148,755 research outputs found

    Survey on Mobile Social Cloud Computing (MSCC)

    Get PDF
    Due to enhancement in technology the use of mobile devices increases with time. Now mobile devices (mobiles, PDA, Laptops etc.) became an essential part of mankind’s life. With the ease of Internet the popularity of Social Networking Services (SNS) among people increases. With the sharp drops in the prices, the working of mobile devices including smart phones and laptops is rising steadily. So due to this, mobile devices are now used as a provider of computing resources and services instead of requester. For this concept of Cloud Computing (CC) is merged with the mobile computing and SNS which is known as MSCC. MSCC is technology of future and it enables users/consumers to access the services in a fast and efficient manner. MSCC is the integration of three different technologies 1) Mobile Computing 2) SNS 3) Cloud Computing. Here mobile devices are (those have moments) using SNS (Both as a provider or requester) in Cloud Computing (CC) environment. In such environment, a user through mobile devices canparticipate in a social network through relationships which are based on trust. Units of the identical or alike social network can share services or data of cloud with other users of that social network without any authentication by using their mobile device as they be members of the identical social network. Various techniques are revised and improved to achieve good performance in a cloud computing network environment. In this work, there is a detailed survey of existing social cloud and mobile cloud techniques and their application areas. The comparative survey tables can be used as a guideline to select a technique suitable for different applications at hand. This survey paper reports the results of a survey of Mobile Social Cloud Computing (MSCC) regarding the importance of security of MSCC. Here we compare the works of different researcher in the field of MSCC on the basis of some essential features like security algorithm used, Qos and Fault tolerant strategy used, ease of proposed algorithm, space complexity etc. Considering all the limitations of the existing social cloud and mobile cloud techniques, an adaptive MSCC framework of Fault tolerance for future research is proposed

    Why Do Users Continue to Use Mobile Cloud Computing Applications? A Security-Privacy

    Get PDF
    Mobile cloud computing (MCC) apps are mobile apps that use cloud computing technology to provide larger storage capacity and simultaneous access from different mobile devices. Despite the benefits, sending data to the cloud raises security and privacy concerns as mobile users do not have direct control over their data in the cloud. Further, many MCC apps are not used just after single use. In this study, we do a cost/benefit analysis based on security and privacy to investigate the factors that drive or inhibit mobile users to continue to use MCC apps. Additionally, we examine whether security and privacy interventions of MCC apps providers influence the cost/benefit analysis. The results of the survey with 412 MCC apps users show that while security concerns inhibit, privacy concerns do not stop using MCC apps. The value of MCC apps is the main enabler followed by trust to continue to use the apps. The results also show that security and privacy interventions do not add value to MCC apps, but they increase trust. These interventions decrease privacy concerns but have no effect on security concerns. Finally, these interventions indirectly drive users to continue to use the apps through trust

    A Study on Emerging Trends and Challenges in Mobile Cloud Computing

    Get PDF
    The proficiencies of mobile devices and mobile application continues to improve swiftly in relation to speed, computing power, storage and real world user friendly applications. Survey carried out by the Gartner Company (Famous global analytical consulting company) predicted more users to access the internet from the mobile devices than from the PCs by the year 2013. The outburst of the development in smart phones, applications and cloud computing concept has introduced Mobile Cloud Computing (MCC) as a dynamic technology for mobile devices. Mobile Cloud Computing (MCC) incorporates cloud computing into the mobile environment and overcome some problems in performance (e.g., battery life, storage), environment (e.g., scalability, availability) and security (reliability and privacy).Since MCC is still at primary stage of development we have to first theoretically understand the technology which would later on help us in the prediction of future research. In this paper, we introduce the background and theory of Mobile Cloud Computing (MCC), the benefits of MCC, challenges faced in MCC and finally some proposed possible future solution

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    Identifying and measuring the dimensions of risky IT behavior

    Get PDF
    As the use of personal mobile computing devices is growing exponentially, many organizations are implementing BYOD programs that allow employees access corporate networks using their mobile devices. Consequently, these devices can become a vehicle to transfer the risky IT behavior of individuals to enterprises. The ubiquitous, multifunctional, and highly-connected nature of mobile devices create a unique context for studying risky use of these devices. Previous IS security research has studied adoption of protective technologies. However, there is a lack of research on measuring different dimensions of risky IT behavior and how they can be influenced by using protective technologies. To address this gap, we develop a survey to identify and measure the individuals’ risky IT behaviors on mobile devices. We will then extend our research to investigate antecedents of users’ risky IT behaviors across different devices
    • …
    corecore