Authentication and authorization issues in mobile cloud computing: A case study