Privacy and Data Storage Processing In Mobile Cloud Computing


  • Abraham Biable


Mobile Cloud Computing, User friendly, operating system, Internet.


Mobile cloud computing (MCC) is a technology which produced to architect application design, privacy content presentation and storage cover without the use of mobile operating system. They are performed through the internet. Before the arrival of mobile computing -smart phones are not act as his specified name. Because lot of storage issues, privacy problems, most importantly datas are hacked by the hackers through the mobile applications. This problems are overcame by the MCC as one of the part of cloud computing. Most important thing is they are wireless connected networks. The advantage of using MCC is they are developing the user friendly mobile applications. In this article we are discussing about how the datas and files are firmly secure in the mobile cloud computing.


Download data is not yet available.

Author Biography

Abraham Biable

Dean of Engineering and Technology , Bule Hora University,Bule Hora,Ethiopia ,Africa.


[1] Krithikashree, L., Manisha, S. and Sujithra, M., “Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage,” in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)July.2018, pp. 1-5.

[2] Chen, C.A., Won, M., Stoleru, R. and Xie, G.G., “Energy-efficient fault-tolerant data storage and processing in mobile cloud” in IEEE Transactions on cloud computing, 3(1), 2014, pp. 28-41.

[3] Suguna, M. and Shalinie, S.M.,, “Privacy preserving data auditing protocol for secure storage in mobile cloud computing”, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2725-2729, Mar. 2017.

[4] Shiraz, M., Gani, A., Khokhar, R.H. and Buyya, “A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing.” in IEEE Communications Surveys & Tutorials, 15(3), 2012, pp. 1294-1313.

[5] Shravanthi, C. and Guruprasad, H.S.,, “ Mobile Cloud Computing as future for mobile applications” in . International Journal of Research in Engineering and Technology, 3(5),, 2014, pp. 2319-2322.

[6] Bahrami, M.,, “. Cloud Computing for Emerging Mobile Cloud Apps”, 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2015,pp. 4-5.

[7] Larosa, Y.T., Chen, J.L., Deng, D.J. and Chao, H.C.,, “Mobile cloud computing service based on heterogeneous wireless and mobile P2P networks”, 7th International Wireless Communications and Mobile Computing Conference,2011, pp. 661-665.

[8] Hlatshwayo, C.M. and Zuva, T.,“Mobile public cloud computing, merits and open issues”, International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 128-132, 2016.

[9] Mascolo, C., “The power of mobile computing in a social era”, IEEE Internet Computing, (6),pp. 76-79, 2010.

[10] Hu, W.B. and Meng, B., “ Mobile server: an efficient mobile computing platform based on mobile agent”, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005,pp. 1339-1342.

[11] Hani, Q.B. and Dichter, J.P.,, “Secure and strong mobile cloud authentication.”, SAI Computing Conference (SAI) ,2016,pp. 562-565.

[12] You, W., Qian, K., Lo, D.C.T., Bhattacharya, P., Chen, W., Rogers, T., Chern, J.C. and Yao, J., “Promoting mobile computing and security learning using mobile devices.”, IEEE Integrated STEM Education Conference,2015,pp. 205-209.

[13] He, W., Li, H., Cui, L. and Lu, S.,“Maximizing the Availability of Process Services in Mobile Computing Environments”, 2016 IEEE International Conference on Services Computing (SCC),2016,pp. 483-490.

[14] El-Sofany, H.F. and El-Seoud, S.A.,“Studying the effectiveness of using mobile cloud computing applications in learning”, International Conference on Interactive Mobile Communication, Technologies and Learning (IMCL), 2016,pp. 17-23.

[15] Qi, H. and Gani, A.,“Research on mobile cloud computing: Review, trend and perspectives”, Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP) 2012,pp. 195-202.