首页> 外文期刊>Journal of Engineering & Applied Sciences >Investigation of Security and Privacy Methods for Public Mobile Cloud Computing
【24h】

Investigation of Security and Privacy Methods for Public Mobile Cloud Computing

机译:公共移动云计算安全与隐私方法的调查

获取原文
获取原文并翻译 | 示例
           

摘要

trusted information systems. Advantages such as accessibility, availability, reduce the costs of information systems and centralization processes are lead to increase the importance of adopts the mobile cloud computing by the organizations. To gain the full benefits of mobile cloud computing, the public deployment approach would be adopted. The security and privacy challenges of the public mobile cloud computing are still and issues due to data gathering via. wireless network. This study aims to investigate the security and privacy methods that could be utilized to enhance the protections performance of the services and data of public mobile cloud computing. The document analysis based on the systematic review of literature is conducted to address the main aim of this study. The data source of this study is databases of three high impact journals, Science Direct, Web of Science and Scopus. By using systematic taxonomy search on the published articles in last 5 yeasr, 25 related works are retrieved. The findings of this study are constructed based on the critical review of the retrieved related works. The significant results show that the security methods should be utilized at three layers of public mobile cloud computing, cloud layer, wireless connection layer and mobile device layer. The privacy methods are only involve the mobile device layer of public mobile cloud computing. The main security methods of mobile cloud computing are the data encryption, antivirus, firewall, offloading, port-knocking, transfer scheduling, speed data transfer and effective throughput transfer channels. The most useful privacy methods of mobile cloud computing are the QR verification and SMS confirmation. Despite the importance of the security and privacy of mobile cloud computing, to the best of our knowledge, there is not any systematic or comprehensive review were conducted in this domain to clarify the various security and privacy methods based on the architecture of the public mobile cloud computing. This would represent a research contribution. However, the main contribution of this study is the suggested model of the privacy and security of public cloud computing based on the reviewed articles.
机译:可信信息系统。可访问性,可用性,降低信息系统的成本等优点是导致组织采用移动云计算的重要性。为了获得移动云计算的全部好处,将采用公共部署方法。由于数据收集的数据,仍然存在公共移动云计算的安全和隐私挑战。无线网络。本研究旨在调查可用于加强保护云计算的服务和数据的安全和隐私方法。进行了基于系统审查的文献分析,以解决本研究的主要目的。本研究的数据来源是三个高影响的期刊,科学直接,科学和Scopus网络的数据库。通过在过去的5 yeasr中使用系统的分类物品搜索已发布的文章,检索25个相关的作品。本研究的调查结果是根据对检索到相关工程的关键审查构建的。显着的结果表明,安全方法应在三层公共移动云计算,云层,无线连接层和移动设备层中使用。隐私方法仅涉及公共移动云计算的移动设备层。移动云计算的主要安全方法是数据加密,防病毒,防火墙,卸载,端口敲击,传输调度,速度数据传输和有效吞吐量传输通道。移动云计算最有用的隐私方法是QR验证和SMS确认。尽管移动云计算的安全性和隐私性的重要性,但据我们所知,该领域没有任何系统或全面的审查,以澄清基于公共移动云体系结构的各种安全和隐私方法计算。这将代表研究贡献。然而,本研究的主要贡献是基于审查的文章的公共云计算隐私和安全的建议模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号