Professional Documents
Culture Documents
'
Hui Suo, Zhuohua Liu, Jiafu Wan
Keliang Zhou
Abstract
privacy
in
the
mobile
cloud
computing.
By
deeply
INTRODUCTION
655
A.
III.
COMPUTING
A.
B.
Mobile Terminal
1)
Malware
SaaS(Software-as-a-Service)
Cloud
laaS( lnfrastructure-as-a-Service )
., t []
Mobile network
Mobile tenninal
Figure I.
656
2)
Software Vulnerabilities
a) Application Software
is
only
one
example
of
the
software
application software.
b) Operating System
Operating system is in charge of the management and
control of the hardware and software resource. And it is
so complex software that it will exits coding bugs. In
C.
3)
Mobile Cloud
J)
Others
2)
Figure 2.
B.
Platform Reliability
IV.
657
A.
B.
Anti-malware
2)
Software Vulnerabilities
3)
658
C.
2)
3)
4)
Privacy Protection
REFERENCES
[I]
[2]
[3]
[4]
[5]
[6]
Security issues
Mobile
terminal
Mobile
network
Malware software
Software vulnerabilities
(application software;
operating system)
Others(lack of security
awareness,mis-operation)
Information leakage or
Malicious attack
Platform reliability
Mobile
cloud
[7]
V.
[8]
[9]
[10]
Data encryption
Security protocol
[II]
[12]
[13]
[14]
CONCLUSIONS
659
[15]
[16]
[17]
[18]