Mobile Computing in the Construction Industry: Main Challenges and Solutions

Cloud computing (CC) enables users to access application remotely, providing mobility and ubiquitous data access; this would be an advantage in construction management. In addition, mobile cloud computing (MCC) enables mobile devices to augment constrained resources such as processing, storage, and battery autonomy by using the cloud infrastructure. This paper is aimed at proposing solutions to some of the main challenges of the construction sector by adopting mobile cloud services. A literature review was performed highlighting the potential benefits and risks in the implementation of CC, infrastructure and execution of MCC, and main challenges in the construction industry. The main benefits of adopting cloud-based resources are cost reduction, system mobility, system flexibility, and system maintenance. While the main risks are information security, privileged user access, regulatory compliance, data location, availability, and disaster recovery. In terms of execution, cloud-based mobile applications present mostly benefits since they enable users to execute ubiquitously high-performance operations in mobile devices. The review of the literature provided enough information for this paper to suggest solutions to some of the main challenges in the construction sector, namely: design, materials, finance, management, and knowledge. The solutions are mainly based on providing mobility, ubiquitous data access, and improved cross-functional communication.

[1]  Derrick Rountree,et al.  The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice , 2013 .

[2]  Zayyana Shehu,et al.  Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis , 2010 .

[3]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[4]  Jack Chin Pang Cheng,et al.  Cloud Computing Support for Construction Collaboration , 2012 .

[5]  Iliya Markov,et al.  Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..

[6]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[7]  Leonardo Roveda Faganello,et al.  Managing mobile cloud computing considering objective and subjective perspectives , 2015, Comput. Networks.

[8]  Frank Teuteberg,et al.  A Systematic Review of Sustainable Supply Chain Management , 2010, MKWI.

[9]  Paula Kotzé,et al.  Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.

[10]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.

[11]  Nabil Ahmed Sultan,et al.  International Journal of Information Management , 2010 .

[12]  Maria-Dolores Cano,et al.  A secure energy-efficient m-banking application for mobile devices , 2011, J. Syst. Softw..

[13]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[14]  F. Richard Yu,et al.  On QoE monitoring and E2E service assurance in 4G wireless networks , 2012, IEEE Wireless Communications.

[15]  Tarja Häkkinen,et al.  Barriers and drivers for sustainable building , 2011 .

[16]  Feng Xia,et al.  Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..

[17]  Wenhong Tian,et al.  An Introduction to Cloud Computing , 2015 .

[18]  Renato J. O. Figueiredo,et al.  Application classification through monitoring and learning of resource consumption patterns , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[19]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[20]  Jianhua Ma,et al.  Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[21]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[22]  Rafael Ballagas,et al.  REXplorer: a mobile, pervasive spell-casting game for tourists , 2007, CHI Extended Abstracts.

[23]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[24]  Martin May,et al.  Analyzing the impact of mobility in ad hoc networks , 2006, REALMAN '06.