Fellah et al., 2020 - Google Patents

Mobile cloud computing: architecture, advantages and security issues

Fellah et al., 2020

Document ID
15246696297524042092
Author
Fellah H
Mezioud C
Batouche M
Publication year
Publication venue
Proceedings of the 3rd International Conference on Networking, Information Systems & Security

External Links

Snippet

In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Similar Documents

Publication Publication Date Title
US11838306B2 (en) Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
Mollah et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead
Al-Janabi et al. Mobile cloud computing: challenges and future research directions
Ahmed et al. A review of challenges and security risks of cloud computing
Sahu et al. Cloud computing in mobile applications
Man et al. A collaborative intrusion detection system framework for cloud computing
US9021578B1 (en) Systems and methods for securing internet access on restricted mobile platforms
Fellah et al. Mobile cloud computing: architecture, advantages and security issues
Rani et al. Cloud Computing An Empowering Technology: Architecture, Applications and Challenges
Neware et al. Survey on Security Issues in Mobile Cloud Computing and Preventive Measures
Moon et al. Intelligent security model of smart phone based on human behavior in mobile cloud computing
Perez et al. A quick survey on cloud computing and associated security, mobility and IoT issues
Singhal Survey on security issues in mobile cloud computing and preventive measures
US11924241B1 (en) Real-time mitigative security architecture
Rayapuri A Survey of Security and Privacy in Mobile Cloud Computing
Katal Security and Privacy in Mobile Cloud Computing
Pal et al. A Comparative Study of Significance of Mobile Cloud Computing in the Modern World
Patil et al. Study of an effective way of detecting unexpected permission authorization to mobile apps
Miyamoto et al. Offloading smartphone firewalling using OpenFlow-capable wireless access points
Das et al. Smartphone Security by Cloud Computing
Popa et al. Overview on Mobile Cloud Computing security issues [articol]
Hnini et al. Security in cloud-based IoT: A survey