scholarly journals Empowering Client Android Applications on Distributed Cloud Servers in Data Center

2019 ◽  
Vol 8 (2) ◽  
pp. 1703-1705

The advancement of technical knowhow in wireless mobile phone clients and their inceptions from cloud server, have been implemented as versatile applications that utilize an optimal user experience. By using fabrication components in the user domain, we have yet to instill peripheral interfaces such us CPUs, memory and batteries in to achieving a personal computer machine usage in android devices. To empower the user interface as deployed in android applications, we must design a distributed computing environment that can be deployed in cloud servers. This thin client distributed architecture needs to be effective in ensuring a efficient android user experience . To resolve delays and latency from asynchronous mobile data usage, an effective deployment design must be implemented in mobilemobile environment, that uses Tcp/Ip packets in transferring from routable mobile switching server

2020 ◽  
Vol 2020 ◽  
pp. 1-6
Author(s):  
Baoyuan Kang ◽  
Yanbao Han ◽  
Kun Qian ◽  
Jianqi Du

Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1553
Author(s):  
Marian Rusek ◽  
Grzegorz Dwornicki

Introduction of virtualization containers and container orchestrators fundamentally changed the landscape of cloud application development. Containers provide an ideal way for practical implementation of microservice-based architecture, which allows for repeatable, generic patterns that make the development of reliable, distributed applications more approachable and efficient. Orchestrators allow for shifting the accidental complexity from inside of an application into the automated cloud infrastructure. Existing container orchestrators are centralized systems that schedule containers to the cloud servers only at their startup. In this paper, we propose a swarm-like distributed cloud management system that uses live migration of containers to dynamically reassign application components to the different servers. It is based on the idea of “pheromone” robots. An additional mobile agent process is placed inside each application container to control the migration process. The number of parallel container migrations needed to reach an optimal state of the cloud is obtained using models, experiments, and simulations. We show that in the most common scenarios the proposed swarm-like algorithm performs better than existing systems, and due to its architecture it is also more scalable and resilient to container death. It also adapts to the influx of containers and addition of new servers to the cloud automatically.


Author(s):  
Sébastien Canard ◽  
Nicolas Desmoulins ◽  
Sébastien Hallay ◽  
Adel Hamdi ◽  
Dominique Le Hello

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Guangjun Liu ◽  
Wangmei Guo ◽  
Ximeng Liu ◽  
Jinbo Xiong

Enabling remote data integrity checking with failure recovery becomes exceedingly critical in distributed cloud systems. With the properties of a lower repair bandwidth while preserving fault tolerance, regenerating coding and network coding (NC) have received much attention in the coding-based storage field. Recently, an outstanding outsourced auditing scheme named NC-Audit was proposed for regenerating-coding-based distributed storage. The scheme claimed that it can effectively achieve lightweight privacy-preserving data verification remotely for these networked distributed systems. However, our algebraic analysis shows that NC-Audit can be easily broken due to a potential defect existing in its schematic design. That is, an adversarial cloud server can forge some illegal blocks to cheat the auditor with a high probability when the coding field is large. From the perspective of algebraic security, we propose a remote data integrity checking scheme RNC-Audit by resorting to hiding partial critical information to the server without compromising system performance. Our evaluation shows that the proposed scheme has significantly lower overhead compared to the state-of-the-art schemes for distributed remote data auditing.


2015 ◽  
pp. 1561-1584
Author(s):  
Hassan Takabi ◽  
Saman Taghavi Zargar ◽  
James B. D. Joshi

Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can utilize significant optimization and increased operating power offered by cloud computing to enable seamless and transparent use of cloud resources to extend the capability of resource constrained mobile devices. However, in order to realize mobile cloud computing, we need to develop mechanisms to achieve interoperability among heterogeneous and distributed devices. We need solutions to discover best available resources in the cloud servers based on the user demands and approaches to deliver desired resources and services efficiently and in a timely fashion to the mobile terminals. Furthermore, while mobile cloud computing has tremendous potential to enable the mobile terminals to have access to powerful and reliable computing resources anywhere and anytime, we must consider several issues including privacy and security, and reliability in realizing mobile cloud computing. In this chapter, the authors first explore the architectural components required to realize a mobile cloud computing infrastructure. They then discuss mobile cloud computing features with their unique privacy and security implications. They present unique issues of mobile cloud computing that exacerbate privacy and security challenges. They also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy mobile cloud computing environment.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Sign in / Sign up

Export Citation Format

Share Document