Instead of developing mobile apps for the rigid platform, Cloud computing has made developing applications much flexible. Cloud computing encompasses on demand availability of the storage, software and processing power. It is embedded with device independence, reliability, ease in access, security and least required maintenance.
Cloud computing services have become easy to reach for all enterprises that deliver compatible and resilient services to employees and customers with enhanced business agility.
Bringing the cloud computing services to the mobile environment is termed as Mobile cloud computing. It consolidates the elements of cloud computing and mobile networks, providing excellent services to mobile
users. In mobile cloud computing, powerful mobile configuration is not much required since all the entangled and complicated computing modules are processed in the cloud itself.
It is the amalgamation between cloud computing and mobile network offering optimal applicability for mobile users. Rather than keeping on individual devices when data is kept on internet, cloud computing exists there providing on demand access.
Security aspect of Mobile cloud computing
One of the key issues that most of the cloud providers are considering is securing user protection and integration of application data. As mobile cloud computing is a combinational field of cloud computing
and mobile networks, the security related matters are categorized as: mobile networks user’s security and cloud security.
- Mobile network user’s security – Different mobile handsets such as Smartphones, laptops, PDA’s and cellular phones are well aware of the numerous security instability and vulnerabilities such as malicious codes. Some cloud computing applications can prompt to security breaches as these devices troubling the user ultimately. Two main issues regarding subscriber’s security are:
- The best way of capturing security vulnerability is to run security software and anti-virus programs on mobile devices. Mobile devices are litigated with processing limitations which is why securing them from these threats could be more hazardous as compared to regular computers. Number of approaches can be developed transferring vulnerability detection and protection mechanism to the cloud. The application must handover to the user after it passes through some level of threat evaluation. All file activities before sending to the user need to be verified if it is malicious or not.
- Scenarios are created for privacy issues when personal information such as your current location or user’s hidden information is revealed.
- Information secured on the clouds – Enterprise and individuals both take the bonanza of storing large amount of data in the cloud.
- The integrity of the information stored on the cloud must be properly ensured by the user. Every user access must be authenticated. Different approaches can be proposed ensuring integrity of the information stored on the cloud.
- Numerous authorization mechanism have been proposed with the means of cloud computing in order to secure the data access. Some make use of open standards and support the integrity of the various authorization methods.