VI. CONCLUSIONS
This paper discussed the security challenges in mobile
cloud computing, defines an end-to-end secure mobile cloud
computing reference architecture, and mainly describes the
multi-factor API security. The contributions of this paper are:
1) Defining an end-to-end secure mobile cloud computing
reference architecture..