Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15851
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnitha, M-
dc.contributor.authorSenbagavalli, M-
dc.date.accessioned2024-07-13T12:38:04Z-
dc.date.available2024-07-13T12:38:04Z-
dc.date.issued2023-03-24-
dc.identifier.citationVol. 2 No. 1; pp. 62-69en_US
dc.identifier.issn2583-6250-
dc.identifier.urihttps://doi.org/10.59461/ijdiic.v2i1.44-
dc.identifier.urihttps://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15851-
dc.description.abstractMobile cloud computing is the technique of using cloud technology and various rich mobile applications are intended to be able to run on a variety of mobile devices using the technique called mobile cloud computing. In recent years, huge amounts of data are stored by the clients which are much more easily to the integration of cloud platforms into mobile systems. The ways of security used in portable device settings are one of the key challenges in this respect as the number of people using smartphones continues to rise. None of the models that have been developed with confidence and privacy for precaution of data in mobile cloud systems are impervious to destructive attacks, despite countless attempts. While mobile cloud computing has great potential, security, privacy, viability, and accessibility concerns must still be considered by both consumers and businesses. Additionally, it emphasizes the use of Canny Card Web Services (CCWS) competition to enhance mobile cloud computing security with IOT. This paper has been presented with more than one user application: a smart house and a smart parking in an educational institution, in the inclusion of IOT with cloud computing for demonstrating various admittance control and endorsement requirement. A review regarding this paper concentrated on a little model that is intended the security and privacy ensureability of data in mobile clouds. Additionally, to manage mobile cloud security difficulties and challenges, it is important to look at the current situation with regard to cloud security breaches, the weaknesses of mobile cloud devices, and the best ways to address these issues in the near future with regard to mobile device management and mobile data protection.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Data Informatics and Intelligent Computingen_US
dc.subjectMobile Computingen_US
dc.subjectSecurity and threatsen_US
dc.subjectMobile data protectionen_US
dc.subjectInternet of Thingsen_US
dc.titleDynamic Mobile Cloud Eco System Security - A Reviewen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
ijdiic_v2n1a6.pdf281.07 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.