Community Platform
Interests
  • Analytics
  • Artificial intelligence
  • Content management systems
  • Customer relationship management (CRM)
  • more...
This Year
No Points
Total
1245 Points
MIS Badge

Click here
to validate the recipient

Mobile Cloud Computing and Cloud Security

Mobile Cloud Computing and Cloud Security

Mobile Cloud Computing is an infrastructure for mobile applications to move the data processing and storage from a mobile device to a computing platform located in the cloud. These data can be then accessed over wireless connection from on a web browser or other client on a mobile device. Few of the major advantages of using Mobile Cloud Computing is that it helps improve data storage capacity, process power and has flexible scalability. It can expand an application and service with very little or no constraints. This service is very similar to what we have practiced in MIS 3506 class using Amazon EBS Volumes. Each instance has a volume attached to it which can increase its volume size based on data traffic. Just like how other mobile devices can have access to share Mobile Cloud Computing, AWS Volumes can be attached to any one of the EC2 instances in the same Availability Zone and can be accessed from anywhere.

Cloud Security protects data, applications, and infrastructures within private, public or hybrid clouds. It protects the cloud from data theft, data leakage, data loss or any attempts of unexpected access to it. Some of the security measures for cloud security includes firewalls, penetration testing, tokenization, and virtual private networks. One of the major concerns while using cloud storage is cloud security and more enterprises are now leaning towards hybrid clouds. Hybrid clouds are a combination of two or more interconnected cloud environments, including both public and private clouds. They allow the user to choose where they prefer to upload their workloads among the multiple available environments. During my MIS 3506 class, we paid a good amount of attention to security by having two availability zones. Within these two availability zones, we created two additional subnets within in each available zone, private and public subnets. This not only adds a layer of security but also helps make it more efficient for end-users by providing a closer zone to work in. Not only that, we also used security groups to protect our EC2 instances from any kind of data theft or account hijacking. We managed to secure our EC2 instances by creating three different kinds of security groups with different inbound and outbound rules. Thus, cloud security is very important when thinking about cloud computing.

Data or application security is one of the first factors users consider before using mobile cloud computing. This is one of the biggest concerns preventing cloud computing to be more widely adopted. While using or even considering to use mobile cloud computing, end-users always think about how safe their data would be and whether they should take the risk of either data leakage or data loss. Mobile Cloud Computing and Cloud Security work together to create a better user experience. For a mobile cloud computing service to be successful, it has to be capable enough to protect the customer’s data and privacy to all extent and have very strong cloud security set up.

Mobile Email is an example that implements both Mobile Cloud Computing and Cloud Security. Plenty of organizations have started implementing mobile email which allowed flexible scalability, cost savings, improvement of uptime allowing faster recovery response and most importantly an improved security. Services such as SolarWinds MSP offers cloud-based email security tools and products that help secure inbound and outbound emails, and the data shared or stored.

Work Cited

Ahire, Jayesh Bapu. “MOBILE CLOUD COMPUTING: PART 1.” Medium, Medium, 29 Dec 2017,                               

         https://medium.com/@jayeshbahire/mobile-cloud-computing-part-1-16c5ed408507.

Panda, Prateek. “Security Challenges in Mobile Cloud Computing.” Appknox,

         https://www.appknox.com/blog/security-challenges-in-mobile-cloud-computing.

“Email Security Tools & Products.” SolarWinds MSP,

         https://www.solarwindsmsp.com/products/mail?&utm_source=google-search&utm_medium=cpc&utm_ term=email%20security&utm_content=1783891805&utm_campaign=ML_CPC-Goog_Nonbrand&ds_rl=1280700&gclid=EAIaIQobChMI14TNuqaq5gIV24FaBR0-9A-AEAAYASAAEgLe1vD_BwE&gclsrc=aw.ds.

“What is Different about Cloud Security.” Redhat.Com, 2019,

         https://www.redhat.com/en/topics/security/cloud-security

“Mobile Cloud Training: Course.” Tonex Training,

         https://www.tonex.com/training-courses/mobile-cloud-training/


Skip to toolbar