{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T02:36:17Z","timestamp":1744511777411},"reference-count":164,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1016\/j.jnca.2017.02.001","type":"journal-article","created":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T01:16:04Z","timestamp":1487294164000},"page":"38-54","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":204,"special_numbering":"C","title":["Security and privacy challenges in mobile cloud computing: Survey and way ahead"],"prefix":"10.1016","volume":"84","author":[{"given":"Muhammad Baqer","family":"Mollah","sequence":"first","affiliation":[]},{"given":"Md. Abul Kalam","family":"Azad","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2017.02.001_bib1","unstructured":"[Online: 2016] Locations of Google\u2019s Data Centers: \u3008http:\/\/www.google.com\/about\/datacenters\/inside\/locations\/index.html\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib2","unstructured":"[Online: 2016] Locations of Google\u2019s Data Centers: \u3008http:\/\/www.royal.pingdom.com\/2008\/04\/11\/map-of-all-google-data-center-locations\/\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib3","article-title":"Cloud incident handling and forensic\u2010by\u2010design: cloud storage as a case study","author":"Ab Rahman","year":"2016","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"10.1016\/j.jnca.2017.02.001_bib4","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1080\/02564602.2014.891382","article-title":"On protecting data storage in mobile cloud computing paradigm","volume":"31","author":"Abdalla","year":"2014","journal-title":"IETE Tech. Rev."},{"key":"10.1016\/j.jnca.2017.02.001_bib5","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jnca.2015.03.001","article-title":"Seamless application execution in mobile cloud computing: motivation, taxonomy, and open challenges","volume":"52","author":"Ahmed","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib6","doi-asserted-by":"crossref","unstructured":"Alam, S., Sogukpinar, I., Traore, I., Coady, Y., 2014. In-Cloud Malware Analysis and Detection: State of the Art. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 473.","DOI":"10.1145\/2659651.2659730"},{"key":"10.1016\/j.jnca.2017.02.001_bib7","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","article-title":"Security in cloud computing: opportunities and challenges","volume":"305","author":"Ali","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.jnca.2017.02.001_bib8","first-page":"1","article-title":"SeDaSC: Secure data sharing in clouds","volume":"99","author":"Ali","year":"2015","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.jnca.2017.02.001_bib9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2015.10.005","article-title":"Authentication in mobile cloud computing: a survey","volume":"61","author":"Alizadeh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib10","doi-asserted-by":"crossref","unstructured":"Alizadeh, M., Hassan, W.H., 2013. Challenges and opportunities of mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 660\u2013666.","DOI":"10.1109\/IWCMC.2013.6583636"},{"key":"10.1016\/j.jnca.2017.02.001_bib11","doi-asserted-by":"crossref","unstructured":"Al-Mutawa, M., Mishra, S., 2014. Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 51\u201360.","DOI":"10.1145\/2642687.2642696"},{"key":"10.1016\/j.jnca.2017.02.001_bib12","doi-asserted-by":"crossref","unstructured":"Alqahtani, H.S., Kouadri-Mostefaou, G., 2014. Multi-clouds Mobile Computing for the Secure Storage of Data, in 2014 IEEE\/ACM. In: Proceedings of the 7th International Conference on Utility and Cloud Computing, pp. 495\u2013496.","DOI":"10.1109\/UCC.2014.68"},{"key":"10.1016\/j.jnca.2017.02.001_bib13","first-page":"1","article-title":"Security framework for RESTful mobile cloud computing web services","author":"AlShahwan","year":"2015","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib14","doi-asserted-by":"crossref","unstructured":"Amin, M.A., Bib Abu Bakar, K., Al-Hashimi, H., 2013. A review of mobile cloud computing architecture and challenges to enterprise users, in GCC Conference and Exhibition (GCC), 2013. 7th IEEE, pp. 240\u2013244.","DOI":"10.1109\/IEEEGCC.2013.6705783"},{"key":"10.1016\/j.jnca.2017.02.001_bib15","doi-asserted-by":"crossref","unstructured":"Arabo A., Pranggono, B., 2013. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions, in Control Systems and Computer Science (CSCS), 2013. In: Proceedings of the 19th International Conference on, pp. 526\u2013531.","DOI":"10.1109\/CSCS.2013.27"},{"key":"10.1016\/j.jnca.2017.02.001_bib16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10660-015-9208-1","article-title":"Android mobile VoIP apps: a survey and examination of their security and privacy","volume":"16","author":"Azfar","year":"2016","journal-title":"Electron. Commer. Res."},{"key":"10.1016\/j.jnca.2017.02.001_bib17","doi-asserted-by":"crossref","unstructured":"Ba, H., Heinzelman, W., Janssen, C.-A., Shi, J., 2013. Mobile computing-A green computing resource, in Wireless Communications and Networking Conference (WCNC), IEEE, pp. 4451\u20134456.","DOI":"10.1109\/WCNC.2013.6555295"},{"key":"10.1016\/j.jnca.2017.02.001_bib18","doi-asserted-by":"crossref","unstructured":"Baharon, M.R., Shi, Q., Llewellyn-Jones, D., 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing, in Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), 2015 IEEE International Conference on, pp. 618\u2013625.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.88"},{"key":"10.1016\/j.jnca.2017.02.001_bib19","doi-asserted-by":"crossref","unstructured":"Bahrami, M., 2015. Cloud Computing for Emerging Mobile Cloud Apps, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 4\u20135.","DOI":"10.1109\/MobileCloud.2015.40"},{"key":"10.1016\/j.jnca.2017.02.001_bib20","doi-asserted-by":"crossref","unstructured":"Bahrami, M., Singhal, M., 2015. A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 189\u2013198.","DOI":"10.1109\/MobileCloud.2015.36"},{"key":"10.1016\/j.jnca.2017.02.001_bib21","doi-asserted-by":"crossref","unstructured":"Bouzefrane, S., Mostefa, B., Amira, F., Houacine., Cagon, H., 2014. Cloudlets Authentication in NFC-Based Mobile Computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, 2014, pp. 267\u2013272.","DOI":"10.1109\/MobileCloud.2014.46"},{"key":"10.1016\/j.jnca.2017.02.001_bib22","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility","volume":"25","author":"Buyya","year":"2009","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib23","article-title":"Forensic data acquisition from cloud\u2010of\u2010things devices: windows Smartphones as a case study","author":"Cahyani","year":"2016","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"10.1016\/j.jnca.2017.02.001_bib24","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MNET.2014.6963805","article-title":"Cloud computing meets mobile wireless communications in next generation cellular networks","volume":"28","author":"Cai","year":"2014","journal-title":"Netw. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib25","doi-asserted-by":"crossref","unstructured":"Cai, W., Zhou, C., Li, M., Li, X., Leung, V., 2015. MCG Test-bed: an Experimental Test-bed for Mobile Cloud Gaming. In: Proceedings of the 2nd Workshop on Mobile Gaming, pp. 25\u201330.","DOI":"10.1145\/2751496.2751501"},{"key":"10.1016\/j.jnca.2017.02.001_bib26","doi-asserted-by":"crossref","unstructured":"Chard, K., Caton, S., Rana, O., Bubendorfer, K., 2010. Social cloud: Cloud computing in social networks,\" in Cloud Computing (CLOUD), 2010. IEEE In: Proceedings of the 3rd International Conference on, pp. 99\u2013106.","DOI":"10.1109\/CLOUD.2010.28"},{"key":"10.1016\/j.jnca.2017.02.001_bib27","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1109\/TMM.2015.2460193","article-title":"Cloud-assisted live streaming for crowdsourced multimedia content","volume":"17","author":"Chen","year":"2015","journal-title":"Multimed. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib28","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MNET.2015.7064900","article-title":"EMC: emotion-aware mobile cloud computing in 5G","volume":"29","author":"Chen","year":"2015","journal-title":"Netw. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib29","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2015.7054715","article-title":"AIWAC: affective interaction through wearable computing and cloud technology","volume":"22","author":"Chen","year":"2015","journal-title":"Wirel. Commun. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2015.7120041","article-title":"On the computation offloading at ad hoc cloudlet: architecture and service modes","volume":"53","author":"Chen","year":"2015","journal-title":"Commun. Mag., IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib31","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","article-title":"Efficient multi-user computation offloading for mobile-edge cloud computing","volume":"24","author":"Chen","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.jnca.2017.02.001_bib32","doi-asserted-by":"crossref","unstructured":"Chen, M., Li, W., Li, Z., Lu, S., Chen, D., 2014. Preserving location privacy based on distributed cache pushing, in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, pp. 3456\u20133461.","DOI":"10.1109\/WCNC.2014.6953141"},{"key":"10.1016\/j.jnca.2017.02.001_bib33","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCC.2014.61","article-title":"Mobile cloud storage users","author":"Choo","year":"2014","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib34","first-page":"8","article-title":"Augmented smartphone applications Through clone cloud execution","author":"Chun","year":"2009","journal-title":"HotOS"},{"key":"10.1016\/j.jnca.2017.02.001_bib35","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s00779-013-0682-y","article-title":"Recent trends on mobile computing and future networks","volume":"18","author":"Chung","year":"2014","journal-title":"Pers. Ubiquitous Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib36","doi-asserted-by":"crossref","unstructured":"De Luca, A., Von Zezschwitz, E., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., et al., 2013. Back-of-device authentication on smartphones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2389\u20132398.","DOI":"10.1145\/2470654.2481330"},{"key":"10.1016\/j.jnca.2017.02.001_bib37","doi-asserted-by":"crossref","unstructured":"Dey, S., Sampalli, S., Ye, Q., 2015. A Context-Adaptive Security Framework for Mobile Cloud Computing, in 2015. In: Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 89\u201395.","DOI":"10.1109\/MSN.2015.28"},{"key":"10.1016\/j.jnca.2017.02.001_bib38","series-title":"Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing, Security in Computing and Communications","first-page":"45","author":"Dhanya","year":"2015"},{"key":"10.1016\/j.jnca.2017.02.001_bib39","doi-asserted-by":"crossref","unstructured":"Donald, A.C., Arockiam, L., 2015. A secure authentication scheme for MobiCloud, In: Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1\u20136.","DOI":"10.1109\/ICCCI.2015.7218101"},{"key":"10.1016\/j.jnca.2017.02.001_bib40","unstructured":"Duan, Y., Zhang, M., Yin, H., Tang, Y., 2015. Privacy-preserving offloading of mobile app to the public cloud. In: Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud15)."},{"key":"10.1016\/j.jnca.2017.02.001_bib41","doi-asserted-by":"crossref","unstructured":"Ellouze, A., Gagnaire, M., Haddad, A., 2015. A mobile application offloading algorithm for mobile cloud computing, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 34\u201340.","DOI":"10.1109\/MobileCloud.2015.11"},{"key":"10.1016\/j.jnca.2017.02.001_bib42","doi-asserted-by":"crossref","unstructured":"ElMenshawy, D., 2015. Touchscreen patterns based authentication approach for smart phones. In: Science and Information Conference (SAI), pp. 1311\u20131315.","DOI":"10.1109\/SAI.2015.7237312"},{"key":"10.1016\/j.jnca.2017.02.001_bib43","unstructured":"Fawaz, K., Feng, H., Shin, K.G., 2015. Anatomization and Protection of Mobile Apps' Location Privacy Threats. In: Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), pp. 753\u2013768."},{"key":"10.1016\/j.jnca.2017.02.001_bib44","doi-asserted-by":"crossref","unstructured":"Feng, T., Zhao, X., Carbunar, B., Shi, W., 2013. Continuous mobile authentication using virtual key typing biometrics, in Trust, security and privacy in computing and communications (TrustCom), 2013. In: Proceedings of the 12th IEEE international conference on, pp. 1547\u20131552.","DOI":"10.1109\/TrustCom.2013.272"},{"key":"10.1016\/j.jnca.2017.02.001_bib45","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","article-title":"mobile cloud computing: a survey","volume":"29","author":"Fernando","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib46","doi-asserted-by":"crossref","unstructured":"Ferzli R., Khalife, I., 2011. Mobile cloud computing educational tool for image\/video processing algorithms, in Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop (DSP\/SPE), IEEE, pp. 529\u2013533.","DOI":"10.1109\/DSP-SPE.2011.5739270"},{"key":"10.1016\/j.jnca.2017.02.001_bib47","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2015.7060486","article-title":"Mobile code offloading: from concept to practice and beyond","volume":"53","author":"Flores","year":"2015","journal-title":"Commun. Mag. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib48","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273\u2013278.","DOI":"10.1109\/CSCloud.2016.52"},{"key":"10.1016\/j.jnca.2017.02.001_bib49","doi-asserted-by":"crossref","first-page":"1286","DOI":"10.1109\/TMM.2015.2438713","article-title":"Towards cost-efficient video transcoding in media cloud: insights learned from user viewing patterns","volume":"17","author":"Gao","year":"2015","journal-title":"Multimed. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib50","first-page":"83","volume":"2009","author":"Giurgiu","year":"2009"},{"key":"10.1016\/j.jnca.2017.02.001_bib51","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s10916-016-0588-0","article-title":"Fine-grained database field search using attribute-based encryption for e-healthcare clouds","volume":"40","author":"Guo","year":"2016","journal-title":"J. Med. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib52","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2015.2429132","article-title":"Using virtual machine allocation policies to defend against co-resident attacks in cloud computing","author":"Han","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib53","doi-asserted-by":"crossref","unstructured":"Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., Li, Q., 2015. SMOC: A secure mobile cloud computing platform. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2668\u20132676.","DOI":"10.1109\/INFOCOM.2015.7218658"},{"key":"10.1016\/j.jnca.2017.02.001_bib54","doi-asserted-by":"crossref","unstructured":"Horrow, S., Gupta, S., Sardana, A., Abraham, A., 2012. Secure private cloud architecture for mobile infrastructure as a service. In: Services (SERVICES), 2012 IEEE Eighth World Congress on, pp. 149\u2013154.","DOI":"10.1109\/SERVICES.2012.25"},{"key":"10.1016\/j.jnca.2017.02.001_bib55","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MIM.2015.7108393","article-title":"5G cellular: key enabling technologies and research challenges","volume":"18","author":"Hossain","year":"2015","journal-title":"Instrum. Meas. Mag. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib56","doi-asserted-by":"crossref","unstructured":"Huerta-Canepa, G., Lee, D., 2010. A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6.","DOI":"10.1145\/1810931.1810937"},{"key":"10.1016\/j.jnca.2017.02.001_bib57","doi-asserted-by":"crossref","unstructured":"Hurel, G., Badonnel, R., Lahmadi, A., Festor, O., 2015. Towards Cloud-Based Compositions of Security Functions For Mobile Devices. In: IFIP\/IEEE International Symposium on Integrated Network Management (IM'15), p. 6.","DOI":"10.1109\/INM.2015.7140340"},{"key":"10.1016\/j.jnca.2017.02.001_bib58","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1080\/0144929X.2014.934286","article-title":"Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users","volume":"33","author":"Imgraben","year":"2014","journal-title":"Behav. Inf. Technol."},{"key":"10.1016\/j.jnca.2017.02.001_bib59","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","article-title":"On cloud security attacks: a taxonomy and intrusion detection and prevention as a service","volume":"74","author":"Iqbal","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib60","doi-asserted-by":"crossref","unstructured":"Jarabek, C., Barrera, D., Aycock, J., 2012. Thinav: Truly lightweight mobile cloud-based anti-malware. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 209\u2013218.","DOI":"10.1145\/2420950.2420983"},{"key":"10.1016\/j.jnca.2017.02.001_bib61","article-title":"An efficient authentication system of smart device using multi factors in mobile cloud service architecture","author":"Jeong","year":"2013","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib62","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1109\/TC.2015.2389792","article-title":"H-SVM: hardware-assisted secure virtual machines under a vulnerable hypervisor","volume":"64","author":"Jin","year":"2015","journal-title":"Comput. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib63","doi-asserted-by":"crossref","unstructured":"Jin, Y., Tian, C., He, H., Wang, F., 2015. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing, in Big Data and Cloud Computing (BDCloud), 2015 IEEE. In: Proceedings of the Fifth International Conference on, pp. 172\u2013179.","DOI":"10.1109\/BDCloud.2015.57"},{"key":"10.1016\/j.jnca.2017.02.001_bib64","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCC.2015.2","article-title":"Cloud attack and risk assessment taxonomy","volume":"2","author":"Juliadotter","year":"2015","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib65","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comnet.2014.03.015","article-title":"Consolidated Identity Management System for secure mobile cloud computing","volume":"65","author":"Khalil","year":"2014","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jnca.2017.02.001_bib66","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1016\/j.future.2012.08.003","article-title":"Towards secure mobile cloud computing: a survey","volume":"29","author":"Khan","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib67","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11227-013-0967-y","article-title":"Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing","volume":"66","author":"Khan","year":"2013","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jnca.2017.02.001_bib68","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1007\/s11227-014-1269-8","article-title":"BSS: block-based sharing scheme for secure data storage services in mobile cloud environment","volume":"70","author":"Khan","year":"2014","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jnca.2017.02.001_bib69","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/s10723-015-9352-9","article-title":"A cloud-Manager-based Re-Encryption scheme for mobile users in cloud environment: a hybrid approach","volume":"13","author":"Khan","year":"2015","journal-title":"J. Grid Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib70","doi-asserted-by":"crossref","unstructured":"Kovachev, D., Renzel, D., Klamma, R., Cao, Y., 2010. Mobile community cloud computing: emerges and evolves, in Mobile Data Management (MDM), 2010. In: Proceedings of the Eleventh International Conference on, pp. 393\u2013395.","DOI":"10.1109\/MDM.2010.78"},{"key":"10.1016\/j.jnca.2017.02.001_bib71","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.future.2016.10.004","article-title":"Design of a provably secure biometrics-based multi-cloud-server authentication scheme","volume":"68","author":"Kumari","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib72","doi-asserted-by":"crossref","unstructured":"Lei, L., Sengupta, S., Pattanaik, T., Gao, J., 2015. MCloudDB: A Mobile Cloud Database Service Framework, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 6\u201315.","DOI":"10.1109\/MobileCloud.2015.30"},{"key":"10.1016\/j.jnca.2017.02.001_bib73","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TETC.2014.2371239","article-title":"Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage","volume":"3","author":"Li","year":"2015","journal-title":"Emerg. Top. Comput. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib74","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.future.2013.06.011","article-title":"Privacy-preserving data utilization in hybrid clouds","volume":"30","author":"Li","year":"2014","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib75","first-page":"67","article-title":"Intercrossed access controls for secure financial services on multimedia big data in cloud systems","volume":"12","author":"Li","year":"2016","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"key":"10.1016\/j.jnca.2017.02.001_bib76","doi-asserted-by":"crossref","unstructured":"Liang, H., Han, C., Zhang, D., Wu, D., 2014. A Lightweight Security Isolation Approach for Virtual Machines Deployment. In: Information Security and Cryptology, pp. 516\u2013529.","DOI":"10.1007\/978-3-319-16745-9_28"},{"key":"10.1016\/j.jnca.2017.02.001_bib77","doi-asserted-by":"crossref","DOI":"10.1109\/TETC.2014.2371239","article-title":"Personalized search over encrypted data with efficient and secure updates in mobile clouds","author":"Liu","year":"2015","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib78","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MWC.2013.6549279","article-title":"Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications","volume":"20","author":"Liu","year":"2013","journal-title":"Wirel. Commun. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib79","first-page":"46","article-title":"Secure sharing and searching for real-time video data in mobile cloud","volume":"29","author":"Liu","year":"2015","journal-title":"Netw. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib80","doi-asserted-by":"crossref","unstructured":"Liu, L., Zhang, X., Yan, G., Chen, S., 2009. Exploitation and threat analysis of open mobile devices, In: Proceedings of the 5th ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 20\u201329.","DOI":"10.1145\/1882486.1882493"},{"key":"10.1016\/j.jnca.2017.02.001_bib81","doi-asserted-by":"crossref","unstructured":"Louk M., Lim, H., 2015. Homomorphic encryption in mobile multi cloud computing, in Information Networking (ICOIN), 2015 International Conference on, pp. 493\u2013497.","DOI":"10.1109\/ICOIN.2015.7057954"},{"key":"10.1016\/j.jnca.2017.02.001_bib82","unstructured":"Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2015. Fog Computing: Focusing on Mobile Users at the Edge, arXiv preprint arXiv:1502.01815."},{"key":"10.1016\/j.jnca.2017.02.001_bib83","first-page":"01090","article-title":"Mobile edge computing: survey and Research outlook","volume":"1701","author":"Mao","year":"2017","journal-title":"arXiv Prepr arXiv"},{"key":"10.1016\/j.jnca.2017.02.001_bib84","doi-asserted-by":"crossref","unstructured":"Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Bringing mobile online games to clouds, in Computer Communications Workshops (INFOCOM WKSHPS), 2014. IEEE Conference on, pp. 340\u2013345.","DOI":"10.1109\/INFCOMW.2014.6849255"},{"key":"10.1016\/j.jnca.2017.02.001_bib85","doi-asserted-by":"crossref","unstructured":"Meilander, D., Glinka, F., Gorlatch, S., Lin, L., Zhang, W., Liao, X., 2014. Using mobile cloud computing for real-time online applications, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014. In: Proceedings of the 2nd IEEE International Conference on, pp. 48\u201356.","DOI":"10.1109\/MobileCloud.2014.19"},{"key":"10.1016\/j.jnca.2017.02.001_bib86","series-title":"Model-Based Quantitative Security Analysis of Mobile Offloading Systems under Timing Attacks, Analytical and Stochastic Modelling Techniques and Applications","first-page":"143","author":"Meng","year":"2015"},{"key":"10.1016\/j.jnca.2017.02.001_bib87","first-page":"24","article-title":"Business risks and security assessment for mobile devices","volume":"1","author":"Milligan","year":"2008","journal-title":"Inf. Syst. Control J."},{"key":"10.1016\/j.jnca.2017.02.001_bib88","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.procs.2015.07.257","article-title":"AMCC: Ad-hoc based mobile cloud computing modeling","volume":"56","author":"Mohammad","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.jnca.2017.02.001_bib89","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCC.2017.9","article-title":"Secure data sharing and Searching at the edge of cloud-assisted Internet of Things","volume":"4","author":"Mollah","year":"2017","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib90","doi-asserted-by":"crossref","unstructured":"Mollah, M.B., Islam, K.R., Islam, S.S., 2012. Next generation of computing through cloud computing technology, in Electrical & Computer Engineering (CCECE), 2012 In: Proceedings of the 25th IEEE Canadian Conference on, pp. 1\u20136.","DOI":"10.1109\/CCECE.2012.6334973"},{"key":"10.1016\/j.jnca.2017.02.001_bib91","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MNET.2014.6863135","article-title":"Distributed resource allocation in cloud-based wireless multimedia social networks","volume":"28","author":"Nan","year":"2014","journal-title":"Netw., IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib92","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H., 2015. Enhancing privacy through caching in location-based services. In: Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 1017\u20131025.","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"10.1016\/j.jnca.2017.02.001_bib93","article-title":"Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment","author":"Odelu","year":"2016","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.jnca.2017.02.001_bib94","unstructured":"Olafare, O., Parhizkar, H., Vem, S., 2015. A New Secure Mobile Cloud Architecture,\" arXiv preprint arXiv:1504.07563."},{"key":"10.1016\/j.jnca.2017.02.001_bib95","unstructured":"Online: 2016] A Report of Worldwide Smartphone Markets: 2011 to 2015, May 2011: \u3008http:\/\/www.researchandmarkets.com\/research\/7a1189\/worldwide_smartphone\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib96","unstructured":"Online: 2016] ABI Research Report on Mobile Cloud Computing; \u3008https:\/\/www.abiresearch.com\/research\/product\/1005283-mobile-cloud-applications\/\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib97","unstructured":"Online: 2016] Device Policy for Andriod: Overview for Users: \u3008http:\/\/www.google.com\/support\/mobile\/bin\/answer.py?Hl=en&answer=190930\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib98","unstructured":"Online: 2016] Mobile Cloud Computing Forum; \u3008http:\/\/www.mobilecloudcomputingforum.com\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib99","unstructured":"Online: 2016] Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications: \u3008https:\/\/www.itu.int\/itudoc\/itu-t\/85097.pdf\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib100","unstructured":"Online: 2016] US National Security Agency: Information Assurance: \u3008http:\/\/www.nsa.gov\/ia\/ia_at_nsa\/index.shtml\u3009."},{"key":"10.1016\/j.jnca.2017.02.001_bib101","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","article-title":"Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework","volume":"67","author":"Osanaiye","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib102","doi-asserted-by":"crossref","unstructured":"Owens, R., Wang, W., 2013. Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing, in Computer Communications and Networks (ICCCN), 2013. In: Proceedings of the 22nd International Conference on, pp. 1\u20135.","DOI":"10.1109\/ICCCN.2013.6614169"},{"key":"10.1016\/j.jnca.2017.02.001_bib103","article-title":"Providing user security guarantees in public infrastructure clouds","author":"Paladi","year":"2016","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib104","doi-asserted-by":"crossref","unstructured":"Park, I.-S., Lee, Y.-D., Jeong, J., 2013. Improved Identity Management Protocol for Secure Mobile Cloud Computing, in System Sciences (HICSS), 2013. In: Proceedings of the 46th Hawaii International Conference on, pp. 4958\u20134965.","DOI":"10.1109\/HICSS.2013.262"},{"key":"10.1016\/j.jnca.2017.02.001_bib105","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","article-title":"An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing","volume":"64","author":"Pasupuleti","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib106","doi-asserted-by":"crossref","unstructured":"Patel, P., Patel, R., 2015. Security in CloneCloud for Mobile Cloud Computing, in Communication Systems and Network Technologies (CSNT), 2015. In: Proceedings of the Fifth International Conference on, pp. 752\u2013756.","DOI":"10.1109\/CSNT.2015.288"},{"key":"10.1016\/j.jnca.2017.02.001_bib107","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jnca.2016.06.012","article-title":"User profiling in intrusion detection: a review","volume":"72","author":"Peng","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib108","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.csi.2016.09.002","article-title":"Mobile cloud security: an adversary model for lightweight browser security","volume":"49","author":"Pokharel","year":"2017","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.jnca.2017.02.001_bib109","doi-asserted-by":"crossref","unstructured":"Popa, D., Cremene, M., Borda, M., Boudaoud, K., 2013. A security framework for mobile cloud applications. In: Roedunet International Conference (RoEduNet), 2013 11th, pp. 1\u20134.","DOI":"10.1109\/RoEduNet.2013.6511724"},{"key":"10.1016\/j.jnca.2017.02.001_bib110","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.jnca.2015.11.017","article-title":"Web application protection techniques: a taxonomy","volume":"60","author":"Prokhorenko","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib111","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1080\/21642583.2014.913213","article-title":"Convergence of Internet of things and mobile cloud computing","volume":"2","author":"Psannis","year":"2014","journal-title":"Syst. Sci. Control Eng.: Open Access J."},{"key":"10.1016\/j.jnca.2017.02.001_bib112","article-title":"Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry","author":"Qiu","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib113","article-title":"Pervasive social networking forensics: intelligence and evidence from mobile device extracts","author":"Quick","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib114","doi-asserted-by":"crossref","unstructured":"Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone\u2019s battery. In: Securecomm and Workshops, pp. 1\u201310.","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"10.1016\/j.jnca.2017.02.001_bib115","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/B978-0-12-415815-3.00016-9","article-title":"secure mobile cloud computing","author":"Raj","year":"2012","journal-title":"Handb. Secur. Cyber-Phys. Crit. Infrastruct."},{"key":"10.1016\/j.jnca.2017.02.001_bib116","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/ACCESS.2013.2260813","article-title":"Millimeter wave mobile communications for 5G cellular: it will work!","volume":"1","author":"Rappaport","year":"2013","journal-title":"Access, IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib117","doi-asserted-by":"crossref","unstructured":"Rassan, I.A., AlShaher, H., 2014. Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA), In: 2014 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 157\u2013161.","DOI":"10.1109\/CSCI.2014.33"},{"key":"10.1016\/j.jnca.2017.02.001_bib118","doi-asserted-by":"crossref","unstructured":"S. Dey, S. Sampalli, and Q. Ye, \"A light-weight authentication scheme based on message digest and location for mobile cloud computing,\" in Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, 2014, pp. 1\u20132.","DOI":"10.1109\/PCCC.2014.7017041"},{"key":"10.1016\/j.jnca.2017.02.001_bib119","first-page":"38","article-title":"Partial mobile application offloading to the cloud for energy-efficiency with security measures","volume":"8","author":"Saab","year":"2015","journal-title":"Sustain. Comput.: Inform. Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib120","doi-asserted-by":"crossref","unstructured":"Sanaei, Z., Abolfazli, S., Gani, A., Shiraz, M., 2012. SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing, in Communications in China Workshops (ICCC), 2012. In: Proceedings of the 1st IEEE International Conference on, pp.\u00a014\u201319.","DOI":"10.1109\/ICCCW.2012.6316466"},{"key":"10.1016\/j.jnca.2017.02.001_bib121","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2009.82","article-title":"The case for vm-based cloudlets in mobile computing","volume":"8","author":"Satyanarayanan","year":"2009","journal-title":"Pervasive Comput. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib122","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/2856126","article-title":"Evolution of attacks, threat models, and solutions for virtualized systems","volume":"48","author":"Sgandurra","year":"2016","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.jnca.2017.02.001_bib123","doi-asserted-by":"crossref","unstructured":"Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile cloud computing: A needed shift from cloud to mobile cloud, in Computational Intelligence and Communication Networks (CICN), 2013. In: Proceedings of the 5th International Conference on, pp. 536\u2013539.","DOI":"10.1109\/CICN.2013.116"},{"key":"10.1016\/j.jnca.2017.02.001_bib124","doi-asserted-by":"crossref","unstructured":"Sharma, R., Kumar, S., Trivedi, M.C., 2013. Mobile Cloud Computing: Bridging the Gap between Cloud and Mobile Devices,\" in Computational Intelligence and Communication Networks (CICN), 2013 In: Proceedings of the 5th International Conference on, pp. 553\u2013555.","DOI":"10.1109\/CICN.2013.120"},{"key":"10.1016\/j.jnca.2017.02.001_bib125","doi-asserted-by":"crossref","unstructured":"Shi, Y., Abhilash, S., Hwang, K., 2015. Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015. In: Proceedings of the 3rd IEEE International Conference on, pp. 109\u2013118.","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"10.1016\/j.jnca.2017.02.001_bib126","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/s11036-014-0509-8","article-title":"Toward advanced mobile cloud computing for the Internet of Things: Current issues and future direction","volume":"19","author":"Shon","year":"2014","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib127","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","article-title":"HMOG: New behavioral biometric features for continuous authentication of smartphone users","volume":"11","author":"Sitov\u00e1","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jnca.2017.02.001_bib128","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.ins.2015.09.004","article-title":"Dynamic remote data auditing for securing big data storage in cloud computing","volume":"380","author":"Sookhak","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.jnca.2017.02.001_bib129","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","article-title":"Evolution, detection and analysis of malware for smart devices","volume":"16","author":"Suarez-Tangil","year":"2014","journal-title":"Commun. Surv. Tutor. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib130","doi-asserted-by":"crossref","unstructured":"Suo, H., Liu, Z., Wan, J., Zhou, K., 2013. Security and privacy in mobile cloud computing, in Wireless Communications and Mobile Computing Conference (IWCMC), 2013. 9th International, pp. 655\u2013659.","DOI":"10.1109\/IWCMC.2013.6583635"},{"key":"10.1016\/j.jnca.2017.02.001_bib131","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"10.1016\/j.jnca.2017.02.001_bib132","doi-asserted-by":"crossref","unstructured":"Tan, J., Gandhi, R., Narasimhan, P., 2014. STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE. In: Proceedings of the 6th International Conference on, pp. 644\u2013649.","DOI":"10.1109\/CloudCom.2014.116"},{"key":"10.1016\/j.jnca.2017.02.001_bib133","article-title":"Forensic investigation of cooperative storage cloud service: symform as a case study","author":"Teing","year":"2016","journal-title":"J. Forensic Sci."},{"key":"10.1016\/j.jnca.2017.02.001_bib134","doi-asserted-by":"crossref","unstructured":"Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management, in Trustcom\/BigDataSE\/ISPA, 2015 IEEE, pp. 1073\u20131080.","DOI":"10.1109\/Trustcom.2015.485"},{"key":"10.1016\/j.jnca.2017.02.001_bib135","doi-asserted-by":"crossref","unstructured":"Tang, L., Ouyang, L., Tsai, W.-T., 2015. Multi-factor web API security for securing Mobile Cloud. In: Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pp. 2163-2168.","DOI":"10.1109\/FSKD.2015.7382287"},{"key":"10.1016\/j.jnca.2017.02.001_bib136","article-title":"Dynamic-hash-table based public auditing for secure cloud storage","author":"Tian","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib137","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","article-title":"A Privacy-Aware authentication scheme for Distributed mobile cloud computing services","volume":"9","author":"Tsai","year":"2015","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.jnca.2017.02.001_bib138","first-page":"2011","article-title":"Towards secure communication for highly scalable mobile applications in cloud computing systems","volume":"33","author":"Tysowski","year":"2011","journal-title":"Cent. Appl. Cryptogr. Res. Univ. Waterloo Tech. Rep. CACR"},{"key":"10.1016\/j.jnca.2017.02.001_bib139","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TCC.2013.11","article-title":"Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds","volume":"1","author":"Tysowski","year":"2013","journal-title":"Cloud Comput. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib140","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2016.01.005","article-title":"A new approach to mitigating security risks of phone clone Co-location Over mobile clouds","author":"Vaezpour","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2017.02.001_bib141","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2677046.2677052","article-title":"Finding your way in the fog: towards a comprehensive definition of fog computing","volume":"44","author":"Vaquero","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.jnca.2017.02.001_bib142","doi-asserted-by":"crossref","unstructured":"Walls, J., Choo, K.-K. R., 2015. A Review of Free Cloud-Based Anti-Malware Apps for Android, In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, pp. 1053\u20131058.","DOI":"10.1109\/Trustcom.2015.482"},{"key":"10.1016\/j.jnca.2017.02.001_bib143","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCOM.2014.6766088","article-title":"Security protection between users and the mobile media cloud","volume":"52","author":"Wang","year":"2014","journal-title":"Commun. Mag., IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib144","unstructured":"Wang, S., Tu, G.-H., Ganti, R., He, T., Leung, K., Tripp, H., et al., 2013. Mobile micro-cloud: Application classification, mapping, and deployment. In: Proceedings Annual Fall Meeting of ITA (AMITA)."},{"key":"10.1016\/j.jnca.2017.02.001_bib145","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/TMM.2014.2315596","article-title":"Cloud mobile media: reflections and outlook","volume":"16","author":"Wen","year":"2014","journal-title":"Multimed. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib146","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/MCOM.2015.7010539","article-title":"Millimeter-wave multimedia communications: challenges, methodology, and applications","volume":"53","author":"Wu","year":"2015","journal-title":"Commun. Mag. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib147","doi-asserted-by":"crossref","unstructured":"Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., et al., 2015. TinMan: eliminating confidential mobile data exposure with security oriented offloading. In: Proceedings of the Tenth European Conference on Computer Systems, p. 27.","DOI":"10.1145\/2741948.2741977"},{"key":"10.1016\/j.jnca.2017.02.001_bib148","unstructured":"Xiu-feng, Q., Jian-Wei, L., Peng-Chuan, Z., 2011. Secure cloud computing architecture on mobile internet, in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011. In: Proceedings of the 2nd International Conference on, pp. 619\u2013622."},{"key":"10.1016\/j.jnca.2017.02.001_bib149","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.pmcj.2015.06.017","article-title":"Cloud based data sharing with fine-grained proxy re-encryption","volume":"28","author":"Yang","year":"2016","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib150","unstructured":"Yang, X., Pan, T., Shen, J., 2010. On 3G mobile e-commerce platform based on cloud computing, in Ubi-media Computing (U-Media), 2010. In: Proceedings of the 3rd IEEE International Conference on, pp. 198\u2013201."},{"key":"10.1016\/j.jnca.2017.02.001_bib151","doi-asserted-by":"crossref","unstructured":"Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., 2015. Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, in European Symposium on Research in Computer Security, pp. 146\u2013166.","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"10.1016\/j.jnca.2017.02.001_bib152","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TWC.2015.2416177","article-title":"Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud","volume":"14","author":"Yin","year":"2015","journal-title":"Wirel. Commun. IEEE Trans."},{"key":"10.1016\/j.jnca.2017.02.001_bib153","series-title":"Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage, Network andSystem Security","first-page":"28","author":"Yu","year":"2014"},{"key":"10.1016\/j.jnca.2017.02.001_bib154","doi-asserted-by":"crossref","unstructured":"Yu, Y., Li, Y., Au, M.H., Susilo, W., Choo, K.-K.R., Zhang, X., 2016. Public cloud data auditing with practical key update and zero knowledge privacy. In: Australasian Conference on Information Security and Privacy, pp. 389\u2013405.","DOI":"10.1007\/978-3-319-40253-6_24"},{"key":"10.1016\/j.jnca.2017.02.001_bib155","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1002\/sec.1055","article-title":"Mobile cloud computing based privacy protection in location\u2010based information survey applications","volume":"8","author":"Zhang","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.jnca.2017.02.001_bib156","first-page":"1","article-title":"Efficient chameleon hashing-based privacy-preserving auditing in cloud storage","author":"Zhang","year":"2015","journal-title":"Clust. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib157","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1002\/sec.907","article-title":"Privacy\u2010assured substructure similarity query over encrypted graph\u2010structured data in cloud","volume":"7","author":"Zhang","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.jnca.2017.02.001_bib158","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.pmcj.2015.06.009","article-title":"Efficient attribute-based data sharing in mobile clouds","volume":"28","author":"Zhang","year":"2016","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.jnca.2017.02.001_bib159","doi-asserted-by":"crossref","unstructured":"Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S., 2009. Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 127\u2013134.","DOI":"10.1145\/1655008.1655026"},{"key":"10.1016\/j.jnca.2017.02.001_bib160","doi-asserted-by":"crossref","unstructured":"Zhao, X., Feng, T., Shi, W., 2013. Continuous mobile authentication using a novel graphic touch gesture feature, in Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE. In: Proceedings of the Sixth International Conference on, pp. 1\u20136.","DOI":"10.1109\/BTAS.2013.6712747"},{"key":"10.1016\/j.jnca.2017.02.001_bib161","doi-asserted-by":"crossref","unstructured":"Zhong, H., Xiao, J., 2014. Design for a cloud-based hybrid Android application security assessment framework. In: Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on, pp. 539\u2013546.","DOI":"10.1109\/ICRMS.2014.7107254"},{"key":"10.1016\/j.jnca.2017.02.001_bib162","doi-asserted-by":"crossref","unstructured":"Zhong, L., Wang, B., Wei, H., 2012. Cloud computing applied in the mobile internet, in Computer Science & Education (ICCSE), 2012. In: Proceedings of the 7th International Conference on, pp. 218\u2013221.","DOI":"10.1109\/ICCSE.2012.6295061"},{"key":"10.1016\/j.jnca.2017.02.001_bib163","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MSP.2011.940269","article-title":"Multimedia cloud computing","volume":"28","author":"Zhu","year":"2011","journal-title":"Signal Process. Mag. IEEE"},{"key":"10.1016\/j.jnca.2017.02.001_bib164","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.cose.2013.02.002","article-title":"Secloud: a cloud-based comprehensive and lightweight security solution for smartphones","volume":"37","author":"Zonouz","year":"2013","journal-title":"Comput. Secur."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804517300632?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804517300632?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T20:08:15Z","timestamp":1568837295000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804517300632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":164,"alternative-id":["S1084804517300632"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2017.02.001","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2017,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2017.02.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}