{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:17:35Z","timestamp":1726064255099},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_1","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"1-41","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Frameworks in Mobile Cloud Computing"],"prefix":"10.1007","author":[{"given":"Chaitanya","family":"Vemulapalli","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Madria","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Linderman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/298514.298579","volume-title":"Proceedings of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS \u201990","author":"W G Aref","year":"1990","unstructured":"Aref, W. G., & Samet, H. (1990). Efficient processing of window queries in the pyramid data structure. In Proceedings of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS \u201990 (pp. 265\u2013272). New York: ACM. \nhttps:\/\/doi.org\/10.1145\/298514.298579"},{"issue":"6","key":"1_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599\u2013616. \nhttps:\/\/doi.org\/10.1016\/j.future.2008.12.001","journal-title":"Future Generation Computer Systems"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Chen, E., & Itoh, M. (2010). Virtual smartphone over IP. In IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 (pp. 1\u20136). \nhttps:\/\/doi.org\/10.1109\/WOWMOM.2010.5534992","DOI":"10.1109\/WOWMOM.2010.5534992"},{"key":"1_CR4","unstructured":"Chen, Y., Zhang, Y., & Maharjan, S. (2017). Deep learning for secure mobile edge computing. arXiv preprint arXiv:1709.08025."},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Chen, Y. J., & Wang, L. C. (2011). A security framework of group location-based mobile applications in cloud computing. In 40th International Conference on Parallel Processing Workshops (ICPPW), 2011 (pp. 184\u2013190). \nhttps:\/\/doi.org\/10.1109\/ICPPW.2011.6","DOI":"10.1109\/ICPPW.2011.6"},{"key":"1_CR6","unstructured":"Chen, Y.-J., & Wang, L.-C. (2017). Privacy protection for mobile cloud data: A network coding approach. arXiv preprint arXiv:1701.07075."},{"key":"1_CR7","first-page":"1","volume-title":"Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW \u201910","author":"R Chow","year":"2010","unstructured":"Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., et al. (2010). Authentication in the clouds: A framework and its application to mobile users. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW \u201910 (pp. 1\u20136). New York: ACM. \nhttps:\/\/doi.org\/10.1145\/1866835.1866837"},{"key":"1_CR8","unstructured":"Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., & Li, Q. (2015). SMOC: A secure mobile cloud computing platform. In IEEE Conference on Computer Communications (INFOCOM). Piscataway: IEEE."},{"key":"1_CR9","unstructured":"Hoang, D. T., Niyato, D., Wang, P., Wang, S. S., Nguyen, D., & Dutkiewicz, E. (2018). A stochastic programming approach for risk management in mobile cloud computing. In Wireless Communications and Networking Conference (WCNC), 2018. Piscataway: IEEE."},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Hsueh, S. C., Lin, J. Y., & Lin, M. Y. (2011). Secure cloud storage for convenient data archive of smart phones. In IEEE 15th International Symposium on Consumer Electronics (ISCE), 2011 (pp. 156\u2013161). \nhttps:\/\/doi.org\/10.1109\/ISCE.2011.5973804","DOI":"10.1109\/ISCE.2011.5973804"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Huang, D., Zhang, X., Kang, M., & Luo, J. (2010). MobiCloud: Building secure cloud framework for mobile computing and communication. In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE), 2010 (pp. 27\u201334). \nhttps:\/\/doi.org\/10.1109\/SOSE.2010.20","DOI":"10.1109\/SOSE.2010.20"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In International Conference on Energy Aware Computing (ICEAC), 2010 (pp. 1\u20132). \nhttps:\/\/doi.org\/10.1109\/ICEAC.2010.5702296","DOI":"10.1109\/ICEAC.2010.5702296"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Jia, W., Zhu, H., Cao, Z., Wei, L., & Lin, X. (2011). SDSM: A secure data service mechanism in mobile cloud computing. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2011 (pp. 1060\u20131065). https\/\/doi.org\/10.1109\/INFCOMW.2011.5928784","DOI":"10.1109\/INFCOMW.2011.5928784"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.comnet.2014.03.015","volume":"65","author":"I Khalil","year":"2014","unstructured":"Khalil, I., Khreishah, A., & Azeem, M. (2014). Consolidated identity management system for secure mobile cloud computing. Computer Networks, 65, 99\u2013110.","journal-title":"Computer Networks"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.future.2012.08.003","volume":"29","author":"A N Khan","year":"2013","unstructured":"Khan, A. N., Mat Kiah, M. L., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278\u20131299. \nhttps:\/\/doi.org\/10.1016\/j.future.2012.08.003","journal-title":"Future Generation Computer Systems"},{"key":"1_CR16","unstructured":"Lee, Y., Wang, L., & Gau, R. (2010). Implementation issues of location-based group scheduling for cloud applications. In IEEE VTS Asia Pacific Wireless Communications Symposium Conference (APWCS 2010)."},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Lockwood, J., McKeown, N., Watson, G., Gibb, G., Hartke, P., Naous, J., et al. (2007). NetFPGA\u2013An open platform for gigabit-rate network switching and routing. In IEEE International Conference on Microelectronic Systems Education, 2007. MSE \u201907 (pp. 160\u2013161). \nhttps:\/\/doi.org\/10.1109\/MSE.2007.69","DOI":"10.1109\/MSE.2007.69"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/IC2E.2013.10","volume-title":"Proceedings of the 2013 IEEE International Conference on Cloud Engineering, IC2E \u201913","author":"R K Lomotey","year":"2013","unstructured":"Lomotey, R. K., & Deters, R. (2013). Middleware-layer for authenticating mobile consumers of amazon s3 data*. In Proceedings of the 2013 IEEE International Conference on Cloud Engineering, IC2E \u201913 (pp. 108\u2013113). Washington: IEEE Computer Society. \nhttps:\/\/doi.org\/10.1109\/IC2E.2013.10"},{"key":"1_CR19","volume-title":"In Wireless Communications and Networking Conference (WCNC),","author":"K K Nguyen","year":"2018","unstructured":"Nguyen, K. K., Hoang, D. T., Niyato, D., Wang, P., & Dutkiewicz, E. (2018). Cyberattack detection in mobile cloud computing: A deep learning approach. In Wireless Communications and Networking Conference (WCNC), Piscataway: IEEE."},{"key":"1_CR20","unstructured":"Olafare, O., Parhizkar, H., & Vem, S. (2015). A new secure mobile cloud architecture. arXiv preprint arXiv:1504.07563."},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Panneerselvam, J., Sotiriadis, S., Bessis, N., & Antonopoulos, N. (2012). Securing authentication and trusted migration of weblets in the cloud with reduced traffic. In Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 2012 (pp. 316\u2013319). \nhttps:\/\/doi.org\/10.1109\/EIDWT.2012.20","DOI":"10.1109\/EIDWT.2012.20"},{"key":"1_CR22","unstructured":"Park, I.-S., Lee, Y.-D., & Jeong, J. (2013). Improved identity management protocol for secure mobile cloud computing. In 46th Hawaii International Conference on System Sciences (HICSS), 2013. Piscataway: IEEE."},{"key":"1_CR23","unstructured":"Perez, S. (2010). Mobile cloud computing: $9.5 billion by 2014."},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/j.procs.2014.07.033","volume":"34","author":"S N Premnath","year":"2014","unstructured":"Premnath, S. N., & Zygmunt, J. H. (2014). A practical, secure, and verifiable cloud computing for mobile systems. Procedia Computer Science, 34, 474\u2013483.","journal-title":"Procedia Computer Science"},{"key":"1_CR25","unstructured":"Ramavathu, L., Bairam, M., & Manchala, S. (2017). A framework for secure mobile cloud computing. In Proceedings of the First International Conference on Computational Intelligence and Informatics. Singapore: Springer."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M. (2010). Mobile computing: The next decade. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing &#38; Services: Social Networks and Beyond, MCS \u201910, pp. 5:1\u20135:6. New York: ACM. \nhttps:\/\/doi.org\/10.1145\/1810931.1810936","DOI":"10.1145\/1810931.1810936"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., & Kavitha, V. (2011). Review: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1\u201311. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2010.07.006","journal-title":"Journal of Network and Computer Applications"},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Wang, S., & Wang, X. (2010). In-device spatial cloaking for mobile user privacy assisted by the cloud. In Eleventh International Conference on Mobile Data Management (MDM) (pp. 381\u2013386). \nhttps:\/\/doi.org\/10.1109\/MDM.2010.82","DOI":"10.1109\/MDM.2010.82"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Xiao, S., & Gong, W. (2010). Mobility can help: Protect user identity with dynamic credential. In Eleventh International Conference on Mobile Data Management (MDM) (pp. 378\u2013380). \nhttps:\/\/doi.org\/10.1109\/MDM.2010.73","DOI":"10.1109\/MDM.2010.73"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/1655008.1655026","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW \u201909","author":"X Zhang","year":"2009","unstructured":"Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., & Jeong, S. (2009). Securing elastic applications on mobile devices for cloud computing. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW \u201909 (pp. 127\u2013134). New York: ACM. \nhttps:\/\/doi.org\/10.1145\/1655008.1655026"},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Zhao, K., Jin, H., Zou, D., Chen, G., & Dai, W. (2013). Feasibility of deploying biometric encryption in mobile cloud computing. In 8th ChinaGrid Annual Conference (ChinaGrid), 2013 (pp. 28\u201333). \nhttps:\/\/doi.org\/10.1109\/ChinaGrid.2013.10","DOI":"10.1109\/ChinaGrid.2013.10"},{"key":"1_CR32","doi-asserted-by":"publisher","unstructured":"Zhou, J., Chen, J., Li, L., & Zhang, Z. (2012). The context awareness architecture in mobile cloud computing. In Fifth International Symposium on Computational Intelligence and Design (ISCID) (Vol. 1, pp. 302\u2013305). \nhttps:\/\/doi.org\/10.1109\/ISCID.2012.83","DOI":"10.1109\/ISCID.2012.83"},{"issue":"11","key":"1_CR33","doi-asserted-by":"publisher","first-page":"2518","DOI":"10.1109\/TIFS.2017.2710941","volume":"12","author":"K Zhou","year":"2017","unstructured":"Zhou, K., Afifi, M. H., & Ren, J. (2017). ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing. IEEE Transactions on Information Forensics and Security, 12(11), 2518\u20132531.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR34","unstructured":"Zhou, Z., & Huang, D. (2012). Efficient and secure data storage operations for mobile cloud computing. In 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualization Management (SVM) (pp. 37\u201345)."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:52Z","timestamp":1577775772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_1","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}