Software 84 (11) (2011) 1910-1927. (Special Issue on Mobile Applications: Status and Trends).
    • (2011) Journal of Systems and Software , vol.84 , Issue.11 , pp. 1910-1927
    • Bilogrevica, I.1    Jadliwalaa, M.2    Kumarb, P.3    Waliab, S.S.4    Hubauxa, J.P.5    Aadc, I.6    Niemic, V.7
  • 67
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (4) (1985) 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.