While mobile encounters with clouds

Man Ho Au, Kaitai Liang*, Joseph K. Liu, Rongxing Lu

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

3 Citations (Scopus)

Abstract

To date the considerable computation and storage power of clouds that have attracted great attention from mobile users and mobile service providers over the past few years. The convergence of mobile devices and clouds that leads to a brand new era of could-based mobile applications. It brings long-listed advantages for mobile users to get rid of the constraints of mobile devices (including limited mobile memory, data processing ability and battery). However, mobile clouds yield new security and privacy risks in open network setting. This survey paper attempts to introduce security risks on mobile clouds in the view point of applied cryptography.

Original languageEnglish
Title of host publicationNetwork and System Security - 10th International Conference, NSS 2016, Proceedings
EditorsMoti Yung, Jiageng Chen, Chunhua Su, Vincenzo Piuri
PublisherSpringer
Pages3-18
Number of pages16
ISBN (Print)9783319462974
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event10th International Conference on Network and System Security, NSS 2016 - Taipei, Taiwan
Duration: 28 Sept 201630 Sept 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9955 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Network and System Security, NSS 2016
Country/TerritoryTaiwan
CityTaipei
Period28/09/1630/09/16

Fingerprint

Dive into the research topics of 'While mobile encounters with clouds'. Together they form a unique fingerprint.

Cite this