A Prospective Study of Mobile Cloud Computing

In today’s fast moving world, mobile devices such as smartphones, tablets, and other PDAs are a central component in achieving effective and convenient communication. In today fast developing world of IT and commerce, the growth of mobile computing (MC) has become a force to be reckoned with. However, it is not without its own set of challenges; these devices are dependent on battery life span, storage, bandwidth, and security and mobility. These challenges have slowed down the growth of the service quality of these devices. The intrinsic challenges of mobile computing are being overcome by imputing and saving data in cloud computing. It is done by using various service providers aside from the mobile device service providers for hosting the mobile applications’ delivery. Mobile cloud computing is a branch of cloud computing and it provides ease of use and mobility to its users. Mobile cloud computing is described as services of cloud computing that are available in mobile environment. This study offers thorough knowledge of the capabilities and challenges faced in mobile cloud computing.

[1]  Mojtaba Alizadeh,et al.  Identifying Benefits and risks associated with utilizing cloud computing , 2014, ArXiv.

[2]  Devinder Singh,et al.  Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment , 2012 .

[3]  Prashant J. Shenoy,et al.  Dynamic Provisioning of Multi-tier Internet Applications , 2005, Second International Conference on Autonomic Computing (ICAC'05).

[4]  Pritesh Jain,et al.  A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.

[5]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[6]  Sanjit Kumar Dash,et al.  Mobile-Cloud: A Framework of Cloud Computing for Mobile Application , 2012 .

[7]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[8]  Muhammad Shiraz,et al.  SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).

[9]  James M. Rehg,et al.  A Compilation Framework for Power and Energy Management on Mobile Computers , 2001, LCPC.

[10]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[11]  Ajith Abraham,et al.  Secure Private Cloud Architecture for Mobile Infrastructure as a Service , 2012, 2012 IEEE Eighth World Congress on Services.

[12]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[13]  Rajkumar Buyya,et al.  The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds , 2012, Future Gener. Comput. Syst..

[14]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[15]  Li-Chun Wang,et al.  A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[16]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[17]  Dennis G. Shea,et al.  Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[18]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[19]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[20]  Ke Xu,et al.  A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[21]  Xiao Ma,et al.  A Survey of Energy Efficient Wireless Transmission and Modeling in Mobile Cloud Computing , 2012, Mobile Networks and Applications.

[22]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[23]  Shahryar Shafique Qureshi,et al.  Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[24]  Mojtaba Alizadeh,et al.  A brief review of mobile cloud computing opportunities , 2013 .

[25]  Zhu Guang-lin On"Cloud Computing" , 2011 .

[26]  Qi Zhang,et al.  A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).

[27]  Chaokun Wang,et al.  Phosphor: A Cloud Based DRM Scheme with Sim Card , 2010, 2010 12th International Asia-Pacific Web Conference.

[28]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[29]  Asim Smailagic,et al.  System design and power optimization for mobile computers , 2002, Proceedings IEEE Computer Society Annual Symposium on VLSI. New Paradigms for VLSI Systems Design. ISVLSI 2002.

[30]  Wei-Tek Tsai,et al.  Service-Oriented Cloud Computing Architecture , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[31]  Stanislav Kurkovsky,et al.  RFID-Based Authentication Middleware for Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[32]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[33]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[34]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .

[35]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[36]  Sheng-Yuan Yang,et al.  An ontology-supported ubiquitous interface agent for cloud computing — Example on Bluetooth wireless technique with Java programming , 2010, 2010 International Conference on Machine Learning and Cybernetics.

[37]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.

[38]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .

[39]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[40]  Jun Zhu,et al.  Framework for building a low-cost, scalable, and secured platform for Web-delivered business services , 2010, IBM J. Res. Dev..

[41]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[42]  T. H. Tse,et al.  A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[43]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[44]  Linda Dailey Paulson Low-Power Chips for High-Powered Handhelds , 2003, Computer.

[45]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[46]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[47]  Cecilia Mascolo,et al.  Satin: A Component Model for Mobile Self Organisation , 2004, CoopIS/DOA/ODBASE.

[48]  Han Qi,et al.  Research on mobile cloud computing: Review, trend and perspectives , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[49]  Luis Miguel Vaquero Gonzalez,et al.  Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..

[50]  Eui-Nam Huh,et al.  Towards the Development of Personal Cloud Computing for Mobile Thin-Clients , 2011, 2011 International Conference on Information Science and Applications.

[51]  Xue Jing,et al.  A Brief Survey on the Security Model of Cloud Computing , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[52]  Geoffrey H. Kuenning,et al.  Saving portable computer battery power through remote process execution , 1998, MOCO.

[53]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[54]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[55]  Jiankun Hu,et al.  A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.

[56]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[57]  Eyal de Lara,et al.  Interactive Resource-Intensive Applications Made Easy , 2007, Middleware.

[58]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[59]  Ralf Kakerow,et al.  Low power design methodologies for mobile communication , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[60]  Mojtaba Alizadeh,et al.  Associated Risks of Cloud Computing for SMEs , 2012 .

[61]  Jukka K. Nurminen,et al.  Energy Efficiency of Mobile Clients in Cloud Computing , 2010, HotCloud.

[62]  Hossam S. Hassanein,et al.  Handoffs in fourth generation heterogeneous networks , 2006, IEEE Communications Magazine.

[63]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[64]  Roberto Di Pietro,et al.  Transparent security for cloud , 2010, SAC '10.

[65]  S. Kotani,et al.  TrustCube: An Infrastructure that Builds Trust in Client , 2009 .

[66]  Mufajjul Ali,et al.  Green Cloud on the Horizon , 2009, CloudCom.