Blogs Blogs

Back

breach privacy in mobile clouds

MCC threats can be classified as front-end, back-end, and network-based mobile security threats. The front-end of the MCC architecture refers to the client platform, which comprises the mobile terminal on which the applications and interfaces needed to access the cloud facilities operate. The threat landscape in this part may range from physical threats, where mobile devices and other integrated hardware components are primary targets, to application-based risks, where malware, spyware, and other malicious software are leveraged by attackers to disturb user applications or gather critical user information. The back-end platform comprises the cloud servers, data storage systems, virtual machines, hypervisor, and protocols needed to facilitate cloud services. On this platform, security threats chiefly target mobile cloud servers. Network-based mobile security threats are aimed towards the Radio Access Technologies (RATs) that interface mobile devices to the cloud. Cyber-attacks in this group include Wi-Fi sniffing, DoS attacks, and session hijacking.

We have come a long way from receiving P2P (Person to Person) SMS to receiving A2P (Application to Person) messages, i.e. SMS from applications.Studies show that over 3.5 trillion A2P messages will be delivered by 2023, some forecasts predict 1.9 billion 5G subscriptions worldwide by 2024.As more companies realize the importance of digital transformation after last year’s pandemic, high-speed network connectivity will become a priority for everyone in 2021.It is a perfect time for network operators to ramp up their services and customize their customers’ options. They have the power to change the way companies and individuals work and live.

More info: lead engineer

Comments
Add Comment
rebart ters
Mobile Cloud Computing (MCC) threats include front-end risks like physical threats and malware, back-end threats targeting cloud servers, and network-based threats such as Wi-Fi sniffing and DoS attacks. With the shift from P2P to A2P messaging and the rise of 5G, network operators have a unique opportunity to enhance services and improve the way we work and live. Frontline IEP
Posted on 04/03/25 09:12.