A Review of Attacks and Challenges in Mobile Cloud Computing
Abstract
In MANET, all mobility terminals are a self-directed nodal, that may function as both a router and a host. Some applications of mobile ad hoc network are described in this paper. Securing wireless ad hoc networks is an incredibly complicated issue. A special system may be vulnerable to unauthorized data manipulation because the system does not confirm a customer’s individuality prior to agree to data access. In mobile cloud computing, the previous cell devices found for intensive computing, information storage and mass understanding processing have been transferred to cloud and thus the specifications of cell devices in computing ability and assets have been reduced.
Cite this Article
Bandana Sharma, Neelam Joshi. A Review of Attacks and Challenges in Mobile Cloud Computing. Journal of Computer Technology & Applications. 2017; 8(1): 35–43p.
Keywords
Full Text:
PDFRefbacks
- There are currently no refbacks.