Cross-technology cloud offloading model

  • Ahmad Salah Al-Ahmad*
  • , Anup Shrestha
  • , Omar Ali
  • , Hasan Kahtan*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Offloading to cloud computing offers significant benefits in resource sharing and service availability, but it also raises challenges of security, latency, and adaptability in heterogeneous environments. This paper proposes a cross-technology cloud offloading model that enhances mutual authentication by combining SMS-based and image-based verification mechanisms. In addition, the model introduces context-aware task allocation, enabling dynamic balancing of security, latency, and usability according to operational conditions. A systematic review of prior work revealed that: (i) multi-factor cloud-to-client authentication remains a critical issue in current models; (ii) existing approaches often prioritize device efficiency while underemphasizing security; and (iii) current literature surveys inadequately address cloud protection across data, communication, and resource dimensions. Building on these findings, the proposed framework enhances authentication through SMS- and image-based verification, integrates context-aware task allocation, and is formalized through descriptive pseudo-code to make its operational flow concrete. The discussion examines the trade-offs of dual authentication and shows how flexibility and context-awareness help mitigate these challenges. Overall, this study contributes a system-level model that advances the design of secure and efficient cloud offloading, providing a foundation for prototype development and future empirical validation.
Original languageEnglish
Article number74
JournalJournal of Cloud Computing
Volume14
Issue number1
Early online date2 Dec 2025
DOIs
Publication statusPublished - 2 Dec 2025

Keywords

  • Mobile computing
  • Security issues
  • Cloud offloading
  • Edge computing
  • Fog computing
  • Cloud computing
  • IoT

Cite this