scholarly journals A Survey on Communication Issues in Mobile Cloud Computing

2016 ◽  
Vol 15 (1) ◽  
pp. 1-17
Author(s):  
Dasari Naga RAJU ◽  
Vankadara SARITHA

Despite the expanding utilization of mobile devices, exploring their full resources is an issue due to their limited battery power, processing power and data storage. The integration of cloud computing with mobile devices solves these issues by offloading major computation in to the cloud. This paper provides a survey on Mobile Cloud Computing (MCC), which helps to understand the MCC architecture, communication issues and applications. An extensive survey is made of communication issues and different approaches are discussed to overcome the communication issues. Finally open research challenges are also provided which will be helpful for active researchers in the field of MCC.

Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


Author(s):  
Khadija Akherfi ◽  
Hamid Harroud ◽  
Michael Gerndt

With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a middleware that will contribute to providing mobile users data storage and processing services based on their mobile devices capabilities, availability, and usage. A prototype of the middleware is developed and three scenarios are described to demonstrate how the middleware performs in adapting the provision of cloud web services by transforming SOAP messages to REST and XML format to JSON, in optimizing the results by extracting relevant information, and in improving the availability by caching. Initial analysis shows that the mobile cloud middleware improves the quality of service for mobiles, and provides lightweight responses for mobile cloud services.


Author(s):  
Jyoti Grover ◽  
Gaurav Kheterpal

Mobile Cloud Computing (MCC) has become an important research area due to rapid growth of mobile applications and emergence of cloud computing. MCC refers to integration of cloud computing into a mobile environment. Cloud providers (e.g. Google, Amazon, and Salesforce) support mobile users by providing the required infrastructure (e.g. servers, networks, and storage), platforms, and software. Mobile devices are rapidly becoming a fundamental part of human lives and these enable users to access various mobile applications through remote servers using wireless networks. Traditional mobile device-based computing, data storage, and large-scale information processing is transferred to “cloud,” and therefore, requirement of mobile devices with high computing capability and resources are reduced. This chapter provides a survey of MCC including its definition, architecture, and applications. The authors discuss the issues in MCC, existing solutions, and approaches. They also touch upon the computation offloading mechanism for MCC.


2016 ◽  
pp. 79-99
Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


Author(s):  
Seada Abdu Wakene ◽  
Sisay Muleta Hababa ◽  
Gutema Seboka Daba ◽  
K S Ananda Kumar

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.


2020 ◽  
Vol 10 (4) ◽  
pp. 6116-6125
Author(s):  
A. Alamer ◽  
B. Soh

Ensuring security for lightweight cryptosystems in mobile cloud computing is challenging. Encryption speed and battery consumption must be maintained while securing mobile devices, the server, and the communication channel. This study proposes a lightweight security protocol called FEATHER which implements MICKEY 2.0 to generate keystream in the cloud server and to perform mobile device decryption and encryption. FEATHER can be used to implement secure parameters and lightweight mechanisms for communication among mobile devices and between them and a cloud server. FEATHER is faster than the existing CLOAK protocol and consumes less battery power. FEATHER also allows more mobile devices to communicate at the same time during very short time periods, maintain security for more applications with minimum computation ability. FEATHER meets mobile cloud computing requirements of speed, identity, and confidentiality assurances, compatibility with mobile devices, and effective communication between cloud servers and mobile devices using an unsafe communication channel.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


Author(s):  
Claudio Estevez

Cloud computing is consistently proving to be the dominant architecture of the future, and mobile technology is the catalyst. By having the processing power and storage remotely accessible, the main focus of the terminal is now related to connectivity and user-interface. The success of cloud-based applications greatly depends on the throughput experienced by the end user, which is why transport protocols play a key role in mobile cloud computing. This chapter discusses the main issues encountered in cloud networks that affect connection-oriented transport protocols. These issues include, but are not limited to, large delay connections, bandwidth variations, power consumption, and high segment loss rates. To reduce these adverse effects, a set of proposed solutions are presented; furthermore, the advantages and disadvantages are discussed. Finally, suggestions are made for future mobile cloud computing transport-layer designs that address different aspects of the network, such as transparency, congestion-intensity estimation, and quality-of-service integration.


2015 ◽  
pp. 1933-1955
Author(s):  
Tolga Soyata ◽  
He Ba ◽  
Wendi Heinzelman ◽  
Minseok Kwon ◽  
Jiye Shi

With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today's mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to establish high-speed connections to vast computational resources located in the cloud. While the execution scheme based on this mobile-cloud collaboration opens the door to many applications that can tolerate response times on the order of seconds and minutes, it proves to be an inadequate platform for running applications demanding real-time response within a fraction of a second. In this chapter, the authors describe the state-of-the-art in mobile-cloud computing as well as the challenges faced by traditional approaches in terms of their latency and energy efficiency. They also introduce the use of cloudlets as an approach for extending the utility of mobile-cloud computing by providing compute and storage resources accessible at the edge of the network, both for end processing of applications as well as for managing the distribution of applications to other distributed compute resources.


Sign in / Sign up

Export Citation Format

Share Document