{"id":"https://openalex.org/W2036294629","doi":"https://doi.org/10.1109/iwcmc.2013.6583636","title":"Challenges and opportunities of Mobile Cloud Computing","display_name":"Challenges and opportunities of Mobile Cloud Computing","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2036294629","doi":"https://doi.org/10.1109/iwcmc.2013.6583636","mag":"2036294629"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2013.6583636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046464010","display_name":"Mojtaba Alizadeh","orcid":"https://orcid.org/0000-0002-5601-8387"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Mojtaba Alizadeh","raw_affiliation_strings":["Malaysian-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","Malaysian-Japan Int. Inst. of Technol., Univ. Teknol. Malaysia, Kuala Lumpur, Japan"],"affiliations":[{"raw_affiliation_string":"Malaysian-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Malaysian-Japan Int. Inst. of Technol., Univ. Teknol. Malaysia, Kuala Lumpur, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103025559","display_name":"Wan Haslina Hassan","orcid":"https://orcid.org/0000-0002-8163-1976"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Wan Haslina Hassan","raw_affiliation_strings":["Malaysian-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","Malaysian-Japan Int. Inst. of Technol., Univ. Teknol. Malaysia, Kuala Lumpur, Japan"],"affiliations":[{"raw_affiliation_string":"Malaysian-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Malaysian-Japan Int. Inst. of Technol., Univ. Teknol. Malaysia, Kuala Lumpur, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046464010"],"corresponding_institution_ids":["https://openalex.org/I4576418"],"apc_list":null,"apc_paid":null,"fwci":7.5561,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.97463417,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"660","last_page":"666"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8478591442108154},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.7891972064971924},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.773725152015686},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.6120182275772095},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5507095456123352},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5457945466041565},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5162829756736755},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5106533169746399},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.49272421002388},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.48836395144462585},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.4496746361255646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.233374685049057},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13186708092689514},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06854429841041565}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8478591442108154},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.7891972064971924},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.773725152015686},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.6120182275772095},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5507095456123352},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5457945466041565},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5162829756736755},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5106533169746399},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.49272421002388},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.48836395144462585},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.4496746361255646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.233374685049057},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13186708092689514},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06854429841041565},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iwcmc.2013.6583636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.892.9798","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.892.9798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Mojtaba_Alizadeh/publication/256410185_Challenges_and_Opportunities_of_Mobile_Cloud_Computing/links/0a85e538d616247109000000.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.895.7383","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.895.7383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Mojtaba_Alizadeh/publication/256410185_Challenges_and_Opportunities_of_Mobile_Cloud_Computing/links/0a85e538d616247109000000.pdf?origin%3Dpublication_detail","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323300","display_name":"Universiti Teknologi Malaysia","ror":"https://ror.org/026w31v75"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":72,"referenced_works":["https://openalex.org/W41609167","https://openalex.org/W152935816","https://openalex.org/W182605591","https://openalex.org/W377336642","https://openalex.org/W1472742953","https://openalex.org/W1585104735","https://openalex.org/W1624464077","https://openalex.org/W1823802670","https://openalex.org/W1835684058","https://openalex.org/W1847647515","https://openalex.org/W1977367431","https://openalex.org/W1984615645","https://openalex.org/W1993949541","https://openalex.org/W2000984098","https://openalex.org/W2002612238","https://openalex.org/W2003180649","https://openalex.org/W2003265014","https://openalex.org/W2007685556","https://openalex.org/W2013967191","https://openalex.org/W2018104075","https://openalex.org/W2019672983","https://openalex.org/W2022667228","https://openalex.org/W2027422314","https://openalex.org/W2040083802","https://openalex.org/W2049592497","https://openalex.org/W2057824177","https://openalex.org/W2059380935","https://openalex.org/W2061335247","https://openalex.org/W2068208345","https://openalex.org/W2071875983","https://openalex.org/W2085588453","https://openalex.org/W2092532187","https://openalex.org/W2098611419","https://openalex.org/W2098865630","https://openalex.org/W2101788345","https://openalex.org/W2104237724","https://openalex.org/W2108012626","https://openalex.org/W2109026747","https://openalex.org/W2111701563","https://openalex.org/W2116339812","https://openalex.org/W2116913597","https://openalex.org/W2126293855","https://openalex.org/W2127493725","https://openalex.org/W2128755850","https://openalex.org/W2131629857","https://openalex.org/W2131646073","https://openalex.org/W2131724017","https://openalex.org/W2131726714","https://openalex.org/W2134894205","https://openalex.org/W2135099885","https://openalex.org/W2136674746","https://openalex.org/W2139171604","https://openalex.org/W2144554277","https://openalex.org/W2154107289","https://openalex.org/W2154158105","https://openalex.org/W2161346040","https://openalex.org/W2165803717","https://openalex.org/W2169326429","https://openalex.org/W2171027248","https://openalex.org/W2275530856","https://openalex.org/W2281318591","https://openalex.org/W3173613586","https://openalex.org/W4245063247","https://openalex.org/W4250486352","https://openalex.org/W4285719527","https://openalex.org/W6601671065","https://openalex.org/W6607432528","https://openalex.org/W6612905006","https://openalex.org/W6628687899","https://openalex.org/W6676221897","https://openalex.org/W6695250874","https://openalex.org/W6797268864"],"related_works":["https://openalex.org/W144582127","https://openalex.org/W2080464316","https://openalex.org/W1935342657","https://openalex.org/W4281784929","https://openalex.org/W2335992547","https://openalex.org/W149139436","https://openalex.org/W2993896842","https://openalex.org/W2242761268","https://openalex.org/W3147080650","https://openalex.org/W2241641845"],"abstract_inverted_index":{"Cloud":[0,29],"Computing":[1,30],"(CC)":[2],"is":[3,32],"fast":[4],"becoming":[5],"well":[6],"known":[7],"in":[8,85,125],"the":[9,13,36,50,86,96,101,109,118],"computing":[10,40],"world":[11],"as":[12,22],"latest":[14],"technology.":[15],"CC":[16],"enables":[17],"users":[18],"to":[19,49],"use":[20],"resources":[21],"and":[23,75,105,112],"when":[24],"they":[25],"are":[26,58,68,81],"required.":[27],"Mobile":[28],"(MCC)":[31],"an":[33],"integration":[34],"of":[35,38,98],"concept":[37],"cloud":[39,88],"within":[41],"a":[42,82],"mobile":[43,51,87],"environment,":[44],"which":[45],"removes":[46],"barriers":[47],"linked":[48],"devices'":[52],"performance.":[53],"Nevertheless,":[54],"these":[55],"new":[56],"benefits":[57],"not":[59],"problem-free":[60],"entirely.":[61],"Several":[62],"common":[63],"problems":[64],"encountered":[65],"by":[66,94],"MCC":[67,99],"privacy,":[69],"personal":[70],"data":[71],"management,":[72],"identity":[73],"authentication,":[74],"potential":[76],"attacks.":[77],"The":[78],"security":[79],"issues":[80],"major":[83],"hindrance":[84],"computing's":[89],"adaptability.":[90],"This":[91],"study":[92],"begins":[93],"presenting":[95],"background":[97],"including":[100,117],"various":[102],"definitions,":[103],"infrastructures,":[104],"applications.":[106],"In":[107],"addition,":[108],"current":[110],"challenges":[111],"opportunities":[113],"will":[114],"be":[115],"presented":[116],"different":[119],"approaches":[120],"that":[121],"have":[122],"been":[123],"adapted":[124],"studying":[126],"MCC.":[127]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
