The rest of paper is
organized as follows. In Section II we will pay attention to
the advantages and system model of mobile cloud
computing service. Section III shows the security and
privacy issues of mobile cloud computing from three aspects.
Section IV talks about the current approaches for the security
and privacy issues in mobile cloud computing. Section V
concludes the whole article.