Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues

Worldwide employment of mobile devices in various critical domains, particularly healthcare, disaster recovery, and education has revolutionized data generation rate. However, rapidly rising data volume intensifies data storage and battery limitations of mobile devices. Mobile Cloud Computing (MCC) as the state-of-the-art mobile computing aims to augment mobile storage by leveraging infinite cloud resources to provide unlimited storage capabilities with energy-dissipation prevention. Researchers have already surveyed varied MCC aspects and its challenges, but successful futuristic Mobile Storage Augmentation (MSA) approaches demand deep insight into the current storage augmentation solutions that highlights critical challenges, which are lacking. This paper thoroughly investigates the main MSA issues in three domains of mobile computing, cloud computing, and MCC to present a taxonomy. Also, it examines several credible MSA approaches and mechanisms in MCC, classifies characteristics of cloud-based storage resources, and presents open issues that direct future research.

[1]  Shikharesh Majumdar,et al.  Hosting Web Services on Resource Constrained Devices , 2007, IEEE International Conference on Web Services (ICWS 2007).

[2]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[3]  Amit P. Sheth,et al.  Semantic Modeling for Cloud Computing, Part 2 , 2010, IEEE Internet Computing.

[4]  Myong-Soon Park,et al.  UbiqStor: A Remote Storage Service for Mobile Devices , 2004, PDCAT.

[5]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[6]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[7]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[8]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[9]  Feng Xia,et al.  A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks , 2013, ArXiv.

[10]  Xiaofei Wang,et al.  Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.

[11]  Shan Lu,et al.  Research of Cache Mechanism in Mobile Data Management , 2012, WISA.

[12]  Rajesh Krishna Balan Powerful Change Part 2: Reducing the Power Demands of Mobile Devices , 2004, IEEE Pervasive Comput..

[13]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[14]  Myong-Soon Park,et al.  MiSC: A New Availability Remote Storage System for Mobile Appliance , 2005, ICN.

[15]  Jun-Zhao Sun Mobile ad hoc networking: an essential technology for pervasive computing , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[16]  Muhammad Shiraz,et al.  MOMCC: Market-oriented architecture for Mobile Cloud Computing based on Service Oriented Architecture , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).

[17]  Weisong Shi,et al.  Wukong: A cloud-oriented file service for mobile Internet devices , 2012, J. Parallel Distributed Comput..

[18]  Gordon S. Blair,et al.  Emergent Middleware: Tackling the Interoperability Problem , 2012, IEEE Internet Computing.

[19]  Maria Papadaki,et al.  Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.

[20]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[21]  Mohsen Sharifi,et al.  A Survey and Taxonomy of Cyber Foraging of Mobile Devices , 2012, IEEE Communications Surveys & Tutorials.

[22]  Feng Xia,et al.  An experimental analysis on cloud-based mobile augmentation in mobile cloud computing , 2014, IEEE Transactions on Consumer Electronics.

[23]  Abdullah Gani,et al.  Mobile Cloud Computing: A Review on Smartphone Augmentation Approaches , 2012, ArXiv.

[24]  Ali Feizollah,et al.  A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection , 2013 .

[25]  Patrick Stuedi,et al.  WhereStore: location-based data storage for mobile devices interacting with the cloud , 2010, MCS '10.

[26]  Amit P. Sheth,et al.  Semantics Centric Solutions for Application and Data Portability in Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[27]  Rittwik Jana,et al.  Phoenix: Storage Using an Autonomous Mobile Infrastructure , 2013, IEEE Transactions on Parallel and Distributed Systems.

[28]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.

[29]  Muhammad Shiraz,et al.  A lightweight active service migration framework for computational offloading in mobile cloud computing , 2014, The Journal of Supercomputing.

[30]  Baochun Li,et al.  Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[31]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[32]  Feng Xia,et al.  Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..

[33]  Rachid Guerraoui,et al.  The Database State Machine Approach , 2003, Distributed and Parallel Databases.

[34]  Sunilkumar S. Manvi,et al.  Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..

[35]  Aekyung Moon,et al.  ENERGY-EFFICIENT REPLICATION EXTENDED DATABASE STATE MACHINE IN MOBILE AD-HOC NETWORK , 2004 .

[36]  Abdullah Gani,et al.  Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing , 2012, ArXiv.

[37]  Muhammad Shiraz,et al.  A study on virtual machine deployment for application outsourcing in mobile cloud computing , 2012, The Journal of Supercomputing.

[38]  Chi-Hua Chen,et al.  Designing intelligent disaster prediction models and systems for debris-flow disasters in Taiwan , 2012, Expert Syst. Appl..

[39]  Daniela Nicklas,et al.  Review of Data Management Mechanisms on Mobile DevicesÜberblick über Datenmanagementmechanismen auf mobilen Endgeräten , 2009, it Inf. Technol..

[40]  M. Anusha,et al.  Big Data-Survey , 2016 .

[41]  Burkhard Stiller,et al.  CoopSC: A Cooperative Database Caching Architecture , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[42]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[43]  Amit P. Sheth,et al.  Semantic Modeling for Cloud Computing, Part 1 , 2010, IEEE Internet Computing.

[44]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[45]  Mario Gerla,et al.  Energy-efficient content retrieval in mobile cloud , 2013, MCC '13.

[46]  Enzo Baccarelli,et al.  Energy-saving self-configuring networked data centers , 2013, Comput. Networks.

[47]  Daniel M. Batista,et al.  A Survey of Large Scale Data Management Approaches in Cloud Environments , 2011, IEEE Communications Surveys & Tutorials.

[48]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[49]  Le Gruenwald,et al.  A survey of data replication techniques for mobile ad hoc network databases , 2008, The VLDB Journal.

[50]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[51]  Darin Chan,et al.  Summarisation for Mobile Databases , 2005, J. Res. Pract. Inf. Technol..

[52]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[53]  M. Kitsuregawa,et al.  The History of Storage Systems , 2012, Proceedings of the IEEE.

[54]  Muhammad Shiraz,et al.  SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).

[55]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[56]  Weimin Zheng,et al.  Design a cloud storage platform for pervasive computing environments , 2009, Cluster Computing.

[57]  Maurizio Rebaudengo,et al.  An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[58]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[59]  Rony Ferzli,et al.  Mobile cloud computing educational tool for image/video processing algorithms , 2011, 2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE).