TY - JOUR
T1 - Cross-technology cloud offloading model
AU - Al-Ahmad, Ahmad Salah
AU - Shrestha, Anup
AU - Ali, Omar
AU - Kahtan, Hasan
N1 - Publisher Copyright:
© The Author(s) 2025.
PY - 2025/12/2
Y1 - 2025/12/2
N2 - Offloading to cloud computing offers significant benefits in resource sharing and service availability, but it also raises challenges of security, latency, and adaptability in heterogeneous environments. This paper proposes a cross-technology cloud offloading model that enhances mutual authentication by combining SMS-based and image-based verification mechanisms. In addition, the model introduces context-aware task allocation, enabling dynamic balancing of security, latency, and usability according to operational conditions. A systematic review of prior work revealed that: (i) multi-factor cloud-to-client authentication remains a critical issue in current models; (ii) existing approaches often prioritize device efficiency while underemphasizing security; and (iii) current literature surveys inadequately address cloud protection across data, communication, and resource dimensions. Building on these findings, the proposed framework enhances authentication through SMS- and image-based verification, integrates context-aware task allocation, and is formalized through descriptive pseudo-code to make its operational flow concrete. The discussion examines the trade-offs of dual authentication and shows how flexibility and context-awareness help mitigate these challenges. Overall, this study contributes a system-level model that advances the design of secure and efficient cloud offloading, providing a foundation for prototype development and future empirical validation.
AB - Offloading to cloud computing offers significant benefits in resource sharing and service availability, but it also raises challenges of security, latency, and adaptability in heterogeneous environments. This paper proposes a cross-technology cloud offloading model that enhances mutual authentication by combining SMS-based and image-based verification mechanisms. In addition, the model introduces context-aware task allocation, enabling dynamic balancing of security, latency, and usability according to operational conditions. A systematic review of prior work revealed that: (i) multi-factor cloud-to-client authentication remains a critical issue in current models; (ii) existing approaches often prioritize device efficiency while underemphasizing security; and (iii) current literature surveys inadequately address cloud protection across data, communication, and resource dimensions. Building on these findings, the proposed framework enhances authentication through SMS- and image-based verification, integrates context-aware task allocation, and is formalized through descriptive pseudo-code to make its operational flow concrete. The discussion examines the trade-offs of dual authentication and shows how flexibility and context-awareness help mitigate these challenges. Overall, this study contributes a system-level model that advances the design of secure and efficient cloud offloading, providing a foundation for prototype development and future empirical validation.
KW - Mobile computing
KW - Security issues
KW - Cloud offloading
KW - Edge computing
KW - Fog computing
KW - Cloud computing
KW - IoT
UR - https://www.scopus.com/pages/publications/105024915271
U2 - 10.1186/s13677-025-00819-9
DO - 10.1186/s13677-025-00819-9
M3 - Article
SN - 2192-113X
VL - 14
JO - Journal of Cloud Computing
JF - Journal of Cloud Computing
IS - 1
M1 - 74
ER -