In an IT sector, the recently discovering phenomenal technology is the Mobile Cloud Computing (MCC) as it has a capability of accessing data anytime from to anywhere. With a wide range of advances in cloud computing and developments in mobile computing, this new paradigm MCC has been emerged from the recent years.A plat-form is provided for the mobile users with this MCC to utilize the cloud services on their mobile devices. The re-source constrained challenges and the performance compatibility can be minimized in the mobile computing envi-ronment by using MCC. The MCC users have remain low experience even though there is an increasing advances going by MCC because of the risks associated related to the data security and privacy. In adapting the MCC envi-ronment by an organization such risks are considered as a significant challenge to be prevent. Several researches are conducted on the different methods in reducing such security risks from the past few years and it is significant tofind the best solution. The review on security and privacy methods of MCC is presented in this paper. First the secu-rity issues of MCC are discussed then a review is conducted on three different security concern works of MCC. Then the three works are analyzed in the results and given a comparison table. This paper may useful for the researchers in their investigation to make a more reliable and secure MCC environment

1.
Diaa Salama Abd
Elminaam
,
Farah Turkey
Alanezi
, and
Khalid M.
Hosny
, “
S MCACC: Developing an Efficient Dynamic Secure Framework for Mobile Capabilities Augmentation Using Cloud Computing
”,
IEEE access
, vol:
7
, (sep,
2019
).
2.
Waqas
Ahmad
,
Shengling
Wang
,
Ata
Ullah
,
Sheharyar
and
Zahid
Mahmood
, “
Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing
”,
IEEE Access
,(
2018
)
3.
Sandip
Roy
,
Santanu
Chatterjee
,
Ashok Kumar
Das
,
Samiran
Chattopadhyay
,
Neeraj
Kumar
and
Athana-sios V.
Vasilakos
, “
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
”,
IEEE Access
,(
2017
)
4.
Y. M. Tseng. S. S.
Huang
,
T. T.
Tsai
, and
J. H.
Ke
. “
List-free id-based mutual authentication and key agreement for multiserver architecture
,”
IEEE Trans. Emerging topic in computing
, vol.
4
, no.
1
pp.
102
112
, (
2016
).
5.
K.W.
Choi
,
D. T.
Wiriaatmadja
,
S.
Member
, and
E.
Hossain
, “
Discovering Mobile Applications in Cellular Device-to-Device Communications : Hash Function and Bloom Filter-Based Approach
,”
IEEE Trans. Mob. Comput.
, vol.
1233
, no. c, pp.
336
349
, (
2016
).
6.
P.
Gope
and
T.
Hwang
, “
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-time Application Data Access in Wireless Sensor Networks
,”
IEEE Transactions on Industrial Electronics
, Vol.
63
(
11
), pp.
7124
7132
, (
2016
).
7.
Wang
,
D.
He
,
P.
Wang
, and
C.-H.
Chu
, “
Anonymous two-factor authentication in distributed systems: Cer-tain goals are beyond attainment
,”
IEEE Trans. Dependable Secure Comput.
, vol.
12
, no.
4
, pp.
428
442
, Jul./Aug. (
2015
).
8.
Wang
,
D.
He
,
P.
Wang
, and
C.-H.
Chu
, “
Anonymous two-factor authentication in distributed systems: Cer-tain goals are beyond attainment
,”
IEEE Trans. Dependable Secure Comput.
, vol.
12
, no.
4
, pp.
428
442
, Jul./Aug. (
2015
).
9.
K.
Das
, and
A.
Goswami
, “
A secure biometrics-based multiserver authentication protocol using smart cards
,”
IEEE Trans. Inf. Forensics Secur.
, vol.
10
, no.
9
, pp.
1953
1966
, Sep. (
2015
).
10.
D.
He
,
N.
Kumar
,
J.-H.
Lee
, and
R.
Sherratt
, “
Enhanced three-factor security protocol for USB consumer storage devices
,”
IEEE Trans. Consum. Electron.
, vol.
60
, no.
1
, pp.
30
37
, Feb. (
2014
).
11.
D.
He
and
D.
Wang
, ”
Robust biometrics-based authentication scheme for multiserver environment,
IEEE systems Journal, Article in Press
, (DOI: ), (
2013
).
12.
R.
Sanchez
,
F.
Almenares
,
P.
Arias
,
D.
Diaz-Sanchez
, and
A.
Marin
, “
Enhancing privacy and dynamic federation in IdM for consumer cloud computing
,”
IEEE Transactions on Consumer Electronics
, vol.
58
, no.
1
, pp.
95
103
, Feb. (
2012
).
13.
X.
Huang
,
Y.
Xiang
,
A.
Chonka
,
J.
Zhou
, and
R. H.
Deng
, “
A generic framework for three-factor authen-tication: Preserving security and privacy in distributed systems
,”
IEEE Trans. Parallel Distrib. Syst.
, vol.
22
, no.
8
, pp.
1390
1397
, Aug. (
2011
).
14.
H.
Li
,
I. C.
Lin
and
M. S.
Hwang
, “
A remote password authentication scheme for multi-server architec-ture using neural networks
,”
IEEE Transactions on Neural Network
, vol.
12
, no.
6
, pp.
1498
1504
, (
2001
).
15.
M. S.
Hwang
and
L. H.
Li
, “
A new remote user authentication scheme using smart cards
,”
IEEE Trans Consumer Electr.
, volume:
46
, number:
1
, pp.
28
30
, (
2000
).
This content is only available via PDF.
You do not currently have access to this content.