A Computation Migration Approach to Elasticity of Cloud Computing

Author(s):  
Cho-Li Wang ◽  
King Tin Lam ◽  
Ricky Ka Kui Ma

Code mobility is the capability to dynamically change the bindings between code fragments and the location where they are executed. While it is not a new concept, code mobility has reentered the limelight because of its potential uses for cloud computing—a megatrend in recent years. The strongest form of mobility allows the execution state of a computational component to be captured and restored on another node where execution is seamlessly continued. Computation migration can achieve dynamic load balancing, improve data access locality, and serve as the enabling mechanism for auto-provisioning of cloud computing resources. Therefore, it is worthwhile to study the concepts behind computation migration and its performance in a multi-instance cloud platform. This chapter introduces a handful of migration techniques working at diverse granularities for use in cloud computing. In particular, this chapter highlights an innovative idea termed stack-on-demand (SOD), which enables ultra-lightweight computation migrations and delivers a flexible execution model for mobile cloud applications.

Author(s):  
Vandanapu Uday ◽  
Advin Manhar

Cloud Computing refers to various services that are accessible through the Internet. These essential sources encompass servers, databases, storage, analytics, software, and different applications. Mobile cloud computing (MCC) is the availability of cloud computing offerings in a cell environment. Mobile Cloud Computing at its simplest refers to an infrastructure where both the storage and therefore, the processing of information happens outside the mobile device. Users can remotely store their data also enjoy high-quality on-demand cloud applications without the restrictions of getting to get and maintain your local hardware and software. Despite the surprising advancement achieved by MCC, the clients of MCC remains below expectations. Thanks to the related risks regarding security and confidentiality. The more and more information is placed onto the cloud by the individuals and enterprises, the more the safety issue begins to grow. This paper gives a summary of the cloud computing concept followed by an outline of mobile cloud computing, and therefore, the different security issues pertinent to the mobile cloud computing environment.


2014 ◽  
Vol 2014 ◽  
pp. 1-27 ◽  
Author(s):  
Suleman Khan ◽  
Muhammad Shiraz ◽  
Ainuddin Wahid Abdul Wahab ◽  
Abdullah Gani ◽  
Qi Han ◽  
...  

Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.


Author(s):  
A. Amali Mary Bastina ◽  
N. Rama

<div><p>The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.</p></div>


Cloud computing provides various computing resources delivered as a service over a network, particularly the Internet. With the rapid development of mobile networking and computing, as well as other enabling technologies, cloud computing is extended into the mobile domain. Mobile cloud computing concerns the usage of cloud computing in combination with mobile devices and mobile networks, in which trust management plays an important role to establish trust relationships in order to offer trustworthy services. This chapter briefly introduces trust management technologies in cloud computing. The authors analyze the basic requirements of trust management in mobile cloud computing by introducing its architecture and distinct characteristics. They further propose a number of schemes in order to realize autonomic data access control based on trust evaluation in a mobile cloud computing environment. Furthermore, the authors discuss unsolved issues and future research challenges in the field of trust management in mobile cloud computing.


Sign in / Sign up

Export Citation Format

Share Document