A review of computational offloading in Smart Mobile Devices for mobile cloud computing

Author(s):  
Zhaosheng Zhang ◽  
Shuyu Li
2020 ◽  
Vol 39 (6) ◽  
pp. 8285-8297
Author(s):  
V. Meena ◽  
Obulaporam Gireesha ◽  
Kannan Krithivasan ◽  
V.S. Shankar Sriram

Mobile Cloud Computing (MCC)’s rapid technological advancements facilitate various computational-intensive applications on smart mobile devices. However, such applications are constrained by limited processing power, energy consumption, and storage capacity of smart mobile devices. To mitigate these issues, computational offloading is found to be the one of the promising techniques as it offloads the execution of computation-intensive applications to cloud resources. In addition, various kinds of cloud services and resourceful servers are available to offload computationally intensive tasks. However, their processing speeds, access delays, computation capability, residual memory and service charges are different which retards their usage, as it becomes time-consuming and ambiguous for making decisions. To address the aforementioned issues, this paper presents a Fuzzy Simplified Swarm Optimization based cloud Computational Offloading (FSSOCO) algorithm to achieve optimum multisite offloading. Fuzzy logic and simplified swarm optimization are employed for the identification of high powerful nodes and task decomposition respectively. The overall performance of FSSOCO is validated using the Specjvm benchmark suite and compared with the state-of-the-art offloading techniques in terms of the weighted total cost, energy consumption, and processing time.


Author(s):  
CH. Ellaji ◽  
C. Pradeepthi ◽  
P. JayaSri

The development and upgrades that mobile gadgets have encountered, they are as yet considered as restricted registering gadgets. Presently, clients become the more requesting and hope to execute computational serious applications on their mobile gadgets. Accordingly, Mobile Cloud Computing (MCC) coordinates versatile figuring and Cloud Computing (CC) so as to broaden capacities of mobile devices utilizing of?oading procedures. Computational of?oading handles restrictions of Smart Mobile Devices (SMDs, for example, constrained battery lifetime, constrained preparing capabilities, and constrained Storage capacity by of?oading the execution and outstanding burden to other rich frameworks with better execution and assets. Here, the current of?oading systems, Compuatational of?oading strategies, and evaluate them alongside their principle basic issues. In addition, it investigates distinctive significant parameters dependent on which the systems are actualized, for example, of?oading technique and level of dividing. At last, it condenses the issues in of?oading systems in the MCC space that requires further research.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


Sign in / Sign up

Export Citation Format

Share Document