Skip to search formSkip to main content

Mobile cloud storage

Mobile cloud storage is a form of cloud storage that is accessible on mobile devices such as laptops, tablets, and smartphones. Mobile cloud storage… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper considers the security problem of outsourcing storage from user devices to the cloud. A secure searchable encryption… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Using cloud storage to automatically back up content changes when editing documents is an everyday scenario. We demonstrate that… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Cloud storage usages are becoming increasingly popular on mobile devices. Through an extensive motivation study, we find that… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Abstract Cloud storages can be used to solve limited storage on mobile devices. The stored data can be reached from anywhere if… Expand
Is this relevant?
2016
2016
The challenges of mobile devices such as limited bandwidth, computing, and storage have led manufacturers and service providers… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2016
2016
Cloud storage services are serving a rapidly increasing number of mobile users. However, little is known about the differences… Expand
  • table 1
  • figure 2
  • figure 1
  • figure 4
  • figure 3
Is this relevant?
2015
2015
Mobile cloud storage services have gained phenomenal success in recent few years. In this paper, we identify, analyze and address… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2015
2015
Mobile cloud computing is referred as the combination of cloud comput- ing and mobile networks to bring benefits for both mobile… Expand
  • table 1
Is this relevant?
2014
2014
As with most popular consumer technologies, criminals can exploit vulnerabilities in mobile devices and operating systems or… Expand
  • figure 1
  • table 1
Is this relevant?
2014
2014
In order to meet the security requirement, most data are stored in cloud as cipher-texts. Hence, a cipher-text based access… Expand
  • figure 3
  • table I
Is this relevant?