A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges

As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges resulting from the marriage of powerful yet affordable mobile devices and cloud computing. In this paper we survey existing mobile cloud computing applications, as well as speculate future generation mobile cloud computing applications. We provide insights for the enabling technologies and challenges that lie ahead for us to move forward from mobile computing to mobile cloud computing for building the next generation mobile cloud applications. For each of the challenges, we provide a survey of existing solutions, identify research gaps, and suggest future research areas.

[1]  Juha Röning,et al.  Using code mobility to create ubiquitous and active augmented reality in mobile computing , 1999, MobiCom '99.

[2]  Galen C. Hunt,et al.  The Coign automatic distributed partitioning system , 1999, OSDI '99.

[3]  Geoffrey H. Kuenning,et al.  The remote processing framework for portable computer power saving , 1999, SAC '99.

[4]  Mahesh K. Marina,et al.  Performance of route caching strategies in Dynamic Source Routing , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.

[5]  Daniel A. Menascé,et al.  The performance of public key-enabled kerberos authentication in mobile computing applications , 2001, CCS '01.

[6]  Sukho Lee,et al.  Indexing the current positions of moving objects using the lazy update R-tree , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.

[7]  Thomas F. La Porta Introduction to the IEEE Transactions on Mobile Computing , 2002, IEEE Trans. Mob. Comput..

[8]  Roy H. Campbell,et al.  A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[9]  Christian S. Jensen,et al.  Indexing of moving objects for location-based services , 2002, Proceedings 18th International Conference on Data Engineering.

[10]  Jimeng Sun,et al.  The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries , 2003, VLDB.

[11]  Amit P. Sheth,et al.  Semantic (Web) Technology In Action: Ontology Driven Information Systems for Search, Integration and Analysis , 2003, IEEE Data Eng. Bull..

[12]  Mong-Li Lee,et al.  Supporting Frequent Updates in R-Trees: A Bottom-Up Approach , 2003, VLDB.

[13]  Walid G. Aref,et al.  Spatio-Temporal Access Methods , 2003, IEEE Data Eng. Bull..

[14]  Jianwen Su,et al.  On bulk loading TPR-Tree , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[15]  T. Newhouse,et al.  Resource-controlled remote execution to enhance wireless network applications , 2004, 2004 4th Workshop on Applications and Services in Wireless Networks, 2004. ASWN 2004..

[16]  Beng Chin Ooi,et al.  Query and Update Efficient B+-Tree Based Indexing of Moving Objects , 2004, VLDB.

[17]  Walid G. Aref,et al.  GPAC: generic and progressive processing of mobile queries over mobile data , 2005, MDM '05.

[18]  Philip Wadler,et al.  Links: Web Programming Without Tiers , 2006, FMCO.

[19]  Fan Yang,et al.  Hilda: A High-Level Language for Data-DrivenWeb Applications , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[20]  Ing-Ray Chen,et al.  Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..

[21]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[22]  Adrian Perrig,et al.  Phoolproof Phishing Prevention , 2006, Financial Cryptography.

[23]  David W. McDonald,et al.  Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.

[24]  Mirco Musolesi,et al.  The Rise of People-Centric Sensing , 2008, IEEE Internet Comput..

[25]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[26]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[27]  Wei Pan,et al.  SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.

[28]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[29]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[30]  Fang Hao,et al.  Enhancing dynamic cloud-based services using network virtualization , 2009, CCRV.

[31]  Deborah Estrin,et al.  PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.

[32]  Sivan Toledo,et al.  VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.

[33]  Gustavo Alonso,et al.  Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.

[34]  Xun Luo From Augmented Reality to Augmented Computing: A Look at Cloud-Mobile Convergence , 2009, 2009 International Symposium on Ubiquitous Virtual Reality.

[35]  Ing-Ray Chen,et al.  Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..

[36]  Patrick Stuedi,et al.  WhereStore: location-based data storage for mobile devices interacting with the cloud , 2010, MCS '10.

[37]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[38]  Soo Dong Kim,et al.  A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[39]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[40]  Alexandre M. Bayen,et al.  Using Mobile Phones to Forecast Arterial Traffic through Statistical Learning , 2010 .

[41]  Fabio Panzieri,et al.  Seamless Support of Multimedia Distributed Applications Through a Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[42]  Martin L. Griss,et al.  SensOrchestra: Collaborative Sensing for Symbolic Location Recognition , 2010, MobiCASE.

[43]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[44]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[45]  Mahadev Satyanarayanan,et al.  Mobile computing: the next decade , 2010, MCS '10.

[46]  Woontack Woo,et al.  International Symposium on Ubiquitous Virtual Reality 2009 , 2010, IEEE Pervasive Comput..

[47]  Caterina Urban,et al.  Formal analysis of Facebook Connect Single Sign-On authentication protocol , 2010 .

[48]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[49]  Henri E. Bal,et al.  Cuckoo: A Computation Offloading Framework for Smartphones , 2010, MobiCASE.

[50]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[51]  Charanjit S. Jutla,et al.  Universally Composable Security Analysis of OAuth v2.0 , 2011, IACR Cryptol. ePrint Arch..

[52]  Alexandre M. Bayen,et al.  Scaling the mobile millennium system in the cloud , 2011, SoCC.

[53]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[54]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[55]  Ing-Ray Chen,et al.  Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.

[56]  Fabio Panzieri,et al.  Mobile computing in digital ecosystems: Design issues and challenges , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[57]  Xiaohui Gu,et al.  CloudScale: elastic resource scaling for multi-tenant cloud systems , 2011, SoCC.

[58]  Sunil Kumar,et al.  Formal Verification of OAuth 2.0 Using Alloy Framework , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[59]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[60]  Daniel Grosu,et al.  Combinatorial Auction-Based Dynamic VM Provisioning and Allocation in Clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[61]  Hao Li,et al.  A research of resource provider-oriented pricing mechanism based on game theory in Cloud Bank model , 2011, 2011 International Conference on Cloud and Service Computing.

[62]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[63]  Chong Luo,et al.  Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.

[64]  Ling Guan,et al.  Optimal resource allocation for multimedia cloud based on queuing model , 2011, 2011 IEEE 13th International Workshop on Multimedia Signal Processing.

[65]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[66]  Yang Song,et al.  Optimal Bids for Spot VMs in a Cloud for Deadline Constrained Jobs , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[67]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[68]  Sagar Naik,et al.  Energy-as-a-Service (EaaS): On the Efficacy of Multimedia Cloud Computing to Save Smartphone Energy , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[69]  Xi Fang,et al.  Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.

[70]  Emiliano Miluzzo,et al.  Vision: mClouds - computing on clouds of mobile devices , 2012, MCS '12.

[71]  James R. Larus,et al.  Zeta: scheduling interactive services with partial execution , 2012, SoCC '12.

[72]  Tao Li,et al.  A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[73]  Konstantin Beznosov,et al.  The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems , 2012, CCS.

[74]  Karl Aberer,et al.  An adaptive approach for online segmentation of multi-dimensional mobile data , 2012, MobiDE '12.

[75]  Ing-Ray Chen,et al.  Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation , 2012, IEEE Communications Letters.

[76]  Shaojie Tang,et al.  Towards Optimal Bidding Strategy for Amazon EC2 Cloud Spot Instance , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[77]  Ronald L. Rivest,et al.  Hourglass schemes: how to prove that cloud files are encrypted , 2012, CCS.

[78]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[79]  Apostolos Papageorgiou,et al.  Maximizing Cloud Provider Profit from Equilibrium Price Auctions , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[80]  Saikat Guha,et al.  Generalized resource allocation for the cloud , 2012, SoCC '12.

[81]  Gregory R. Ganger,et al.  alsched: algebraic scheduling of mixed workloads in heterogeneous clouds , 2012, SoCC '12.

[82]  Randy H. Katz,et al.  Heterogeneity and dynamicity of clouds at scale: Google trace analysis , 2012, SoCC '12.

[83]  Baochun Li,et al.  Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[84]  Ion Stoica,et al.  True elasticity in multi-tenant data-intensive compute clusters , 2012, SoCC '12.

[85]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[86]  Paramvir Bahl,et al.  Advancing the state of mobile cloud computing , 2012, MCS '12.

[87]  Pan Hui,et al.  ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.

[88]  Katinka Wolter,et al.  Mobile Healthcare Systems with Multi-cloud Offloading , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[89]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[90]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[91]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.

[92]  Jie Wu,et al.  Cloud-Based Multicasting with Feedback in Mobile Social Networks , 2013, IEEE Transactions on Wireless Communications.

[93]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[94]  Sokol Kosta,et al.  To offload or not to offload? The bandwidth and energy costs of mobile cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.

[95]  Rajkumar Buyya,et al.  Introduction to the IEEE Transactions on Cloud Computing , 2013, IEEE Trans. Cloud Comput..

[96]  Lin Zhong,et al.  Vision: cloud and crowd assistance for GPS urban canyons , 2014, MCS '14.

[97]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[98]  Albert Y. Zomaya,et al.  OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for Mobile Social Networks , 2014, IEEE Transactions on Services Computing.

[99]  Yonggang Wen,et al.  Toward Scalable Systems for Big Data Analytics: A Technology Tutorial , 2014, IEEE Access.

[100]  Richard Cimler,et al.  Cloud based solution for mobile healthcare application , 2014, IDEAS.

[101]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[102]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.