Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review


Cloud computing, as an emerging computing paradigm for service provision on-demand, has blossomed into both academia and industry. One typical cloud service is cloud data storage and processing. By stepping into the era of 5G, Mobile Cloud Computing (MCC) becomes a perfect match to further leverage the limitations of resources and locations for advanced networking services. However, adopting mobile cloud implies placing critical applications and sensitive data in Cloud Service Providers (CSPs) and accessing them with mobile devices. This leads to serious security and usability issues, particularly on cloud data access control. In this chapter, we explore the objectives of data access control in MCC. Based on a literature review, we summarize open research issues in this area. In order to achieve secure and usable cloud data access, we adopt trust and reputation management and investigate three schemes for securing cloud data access based on trust and reputation that can be flexibly applied in different cloud data access scenarios. Furthermore, we evaluate the performance of the schemes through the analysis on security, complexity, scalability and flexibility, as well as scheme implementation. Particularly, important issues and challenges are also discussed in order to propose future research trends.
Original languageEnglish
Title of host publicationAdvances in Mobile Cloud Computing and Big Data under the 5G Era
EditorsConstandinos Mavromoustakis, George Mastorakis, Ciprian Dobre
ISBN (Electronic)978-3-319-45145-9
Publication statusPublished - 2016
MoE publication typeA3 Part of a book or another research book

Publication series

NameStudies in Big Data
ISSN (Print)2197-6503


  • mobile cloud computing
  • access control
  • security
  • privacxy
  • trust
  • reputation
  • 5G


Dive into the research topics of 'Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing'. Together they form a unique fingerprint.

Cite this