scholarly journals Multilayer Architecture Model for Mobile Cloud Computing Paradigm

Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Higinio Mora ◽  
Francisco J. Mora Gimeno ◽  
María Teresa Signes-Pont ◽  
Bruno Volckaert

Mobile Cloud Computing is one of today's more disruptive paradigms of computation due to its effects on the performance of mobile computing and the development of Internet of Things. It is able to enhance the capabilities of devices by outsourcing the workload to external computing platforms deployed along the network, such as cloud servers, cloudlets, or other edge platforms. The research described in this work presents a computational model of a multilayer architecture for increasing the performance of devices using the Mobile Cloud Computing paradigm. The main novelty of this work lies in defining a comprehensive model where all the available computing platforms along the network layers are involved to perform the outsourcing of the application workload. This proposal provides a generalization of the Mobile Cloud Computing paradigm which allows handling the complexity of scheduling tasks in such complex scenarios. The behaviour of the model and its ability of generalization of the paradigm are exemplified through simulations. The results show higher flexibility for making offloading decisions.

2015 ◽  
pp. 1561-1584
Author(s):  
Hassan Takabi ◽  
Saman Taghavi Zargar ◽  
James B. D. Joshi

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.


Author(s):  
Anita Dashti

Mobile Cloud Computing (MCC) is a rich technology of mobile that offers cloud resources and network technology features like unlimited storage at any time via Ethernet or internet based on Pay-Per-Use method. In MCC all processes will be done in cloud servers and data is stored there too, thus mobile devices are just a tool for presenting events. MCC technology is completely different from previous traditional network technologies, so nowadays most impossible ways are becoming possible. MCC is a combination of cloud computing and mobile network. Being online and internet network brings some problems for users. One of the most popular challenges in this technology is building a secure architecture in mobile internet platform. Different security frameworks in different contexts of security challenges in MCC are recommended and compared in some common parameters to have better understanding of which one is the best for user's needs.


2018 ◽  
pp. 501-520
Author(s):  
Anita Dashti

Mobile Cloud Computing (MCC) is a rich technology of mobile that offers cloud resources and network technology features like unlimited storage at any time via Ethernet or internet based on Pay-Per-Use method. In MCC all processes will be done in cloud servers and data is stored there too, thus mobile devices are just a tool for presenting events. MCC technology is completely different from previous traditional network technologies, so nowadays most impossible ways are becoming possible. MCC is a combination of cloud computing and mobile network. Being online and internet network brings some problems for users. One of the most popular challenges in this technology is building a secure architecture in mobile internet platform. Different security frameworks in different contexts of security challenges in MCC are recommended and compared in some common parameters to have better understanding of which one is the best for user's needs.


Author(s):  
Hassan Takabi ◽  
Saman Taghavi Zargar ◽  
James B. D. Joshi

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.


2014 ◽  
Vol 31 (1) ◽  
pp. 82-91 ◽  
Author(s):  
Al-kindy Athman Abdalla ◽  
Al-Sakib Khan Pathan

2017 ◽  
Vol 7 (2) ◽  
pp. 27-40 ◽  
Author(s):  
Mouhib Ibtihal ◽  
El Ouadghiri Driss ◽  
Naanani Hassan

The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secure architecture composed by two clouds a private cloud dedicated for encryption/decryption and a second public cloud dedicated for storage. We have implemented the first cloud using openstack while respecting the encryption as a service concept. As an encryption scheme, we have used paillier's homomorphic cryptosystem designed specifically for images. The test of the homomorphic property is done by applying the Watermarking algorithm DWT.


Sign in / Sign up

Export Citation Format

Share Document