{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T07:16:50Z","timestamp":1765610210372,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_55","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"587-600","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Mobile Cloud Computing: Issues, Applications and Scope in COVID-19"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5283-7716","authenticated-orcid":false,"given":"Hariket Sukesh Kumar","family":"Sheth","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2657-8700","authenticated-orcid":false,"given":"Amit Kumar","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Hussain, M: Security issues and challenges of mobile cloud computing. Int. J. Grid Distrib. Comput. 6, 37\u201350 (2013). www.sersc.org","DOI":"10.14257\/ijgdc.2013.6.6.04"},{"key":"55_CR2","unstructured":"Mobile Cloud Market \u2013 Growth, Trends, COVID-19 Impact, and Forecasts (2021\u201326). https:\/\/www.mordorintelligence.com\/industry-reports\/global-mobile-cloud-market-industry"},{"key":"55_CR3","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Blockchain for secure EHRs sharing of mobile cloud based E-Health systems. IEEE Access 7, 66792\u201366806 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"55_CR4","unstructured":"Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic medical records sharing using blockchain. AMIA Annu. Symp. Proc. 2017, 650\u2013659 (2018). PMID: 29854130; PMCID: PMC5977675"},{"issue":"10","key":"55_CR5","doi-asserted-by":"publisher","first-page":"470","DOI":"10.3390\/sym10100470","volume":"10","author":"M Holbl","year":"2018","unstructured":"Holbl, M., Kompara, M., Kamisalic, A., Zlatolas, L.N.: A systematic review of the use of blockchain in healthcare. Symmetry 10(10), 470 (2018). https:\/\/doi.org\/10.3390\/sym10100470","journal-title":"Symmetry"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jnca.2018.10.021","volume":"128","author":"H Elazhary","year":"2019","unstructured":"Elazhary, H.: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions. J. Netw. Comput. Appl. 128, 105\u2013140 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.10.021","journal-title":"J. Netw. Comput. Appl."},{"key":"55_CR7","doi-asserted-by":"publisher","unstructured":"Eom, H., Figueiredo, R., Cai, H., Zhang, Y., Huang, G.: MALMOS: machine learning-based mobile offloading scheduler with online training. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 51\u201360 (2015). https:\/\/doi.org\/10.1109\/MobileCloud.2015.19","DOI":"10.1109\/MobileCloud.2015.19"},{"key":"55_CR8","doi-asserted-by":"publisher","unstructured":"Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Silva, F.J.d.S.e.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 123\u2013128 (2015). https:\/\/doi.org\/10.1109\/PERCOMW.2015.7134005","DOI":"10.1109\/PERCOMW.2015.7134005"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Hernandez, L., Cao, H., Wachowicz, M.: Implementing an Edge-fog-cloud Architecture for Stream Data Management. Cornell University Library (2017). https:\/\/arxiv.org\/abs\/1708.00352","DOI":"10.1109\/FWC.2017.8368538"},{"key":"55_CR10","unstructured":"UST Global. Internet of Medical Things (IoMT) Connecting Healthcare for a Better Tomorrow (2017). https:\/\/www.ust-global.com\/sites\/default\/files\/internet_of_medical_things_iomt.pdf"},{"key":"55_CR11","doi-asserted-by":"publisher","unstructured":"Alvi, S.A., Shah, G.A., Mahmood, W.: Energy efficient green routing protocol for internet of multimedia things. In: 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/ISSNIP.2015.7106958","DOI":"10.1109\/ISSNIP.2015.7106958"},{"key":"55_CR12","unstructured":"Amit Kumar, T., Shamila, M.: Spy in the crowd: how user\u2019s privacy is getting affected with the integration of Internet of Thing\u2019s devices (March 20, 2019). In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26-28, 2019"},{"key":"55_CR13","first-page":"945","volume":"2012","author":"S Kosta","year":"2012","unstructured":"Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. Proc. IEEE INFOCOM 2012, 945\u2013953 (2012)","journal-title":"Proc. IEEE INFOCOM"},{"key":"55_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jnca.2015.05.016","volume":"59","author":"K Gai","year":"2016","unstructured":"Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59, 46\u201354 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Banerjee, X., Chen, J.E., Gopalakrishnan, V., Lee, S., Van Der Merwe, J.: MOCA. In: Proceedings of the Eighth ACM International Workshop on Mobility in the Evolving Internet architecture, pp. 11\u201316, ACM, Miami, FL, USA (2013)","DOI":"10.1145\/2505906.2505907"},{"key":"55_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2015.05.006","volume":"72","author":"Y Lin","year":"2015","unstructured":"Lin, Y., K\u00e4m\u00e4r\u00e4inen, T., Di Francesco, M., Yl\u00e4-J\u00e4\u00e4ski, A.: Performance evaluation of remote display access for mobile cloud computing. Comput. Commun. 72, 17\u201325 (2015). https:\/\/doi.org\/10.1016\/j.comcom.2015.05.006","journal-title":"Comput. Commun."},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Khan, A.N., Kiah, M.L., Ali, M., Shamshirband, S.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651\u2013675 (2015)","DOI":"10.1007\/s10723-015-9352-9"},{"key":"55_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-981-10-2035-3_10","volume":"87","author":"S Kaur","year":"2016","unstructured":"Kaur, S., Sohal, H.S.: Hybrid application partitioning and process offloading method for the mobile cloud computing. Proc. First Int. Conf. Intell. Comput. Commun. 87, 95 (2016). https:\/\/doi.org\/10.1007\/978-981-10-2035-3_10","journal-title":"Proc. First Int. Conf. Intell. Comput. Commun."},{"key":"55_CR19","doi-asserted-by":"publisher","unstructured":"Gu, Y., March, V., Sung Lee, B.: GMoCA: Workshop on Green and Sustainable Software GREENS), Zurich, 3\u20133 June 2012, pp 15\u201320, Print ISBN: 978-1-4673-1833-4. https:\/\/doi.org\/10.1109\/GREENS.2012.6224265","DOI":"10.1109\/GREENS.2012.6224265"},{"key":"55_CR20","doi-asserted-by":"publisher","first-page":"5623","DOI":"10.1002\/cpe.3590","volume":"27","author":"J Cao","year":"2015","unstructured":"Cao, J., Yu, B., Dong, F., Zhu, X., Xu, S.: Entropy-based denial-of-service attack detection in cloud data center. Concurrency Computat. Pract Exper. 27, 5623\u20135639 (2015). https:\/\/doi.org\/10.1002\/cpe.3590","journal-title":"Concurrency Computat. Pract Exper."},{"key":"55_CR21","doi-asserted-by":"publisher","unstructured":"Tong, Z., Zhu, Z., Wang, Z., Wang, L., Zhang, Y., Liu, Y.: Cache side-channel attacks detection based on machine learning. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 919\u2013926 (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00123","DOI":"10.1109\/TrustCom50675.2020.00123"},{"key":"55_CR22","first-page":"79","volume":"118","author":"AC Donald","year":"2018","unstructured":"Donald, A.C., Arockiam, L., Kalaimani, S.: ORBUA: An effective data access model for MobiCloud environment. Int. J. Pure Appl. Math. 118, 79\u201384 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"55_CR23","doi-asserted-by":"publisher","first-page":"e5520","DOI":"10.1002\/cpe.5520","volume":"32","author":"T Bhatia","year":"2020","unstructured":"Bhatia, T., Verma, A.K., Sharma, G.: Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurr. Computat. Pract. Exper. 32, e5520 (2020). https:\/\/doi.org\/10.1002\/cpe.5520","journal-title":"Concurr. Computat. Pract. Exper."},{"key":"55_CR24","doi-asserted-by":"publisher","first-page":"e3980","DOI":"10.1002\/dac.3980","volume":"32","author":"A Irshad","year":"2019","unstructured":"Irshad, A., Chaudhry, S.A., Shafiq, M., Usman, M., Asif, M., Ghani, A.: A provable and secure mobile user authentication scheme for mobile cloud computing services. Int. J. Commun. Syst. 32, e3980 (2019). https:\/\/doi.org\/10.1002\/dac.3980","journal-title":"Int. J. Commun. Syst."},{"key":"55_CR25","doi-asserted-by":"publisher","unstructured":"Yadav, H., Dave, M.: Secure data storage operations with verifiable outsourced decryption for mobile cloud computing. In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), pp. 1\u20135 (2014). https:\/\/doi.org\/10.1109\/ICRAIE.2014.6909236","DOI":"10.1109\/ICRAIE.2014.6909236"},{"key":"55_CR26","doi-asserted-by":"publisher","unstructured":"Rashidi, O., Azzahra Mohd Zaifuddin, F., Mohd Hassan, Z.: Carotenoid biosynthesis regulatory mechanisms in plants. J. Oleo Sci. 63(8), 753\u2013760 (2014). Released July 29, 2014, [Advance publication] Released July 14, 2014,\u00a0Online ISSN 1347-3352,\u00a0Print ISSN 1345-8957https:\/\/doi.org\/10.5650\/jos.ess13183","DOI":"10.5650\/jos.ess13183"},{"key":"55_CR27","doi-asserted-by":"publisher","first-page":"473","DOI":"10.7763\/IJCTE.2012.V4.511","volume":"4","author":"SM Mathew","year":"2012","unstructured":"Mathew, S.M.: Implementation of cloud computing in education - a revolution. Int. J. Comput. Theory Eng. 4, 473\u2013475 (2012). https:\/\/doi.org\/10.7763\/IJCTE.2012.V4.511","journal-title":"Int. J. Comput. Theory Eng."},{"issue":"1","key":"55_CR28","doi-asserted-by":"publisher","first-page":"012076","DOI":"10.1088\/1742-6596\/1828\/1\/012076","volume":"1828","author":"S Agrawal","year":"2021","unstructured":"Agrawal, S.: A survey on recent applications of cloud computing in education: COVID-19 perspective. J. Phys. Conf. Ser. 1828(1), 012076 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1828\/1\/012076","journal-title":"J. Phys. Conf. Ser."},{"key":"55_CR29","unstructured":"Dadhich, P., Kavita, Dr.: Cloud Computing Impact on Healthcare Services During COVID-19 Pandemic (2021)"},{"key":"55_CR30","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/ElConRus51938.2021.9396367","volume":"2021","author":"O Popadina","year":"2021","unstructured":"Popadina, O., Salah, A.-M., Jalal, K.: Voice analysis framework for asthma-COVID-19 early diagnosis and prediction: AI-based mobile cloud computing application. IEEE Conf. Russian Young Res. Electr. Electron. Eng. (ElConRus) 2021, 1803\u20131807 (2021). https:\/\/doi.org\/10.1109\/ElConRus51938.2021.9396367","journal-title":"IEEE Conf. Russian Young Res. Electr. Electron. Eng. (ElConRus)"},{"key":"55_CR31","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s42600-020-00106-3","volume":"1","author":"A Sharma","year":"2020","unstructured":"Sharma, A., Bahl, S., Bagha, A.K., Javaid, M., Shukla, D.K., Haleem, A.: Blockchain technology and its applications to combat COVID-19 pandemic. Res. Biomed. Eng. 1, 8 (2020). https:\/\/doi.org\/10.1007\/s42600-020-00106-3","journal-title":"Res. Biomed. Eng."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:23:03Z","timestamp":1648300983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_55","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}