Data Security in Mobile Cloud Computing: A State of the Art Review

Full Text (PDF, 340KB), PP.30-35

Views: 0 Downloads: 0


Rida Qayyum 1,* Hina Ejaz 1

1. Department of Computer Science, Government College Women University Sialkot, Pakistan

* Corresponding author.


Received: 1 Jan. 2020 / Revised: 20 Jan. 2020 / Accepted: 19 Feb. 2020 / Published: 8 Apr. 2020

Index Terms

Mobile Cloud Computing (MCC), data security, Secure Data Sharing in Clouds (SeDaSC), Homomorphic Encryption, data integrity, confidentiality, data storage


Due to tremendous use of smartphones the concern of cloud computing in mobile devices emerges, which is known as Mobile Cloud Computing (MCC). It involves the usage of mobile devices and cloud computing to perform resource intensive tasks using the internet with minimum impact on cellular resources. Nowadays, people are relying on mobile devices due to their small size and user friendly interface but due to its limited storage capacity, people can no more rely on internal RAM. Therefore, this promotes a drastic need for technology to make it possible for anyone to access their data anywhere anytime. As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user’s security, respectively. However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud. Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently. Moreover, this work will contribute a state-of-the-art roadmap to research and development communities for the right selection of proposed approach.

Cite This Paper

Rida Qayyum, Hina Ejaz, " Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science(IJMECS), Vol.12, No.2, pp. 30-35, 2020.DOI: 10.5815/ijmecs.2020.02.04


[1]Rupinder Pal Kaur, A. K. “Perspectives of Mobile Cloud Computing: Architecture, Application and Issues”, International Journal of Computer Applications, pp. 9-14, 2014.
[2]S M Shamim, A, S, and Ali Newaz Bahar, M. A. “A Review on Mobile Cloud Computing”, International Journal of Computer Applications, pp. 4-9, 2015.
[3]Sudhanshu Maurya, D. K. “A Literature Review on Mobile Cloud Computing”, International Journal of Applied Engineering Research, Vol. 10 No.79, pp. 329-334, 2015.
[4]Nirbhay K. Chaubey, D. M. “Security, Privacy and Challenges in Mobile”, International Journal of Innovative Research in Computer, pp. 1259-1266, 2016.
[5]Muhammad Baqer Mollaha, M. A, and Vasilakosb, A. “Security and privacy challenges in mobile cloud computing”. Journal of Network and Computer Applications, pp. 38-54, 2017.
[6]Hassan Saad Alqahtani, G. K.-M. “Multi-Clouds Mobile Computing for the Secure Storage of Data”, IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp. 495-497, 2014.
[7]Abdul Nasir Khan, M. L, and Mazhar Ali, S. A. “BSS: block-based sharing scheme for secure data storage services in mobile cloud environment”, Springer the Journal the Supercomputing, 2014.
[8]Louk M., Lim, H. “Homomorphic encryption in mobile multi cloud computing, in Information Networking (ICOIN)”, 2015 International Conference on, pp. 493-497, 2015.
[9]Rahul Neware, A. K., and Dandige, V. “Survey on Security issues in Mobile Cloud Computing and Preventive Measures”.
[10]Yong Yu, L. N. “On the security of auditing mechanisms for secure cloud storage”, 2013
[11]Chandni Patel, S. C. and Patel, B. “A Data Security Framework for Mobile Cloud”, International Journal of Advanced Research in Computer and Communication Engineering, pp. 254-257, 2015.
[12]Hui Tian, Y. “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE Computer Society, 2015.
[13]Ibtihal Mouhib, El Ouadghiri Driss and Khalid Zine-Dine “Encryption as a service for securing data in mobile cloud computing”, 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp. 546-55, 2015.
[14]Muhammad Baqer Mollaha, M. A and Vasilakosb, A. “Security and privacy challenges in mobile cloud computing: Survey and way”, Journal of Network and Computer Applications, pp. 38-54, 2017.
[15]Hongwei, Li. Dongxiao, Liu. Yuanshun, Dai. Tom, H. Luan, Xuemin. Sherman, She “Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage”, pp.127-138, 2015.
[16]Cheng Guo, R. Z, and Yingmo Jie, Y. R. “Fine-grained Database Field Search Using Attribute-Based. Journal of Medical Systems”, pp. 235-244, 2016.
[17]Hongwei Li, D. L, and Yuanshun Dai, S. Y. “Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds”, IEEE Xplore, pp. 1-12, 2015.
[18]Muhammad Baqer Mollah and M. A. “Secure Data Sharing and and Searching at the Edge of Cloud-Assisted Internet of Things”. IEEE Cloud Computing, pp. 34-42, 2017.
[19]Mazhar Ali, R. D, and Eraj Khan, S. “Secure Data Sharing in Clouds”. IEEE SYSTEMS JOURNAL, pp. 1-10, 2015.