Security of mobile cloud computing: A systematic mapping study

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Cloud Computing has gained more prominence in organizations in the last years. Meanwhile, ubiquity and mobility are two main features that have emerged from the popularization of mobile devices. Therefore, the combination of ubiquitous mobile network and cloud computing generates Mobile Cloud Computing technology. This next-generation technology has led to the development of applications based on mobile cloud computing, which required specific security features because of their specific requirements. This paper presents the results of a systematic mapping done for mobile cloud computing technology. This study breaks down the security sub-characteristic from the ISO / IEC 25010 relates them to the information found in our study that analyzed and evaluated a total of 83 articles. The novelties found in this study allow to identify the security problems that are not being addressed by the researchers and in this way, can be quantified to serve as the basis for future research.

Original languageEnglish
Title of host publication2017 IEEE 2nd Ecuador Technical Chapters Meeting, ETCM 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538638941
DOIs
StatePublished - 4 Jan 2018
Event2nd IEEE Ecuador Technical Chapters Meeting, ETCM 2017 - Salinas, Ecuador
Duration: 16 Oct 201720 Oct 2017

Publication series

Name2017 IEEE 2nd Ecuador Technical Chapters Meeting, ETCM 2017
Volume2017-January

Conference

Conference2nd IEEE Ecuador Technical Chapters Meeting, ETCM 2017
Country/TerritoryEcuador
CitySalinas
Period16/10/1720/10/17

Keywords

  • MCC
  • Mobile Cloud Computing
  • Security
  • Software Quality
  • SQuaRE
  • Systematic Review

Fingerprint

Dive into the research topics of 'Security of mobile cloud computing: A systematic mapping study'. Together they form a unique fingerprint.

Cite this