scholarly journals A Comparison of Execution Mechanisms: Fog and Edge Cloud Computing

2020 ◽  
Author(s):  
Francis Tina

Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing also became an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies gave a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in smart devices. In recent times Fog computing, Edge computing and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail. This paper also addresses the differences in these technologies and how each of them are effective to organizations and developers.

Author(s):  
T. Francis

Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.


2019 ◽  
pp. 1108-1123
Author(s):  
Karim Zkik ◽  
Ghizlane Orhanou ◽  
Said El Hajji

The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation through internet that many security problems emerged and sparked the interest of the attackers. To face all this security problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a recovery mechanism to secure access for mobile users to the remote multi cloud servers. We also provide an implementation of our framework to demonstrate its robustness and efficiently, and a security analysis.


2020 ◽  
Vol 2 (1) ◽  
pp. 62-72
Author(s):  
Prof. Sathish ◽  
Dr. Smys S.

The recent advancements in the mobile devices and the growing needs of the mobile users led to the clubbing of mobile devices with the cloud computing developing a platform coined as mobile cloud computing. The main scope of conceiving this clubbed mobile and cloud paradigm is to direct the tasks that are resource and computationally intensive to the cloud for its execution. While the execution takes place in the cloud, the resources of the mobile users that are clubbed with the cloud remains wasted until the responses are received from the cloud. These results in the excess battery drain causing frequent recharges. To put an end to this, the paper puts forward an the multi-tier architectures in-built with the various level of cluster process for processing to properly handle the mobile device participating in the cloud , minimizing the number of idle mobile users and enhances the energy efficiency. The proposed method is validated using the network simulator-II to evince the energy balancing achieved through the proposed multi-tier architecture based MCC-(mobile cloud computing).


2017 ◽  
Vol 7 (2) ◽  
pp. 62-76 ◽  
Author(s):  
Karim Zkik ◽  
Ghizlane Orhanou ◽  
Said El Hajji

The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resources and calculation power. So, Mobile Cloud Computing allows users to fully utilize mobile technologies to store, to download, share and retrieve their personal data anywhere and anytime. As many recent researches show, the main problem of fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation through internet that many security problems emerged and sparked the interest of the attackers. To face all this security problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a recovery mechanism to secure access for mobile users to the remote multi cloud servers. We also provide an implementation of our framework to demonstrate its robustness and efficiently, and a security analysis.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4527
Author(s):  
Abid Ali ◽  
Muhammad Munawar Iqbal ◽  
Harun Jamil ◽  
Faiza Qayyum ◽  
Sohail Jabbar ◽  
...  

Restricted abilities of mobile devices in terms of storage, computation, time, energy supply, and transmission causes issues related to energy optimization and time management while processing tasks on mobile phones. This issue pertains to multifarious mobile device-related dimensions, including mobile cloud computing, fog computing, and edge computing. On the contrary, mobile devices’ dearth of storage and processing power originates several issues for optimal energy and time management. These problems intensify the process of task retaining and offloading on mobile devices. This paper presents a novel task scheduling algorithm that addresses energy consumption and time execution by proposing an energy-efficient dynamic decision-based method. The proposed model quickly adapts to the cloud computing tasks and energy and time computation of mobile devices. Furthermore, we present a novel task scheduling server that performs the offloading computation process on the cloud, enhancing the mobile device’s decision-making ability and computational performance during task offloading. The process of task scheduling harnesses the proposed empirical algorithm. The outcomes of this study enable effective task scheduling wherein energy consumption and task scheduling reduces significantly.


2018 ◽  
Vol 7 (3.1) ◽  
pp. 143
Author(s):  
K Tara Phani Surya Kiran ◽  
K V V Satyanarayana ◽  
P Yellamma

In the current era of technological advancement, mobile smart devices are being used extensively. As a result the requirements of these devices are also growing. With the help of Mobile Cloud Computing, these devices are able to communicate directly with the cloud and perform complex tasks which used to be very farfetched in the past. In such a scenario, the movement of mobile devices is the major research area. The challenge of maintaining a study link between these devices and the network is under extensive study. In this paper we propose a Advanced Q-MAC architecture for resource allocation of mobile devices. The proposed method improves the QoS of the system and higher efficiency and reliability. Experimental results show that the proposed method performs data offload better that the existing methods and has better results in terms of efficiency and process time.  


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


2018 ◽  
Vol 17 (2) ◽  
pp. 7335-7349
Author(s):  
Rashid Alakbarov

The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hierarchical structure is analyzed. At the same time, the article explores the issues of satisfaction of demand of mobile equipment for computing and memory resources by using these technologies. The article presents one solution for the allocation of mobile user requests in virtual machines created in cloudlets located near base stations of wireless metropolitan area networks (WMAN) in a balanced way by considering the technical capacity of those. Alongside, the article considers the solution of user problem during designated time and the issue of determining virtual machines satisfying other requirements. For this purpose, different characteristics of the stated problem, virtual machines, as well as communication channels between a user and virtual machines are considered. By using possible values determining the importance of cloudlets, conditions for loading software applications of a user to a virtual machine are explored and an appropriate method is proposed.


2015 ◽  
pp. 1933-1955
Author(s):  
Tolga Soyata ◽  
He Ba ◽  
Wendi Heinzelman ◽  
Minseok Kwon ◽  
Jiye Shi

With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today's mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to establish high-speed connections to vast computational resources located in the cloud. While the execution scheme based on this mobile-cloud collaboration opens the door to many applications that can tolerate response times on the order of seconds and minutes, it proves to be an inadequate platform for running applications demanding real-time response within a fraction of a second. In this chapter, the authors describe the state-of-the-art in mobile-cloud computing as well as the challenges faced by traditional approaches in terms of their latency and energy efficiency. They also introduce the use of cloudlets as an approach for extending the utility of mobile-cloud computing by providing compute and storage resources accessible at the edge of the network, both for end processing of applications as well as for managing the distribution of applications to other distributed compute resources.


Sign in / Sign up

Export Citation Format

Share Document