Since the emergence of mobile devices, researches are working on techniques to overcome their resource constraints and try to augment the devices with additional resources and computing power. One of the first techniques is called Cyber Foraging, where resource intensive tasks are offloaded to surrounding devices. Linked with the emerging field of cloud computing, new possibilities arise. This document provides a survey of existing offloading mechanisms and highlights there pros and cons. Further it is scrutinized on security related aspects with a special focus on cloud computing.