SlideShare a Scribd company logo
Security and Privacy in Mobile 
Cloud Computing 
Ganesh Arkalgud(1RV11IS021) 
Ram Kumar K R(1RV11IS042) 
Mohammed Ehab(1RV11IS032) 
Original paper by: 
Hui Suo 
Zhuohua Liu 
JiafuWan 
Keliang Zhou
Introduction 
• Advantages of cloud computing 
1. On-demand self service 
2. Extendibility 
• What is mobile cloud computing?
Security and Privacy in Mobile Cloud Computing
Products offered in mobile cloud segment 
• Android OS. 
• LiveMesh. 
• iCloud.
Factors affecting growth of mobile cloud segment 
• Battery life dependencies. 
• Limited resources of mobile devices. 
• Wireless bandwidth and delay. 
• Security of mobile cloud devices. 
• Limited calculation speed.
Model of 
Mobile Cloud 
Computing
SECURITY AND PRIVACY ISSUES IN MOBILE 
CLOUD 
COMPUTING
Mobile terminal security issues 
• Mobile Terminal. 
1. Open source OS 
2. Third party software 
3. Malware 
• Software vulnerabilities 
1. Data transfer with phone and 
computer using FTP. 
• Mis-operation without knowledge.
Mobile Network Security 
1. Phone service. 
2. SMS. 
3. Wi-fi 
4. Bluetooth etc.,
Mobile Cloud 
• Platform Reliability 
susceptible to being attacked with DOS 
• Data and Privacy Protection 
ownership and management of the users' data 
To protect the sensitive data, the single means is not enough. We need 
a complete security solution to protect the data security and privacy of 
users.
CURRENT SECURITY AND PRIVACY 
APROACHES FOR 
MOBILE CLOUD COMPUTING
Aiming at Mobile Terminal Security 
• Anti-malware 
Ex: Cloud AV 
• Software vulnerabilities 
• Regulating Users' Behavior
Aiming at Mobile Network Security 
• Encryption 
• Security Protocol
Aiming at Mobile Cloud Security 
• Protection to Platform Reliability 
• Data Encryption and Key Management 
• Authentication and Access Control 
• Privacy Protection
Summary
THANK YOU

More Related Content

What's hot (20)

PPTX
Details About Mobile Cloud Computing
vaishnavi_sv
 
PPT
Mobile Cloud Computing
Varun Vijay
 
PPTX
An insight for Mobile Cloud Computing (MCC)
Yuvaraj Ilangovan
 
PPTX
Mobile cloud computing
snoreen
 
PPTX
Mobile Cloud Computing
guestc37919f
 
PPTX
Mobile Cloud Computing
BhaktiKarale
 
PPTX
Mobile cloud computing
Harikesh Jaiswal
 
PPTX
Mobile Cloud Computing : The Upcoming Trend !
Sai Natkar
 
PPTX
Mobile cloud computing - Introduction
Maneesha Caldera
 
PPTX
Mobile-Cloud Computing
Kamal Patel
 
PPTX
Mcc architecture
sairaraja077
 
PDF
Research Seminar Presentation - A framework for partitioning and execution of...
malinga2009
 
PDF
Mobile cloud computing
Fatih Özlü
 
PPTX
Mobile Cloud Computing
Vikas Kottari
 
PPTX
Mobile Cloud Computing by FuGenX
FuGenx Technologies
 
PDF
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Anand Bhojan
 
PDF
Security and privacy issues with mobile cloud computing applications june 2016
Merlec Mpyana
 
PPT
Market oriented mobile cloud computing architecture
Saeid Abolfazli
 
PPTX
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
Reza Rahimi
 
PPTX
Mobile cloud Computing
Pooja Sharma
 
Details About Mobile Cloud Computing
vaishnavi_sv
 
Mobile Cloud Computing
Varun Vijay
 
An insight for Mobile Cloud Computing (MCC)
Yuvaraj Ilangovan
 
Mobile cloud computing
snoreen
 
Mobile Cloud Computing
guestc37919f
 
Mobile Cloud Computing
BhaktiKarale
 
Mobile cloud computing
Harikesh Jaiswal
 
Mobile Cloud Computing : The Upcoming Trend !
Sai Natkar
 
Mobile cloud computing - Introduction
Maneesha Caldera
 
Mobile-Cloud Computing
Kamal Patel
 
Mcc architecture
sairaraja077
 
Research Seminar Presentation - A framework for partitioning and execution of...
malinga2009
 
Mobile cloud computing
Fatih Özlü
 
Mobile Cloud Computing
Vikas Kottari
 
Mobile Cloud Computing by FuGenX
FuGenx Technologies
 
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Anand Bhojan
 
Security and privacy issues with mobile cloud computing applications june 2016
Merlec Mpyana
 
Market oriented mobile cloud computing architecture
Saeid Abolfazli
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
Reza Rahimi
 
Mobile cloud Computing
Pooja Sharma
 

Viewers also liked (20)

PDF
Mobile Security Solution - Cloud Computing Major Project
Tarun Gupta
 
PDF
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Janet Jaiswal
 
PPTX
Advances In Satellite Communication
abhijeet rasal
 
PDF
Mobile based authentication and payment
Josef Noll
 
DOCX
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
PDF
Broadband wireless communications
Nagu Omsi
 
PPTX
Mobile computing security
Zachariah Pabi
 
PDF
Cognitive radio
Abdulrahman Fady
 
PDF
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
PPT
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
PDF
Mobile Security
Xavier Mertens
 
PDF
Multimedia Network
Mohammed Hussein
 
PPTX
Designing for privacy in mobile applications
Vodafone developer
 
PPTX
3 g vs 4g
debakshu
 
PDF
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Amber Case
 
PPTX
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
PPTX
Mobile Cloud Computing
Simeon Oriko
 
PPTX
3g 4g ppt
chintu66
 
PPTX
Introduction to 3G
Muhummad Sherjeel Chughtai
 
PPTX
3g & 4g technology
Fatehyab Ahmed
 
Mobile Security Solution - Cloud Computing Major Project
Tarun Gupta
 
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Janet Jaiswal
 
Advances In Satellite Communication
abhijeet rasal
 
Mobile based authentication and payment
Josef Noll
 
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
Broadband wireless communications
Nagu Omsi
 
Mobile computing security
Zachariah Pabi
 
Cognitive radio
Abdulrahman Fady
 
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
Mobile Security
Xavier Mertens
 
Multimedia Network
Mohammed Hussein
 
Designing for privacy in mobile applications
Vodafone developer
 
3 g vs 4g
debakshu
 
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Amber Case
 
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
Mobile Cloud Computing
Simeon Oriko
 
3g 4g ppt
chintu66
 
Introduction to 3G
Muhummad Sherjeel Chughtai
 
3g & 4g technology
Fatehyab Ahmed
 
Ad

Similar to Security and Privacy in Mobile Cloud Computing (20)

PPTX
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
PDF
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
DOCX
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
PDF
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
PDF
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
PDF
Week 7 lecture material
Ankit Gupta
 
PDF
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
PDF
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
PPTX
Cloud Computing Security Issues
Stelios Krasadakis
 
PPTX
LDSS for mobile cloud
sreelekshmi kishna
 
PDF
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
PPTX
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
PDF
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
PDF
A Survey On Mobile Cloud Computing
James Heller
 
PDF
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
PDF
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
 
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
kyogesh5
 
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
ajinkyajagtap23
 
PDF
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
PPTX
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
Week 7 lecture material
Ankit Gupta
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Cloud Computing Security Issues
Stelios Krasadakis
 
LDSS for mobile cloud
sreelekshmi kishna
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Data Security in Mobile Cloud Computing A State of the Art Review
Rida Qayyum
 
A Survey On Mobile Cloud Computing
James Heller
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
 
28_Security-Privacy-in_Cloud_AND_real.ppt
kyogesh5
 
28_Security-Privacy-inxssudusd_Cloud.ppt
ajinkyajagtap23
 
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Ad

More from Ram Kumar K R (8)

PPTX
Z transforms and their applications
Ram Kumar K R
 
PPTX
A brief introduction to Spintronics
Ram Kumar K R
 
PPTX
File systems for mobile phones or handheld devices
Ram Kumar K R
 
PPTX
connecting discrete mathematics and software engineering
Ram Kumar K R
 
PPTX
Alternate sources of energy
Ram Kumar K R
 
PPTX
Inroduction to Cloud databases
Ram Kumar K R
 
PPT
Airports
Ram Kumar K R
 
PPTX
Google and it's management Strategies
Ram Kumar K R
 
Z transforms and their applications
Ram Kumar K R
 
A brief introduction to Spintronics
Ram Kumar K R
 
File systems for mobile phones or handheld devices
Ram Kumar K R
 
connecting discrete mathematics and software engineering
Ram Kumar K R
 
Alternate sources of energy
Ram Kumar K R
 
Inroduction to Cloud databases
Ram Kumar K R
 
Airports
Ram Kumar K R
 
Google and it's management Strategies
Ram Kumar K R
 

Recently uploaded (20)

PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Top Managed Service Providers in Los Angeles
Captain IT
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
July Patch Tuesday
Ivanti
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 

Security and Privacy in Mobile Cloud Computing

  • 1. Security and Privacy in Mobile Cloud Computing Ganesh Arkalgud(1RV11IS021) Ram Kumar K R(1RV11IS042) Mohammed Ehab(1RV11IS032) Original paper by: Hui Suo Zhuohua Liu JiafuWan Keliang Zhou
  • 2. Introduction • Advantages of cloud computing 1. On-demand self service 2. Extendibility • What is mobile cloud computing?
  • 4. Products offered in mobile cloud segment • Android OS. • LiveMesh. • iCloud.
  • 5. Factors affecting growth of mobile cloud segment • Battery life dependencies. • Limited resources of mobile devices. • Wireless bandwidth and delay. • Security of mobile cloud devices. • Limited calculation speed.
  • 6. Model of Mobile Cloud Computing
  • 7. SECURITY AND PRIVACY ISSUES IN MOBILE CLOUD COMPUTING
  • 8. Mobile terminal security issues • Mobile Terminal. 1. Open source OS 2. Third party software 3. Malware • Software vulnerabilities 1. Data transfer with phone and computer using FTP. • Mis-operation without knowledge.
  • 9. Mobile Network Security 1. Phone service. 2. SMS. 3. Wi-fi 4. Bluetooth etc.,
  • 10. Mobile Cloud • Platform Reliability susceptible to being attacked with DOS • Data and Privacy Protection ownership and management of the users' data To protect the sensitive data, the single means is not enough. We need a complete security solution to protect the data security and privacy of users.
  • 11. CURRENT SECURITY AND PRIVACY APROACHES FOR MOBILE CLOUD COMPUTING
  • 12. Aiming at Mobile Terminal Security • Anti-malware Ex: Cloud AV • Software vulnerabilities • Regulating Users' Behavior
  • 13. Aiming at Mobile Network Security • Encryption • Security Protocol
  • 14. Aiming at Mobile Cloud Security • Protection to Platform Reliability • Data Encryption and Key Management • Authentication and Access Control • Privacy Protection