A Comprehensive Comparison between Cloud Computing and Mobile Edge Computing (original) (raw)
Related papers
Mobile Cloud Computing-Challenges and Security Issues
2015
Mobility has changed the way the world has been looking at mobile phones. Mobile phones have become smart and mobile applications more intelligent and complex. These applications require heavy computations, data mining, searching and multimedia processing. This is where Cloud services can help greatly by enhancing the computing capability of otherwise not so competent mobile devices. Mobile Cloud Computing is cloud computing extended by mobility and a new ad-hoc infrastructure based on mobile devices. The potential growth of mobile cloud computing seems to have taken the world by storm. In the current scenario security of data on the Mobile Cloud has become more important because of the increasing usage of mobile devices with internet. This paper therefore discusses the security issues involved in mobile cloud computing and the solutions that have been proposed till now.
Security Issues and Challenges of Mobile Cloud Computing
International Journal of Grid and Distributed Computing, 2013
Cloud computing is proving itself an emerging technology in IT world which provides a novel business model for organizations to utilize softwares, applications and hardware resources without any upfront investment. Few years later with the broad development in mobile applications and advancements in cloud computing, a new expansion is being expected in the form of mobile cloud computing (MCC). MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment. Despite the astonishing advancement achieved by MCC, the users of MCC are still below expectations because of the associated risks in terms of security and privacy. These risks are playing important role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC environment. This paper presents a comprehensive literature review of MCC and its security issues and challenges.
International Journal of Distributed and Cloud Computing, 2021
The procreation of IoT (Internet of Things), mobile internet and the attainment of cloud computing services have innovated a new computing archetype, known as edge computing. According to the International Data Corporation (IDC) forecast, worldwide data will reach about 180 zettabytes (ZB) and out of which 70% of data generated by IoT devices will be processed on the edge of the network by 2025. IDC also forecasts the IoT devices connected to reach 150 billion by 2025. Edge computing has the ability to deal with the huge volume of data and to handle the requirement of response time, data handling, bandwidth cost saving, along with privacy and data security. Edge computing enables low latency, mobility, and real-time data processing at a very faster pace. This paper is meant to introduce with the notion of edge computing, the three-level architecture of the edge model with the detailed difference between the edge computing model and the traditional cloud model. The various edge models that enable processing at the edge includes mobile edge computing, fog computing and cloudlet computing. Possessing the various advantages and models, edge computing still suffers from various security challenges. The paper concludes stating the security challenges that edge computing still need to focus upon.
Mobile Cloud Computing and Its Security and Privacy Challenges
Concepts, Methodologies, Tools, and Applications
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.
A Review on Security in Mobile Cloud Computing
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud Computing refers to various services that are accessible through the Internet. These essential sources encompass servers, databases, storage, analytics, software, and different applications. Mobile cloud computing (MCC) is the availability of cloud computing offerings in a cell environment. Mobile Cloud Computing at its simplest refers to an infrastructure where both the storage and therefore, the processing of information happens outside the mobile device. Users can remotely store their data also enjoy high-quality on-demand cloud applications without the restrictions of getting to get and maintain your local hardware and software. Despite the surprising advancement achieved by MCC, the clients of MCC remains below expectations. Thanks to the related risks regarding security and confidentiality. The more and more information is placed onto the cloud by the individuals and enterprises, the more the safety issue begins to grow. This paper gives a summary of the cloud computing concept followed by an outline of mobile cloud computing, and therefore, the different security issues pertinent to the mobile cloud computing environment.
Survey on Edge Computing Security
2021
It's possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of Things (IoT) computing would be allowed. In EC, data processed by local tools, computers, or servers, instead of being process and transmitted from the data center. However, with the wider capabilities of EC by increasing the network performance and reducing the latency, security challenges, and the risks will increase with data being stored and used on these devices on the edge or end of the network. This paper first provides a definition of EC and explain the reasons that led to the rapid spread of this type of computing with an explanation of the most important differences between EC and CC, in terms of the resources available for each type, processing, storage, as well as the privacy and security factor. Later, explaining the uses and benefits of this type of computing. However, the challenges are also taken into consideration,...
Mobile Cloud Computing and Security Challenges
The International Journal of Science & Technoledge, 2019
Cloud computing is gaining a tremendous momentum and transmogrifying many interconnected systems by providing social organization with computing resources that features easy computerization, connectivity, scalability, construction and stationing. Altogether it creates extensive variety of privacy and security concerns which need to be addressed.
Security, Privacy Issues and Solutions of Mobile Cloud Computing
United International Journal for Research & Technology, 2021
Simplicity usage, accessibility and the lack of internationally agreed overall service access / safety protocols allow the mobile cloud vulnerable to various forms of violence. The introduction of smartphones and the extensive usage of other technology such as smartphones has brought significant changes to cloud storage, providing a higher level of versatility in data access, and thus increasing the need for security protocols. Unlike many problems, when dealing with business goals, financial activity and health care, protection and confidentiality are critical. In this study, we discuss mobile cloud computing in detail, then the model and role of the whole technology. Finally, we dragged some solutions for the three-level security and privacy concerns.
Cloud and Edge Computing Security Challenges
In recent years, Cloud and edge computing have got much attention because of the ever-increasing demands. There are many future technologies and advantages for systems to move towards clouds based on information keep methods. This includes a simple IT substructure and administration, and an effective distant approach from anyplace in the global with the steady computer network connections and efficient cost that cloud engineering can give. The privateness and security situations associated with the cloud need additional search. Scientists have presented prospective methods to these situations in antecedently published researches. This proposed paper makes a study of cloud and edge security challenges and demands, known threats, and vulnerabilities. The paper's purpose is to investigate the various elements of cloud and edge computing with the recent developments in edge computing, the current privacy and security issues these schemes aspect. Then provides a novel categorization ...
Mobile Cloud Computing: Issues from a Security Perspective
2014
Mobile Cloud Computing (MCC) is exploring prodigious storm in IT due to anywhere anytime data access. Mobile contrivances are enabled with affluent utilizer experience especially, Smartphones. Apple, Google, Facebook and Amazon are the top four horsemen in the mobile world. That is why the mobile cloud computing technology is growing rapidly among the users and at the same time it introduces the incipient security threats withal. In MCC, teemingness of investigations are being carried out to eradicate the issues to make IT more reliable and secure because more precious data are stored in the cloud environment. As the Internet-enabled mobile contrivances including smartphones and tablets perpetuate to grow, web-predicated malignant threats will perpetuate to increment in number to make more involute. Securing data is more critical in the Mobile Cloud Environment. In MCC, Security is the major issue. In this paper, the working concepts of MCC and its assorted security issues and solut...