Article Preview
Top1. Introduction
Mobile cloud computing (MCC) is laurenched as a cloud computing technology that is available for mobile devices like smartphones and tablets (Mollah et al., 2017). In MCC, mobile users can access cloud-specific tools, program and operating performance, and use cloud infrastructure to deploy and implement a range of applications to improve computing power and enhance the storage space and context. Mobile devices are available. The MCC industry is projected to produce $94.75 billion in sales (online, 2018), according to Mordor Intelligence's report in 2023 (Mordor Intelligence Industry Report, 2018). However, the abundance of mobile cloud providers still raises more protection and privacy issues (Chang et al., 2016). The mobile computing world also introduces new security, convenience and privacy requirements. The conventional user authentication method, based on the username and password, relies on the point of view of the user. For the simplification and convenience of login, the user name and the password have been chosen in the past. However, in recent years people would choose to bring more and more jobs in the mobile terminal due to the huge success of the mobile terminal. As a result, the accounts to be handled are increasing. The findings reveal that on average, every user has 25 accounts in 8 periods of a day and 6.5 passwords and logs. You cannot remember the complex password again but people cannot stop using a plain, weak password and sharing the same password with different network services. If the password of the user is tricked or stolen by the virus and trojan horse, the personal details of the user would be jeopardized (Han et al., 2018).
The protection risks occur for all parties, meaning that the cloud and cloud service providers have problems protecting themselves from possible security attacks for safe sessions, transactions and activities (Gupta & Badve, 2017). It is the responsibility of the cloud service provider to provide its service customers with secured and secure networks to safeguard confidential data, passwords, and applications. In comparison, cloud service providers use sophisticated pin code and strong authentication schemes to deliver stable and uninterrupted services (Chaudhry et al., 2019). Mobile Cloud Computing (MCC) is an evolving technology in which data and information computation, manipulation, and storage take place beyond mobile devices (Xia et al., 2016). This technology is regarded as a cloud itself. MCC has arisen as eminent mobile facilities for effective and economical use of remote computing services and data storage (Oludele & Oluwabukola, 2016). It provides many services, including a network, applications, infrastructure, storage, and reconstruction, etc., and is a very significant cost-effective approach for storage and computation (Pandian & Smys, 2020). The cloud computing services are designed into a replication mechanism to prevent the lack of knowledge about the natural or manmade catastrophe (Gharajeh, 2015). To avoid unintended manipulation and hacking of the information contained in the cloud, it fragments information accompanied by replication to maximize security and to fix concerns of overburdening the cloud. Several times, this scattered information is not well organized but distributed or dispersed changed by random means. This increases the information's recovery time as well as the restored quality (Han et al., 2015).