Power Optimization of Large Scale Mobile Cloud Computing Systems

Author(s):  
Mahmoud Al-Ayyoub ◽  
Yaser Jararweh ◽  
LoAi Tawalbeh ◽  
Elhadj Benkhelifa ◽  
Anas Basalamah
2013 ◽  
Vol 17 (1/2013) ◽  
pp. 27-39
Author(s):  
Silviu Claudiu POPA ◽  
Mihai-Constantin AVORNICULUI ◽  
Vasile Paul BESFELEAN

Author(s):  
Jyoti Grover ◽  
Gaurav Kheterpal

Mobile Cloud Computing (MCC) has become an important research area due to rapid growth of mobile applications and emergence of cloud computing. MCC refers to integration of cloud computing into a mobile environment. Cloud providers (e.g. Google, Amazon, and Salesforce) support mobile users by providing the required infrastructure (e.g. servers, networks, and storage), platforms, and software. Mobile devices are rapidly becoming a fundamental part of human lives and these enable users to access various mobile applications through remote servers using wireless networks. Traditional mobile device-based computing, data storage, and large-scale information processing is transferred to “cloud,” and therefore, requirement of mobile devices with high computing capability and resources are reduced. This chapter provides a survey of MCC including its definition, architecture, and applications. The authors discuss the issues in MCC, existing solutions, and approaches. They also touch upon the computation offloading mechanism for MCC.


2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.


Sign in / Sign up

Export Citation Format

Share Document