Protecting Data in the 5G Era: A Critical Review of Cryptographic Techniques for Mobile Cloud Computing

Protecting Data in the 5G Era: A Critical Review of Cryptographic Techniques for Mobile Cloud Computing

Malak Al-Majali (Zarqa University, Jordan), Mohammad Aljaidi (Zarqa University, Jordan), Qais Al-Naamneh (Applied Science Private University, Jordan), Ghassan Samara (Zarqa University, Jordan), Ayoub Alsarhan (Hashemite University, Jordan), and Braa Qadoumi (Applied Science Private University, Jordan)
DOI: 10.4018/979-8-3693-8014-7.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The surge in smartphone users has fueled the development of mobile Cloud Computing (MCC), a technology integrating cloud computing's power with mobile device mobility. MCC offers on-demand access to cloud resources like storage, processing power, and software, enhancing mobile device functionality and efficiency. This paper delves into user privacy concerns in 5G MCC environments. The convergence of mobile computing, wireless networks, and cloud computing has fostered the rapidly evolving field of MCC. Advancements in 5G mobile networks are expected to propel MCC services even further, making them a focal point in the mobile service landscape. However, 5G MCC also presents significant user privacy challenges, including network latency and data security. This paper investigates various cryptographic techniques employed to safeguard user privacy in 5G MCC systems. We compare and analyze encryption techniques, zero-knowledge proofs, MFA, and blockchain, and the inherent challenges associated with each approach.
Chapter Preview

Complete Chapter List

Search this Book:
Reset