Mobile cloud computing: A survey

Despite increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers external to the mobile device. In this paper, we provide an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud computing. We present a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues. We conclude the paper with a critical analysis of challenges that have not yet been fully met, and highlight directions for future work. Highlights? Problems in mobile computing can be solved when combined with cloud computing. ? Three types of mobile clouds are; offloading to a remote server, to a local cloudlet, and sharing work in a mobile p2p network. ? Existing research on mobile cloud computing is presented as a taxonomy of issues. ? We identify issues in operational, end user, and service levels, and in security and context awareness.

[1]  Yoshitaka Shibata,et al.  A Disaster Information Sharing Method by the Mobile Servers in Challenged Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[2]  Walter Brisken,et al.  To Lease or Not to Lease from Storage Clouds , 2010, Computer.

[3]  Filip De Turck,et al.  Grid design for mobile thin client computing , 2011, Future Gener. Comput. Syst..

[4]  Alexander Zangerl,et al.  DDNFS: a Distributed Digital Notary File System , 2011, ArXiv.

[5]  Mona Hosseinkhani Loorak,et al.  AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme , 2010, 2010 International Conference on Computational Intelligence and Security.

[6]  Constantine Stephanidis,et al.  User-Centered Interaction Paradigms for Universal Access in the Information Society , 2004, Lecture Notes in Computer Science.

[7]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[8]  M. Fahrmair,et al.  Security and privacy rights management for mobile and ubiquitous computing , 2005 .

[9]  Henri E. Bal,et al.  Ibis for mobility: solving challenges of mobile computing using grid techniques , 2009, HotMobile '09.

[10]  Laura Vasiliu,et al.  CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .

[11]  Sumit Soni,et al.  A survey of mobile cloud computing architecture, applications, approaches & Current Solution Providers , 2015 .

[12]  Ji Su Park,et al.  Resource Allocation Techniques Based on Availability and Movement Reliability for Mobile Cloud Computing , 2012, ICDCIT.

[13]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[14]  Glen Gibb,et al.  NetFPGA--An Open Platform for Gigabit-Rate Network Switching and Routing , 2007, 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07).

[15]  Simon Hay,et al.  Decomposing power measurements for mobile devices , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[16]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[17]  Cheng Wang,et al.  Parametric analysis for adaptive computation offloading , 2004, PLDI '04.

[18]  Ichiro Satoh Dynamic deployment of pervasive services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[19]  Weibo Li,et al.  The Research and Application of Embedded Mobile Database , 2009, 2009 International Conference on Information Technology and Computer Science.

[20]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[21]  Feng Zhao,et al.  Fine-grained energy profiling for power-aware application design , 2008, PERV.

[22]  Mahadev Satyanarayanan,et al.  Using history to improve mobile application adaptation , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[23]  Giuseppe De Pietro,et al.  MiPeG: A middleware infrastructure for pervasive grids , 2008, Future Gener. Comput. Syst..

[24]  Xin Liu,et al.  An efficient dual caching strategy for web service-enabled PDAs , 2007, SAC '07.

[25]  Xinwen Zhang,et al.  Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing , 2011, Mob. Networks Appl..

[26]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[27]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[28]  Valentin Cristea,et al.  Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.

[29]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[30]  Ralf D. Brown,et al.  The Pangloss-Lite machine translation system , 1996, AMTA.

[31]  Jason Maassen,et al.  Ibis: a flexible and efficient Java-based Grid programming environment: Research Articles , 2005 .

[32]  Anil Madhavapeddy,et al.  A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping , 2005, UbiComp.

[33]  Matthias Frank,et al.  Modelling mobility in disaster area scenarios , 2007, MSWiM '07.

[34]  Seyed Masoud Sadjadi,et al.  Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services , 2006, SelfMan.

[35]  M. Satyanarayanan,et al.  Mobile computing , 1993, Computer.

[36]  Mahadev Satyanarayanan,et al.  Balancing performance, energy, and quality in pervasive computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[37]  Elisabeth André,et al.  User-Centred Development of Mobile Interfaces to a Pervasive Computing Environment , 2008, First International Conference on Advances in Computer-Human Interaction.

[38]  Guobin Shen,et al.  BeepBeep: a high accuracy acoustic ranging system using COTS mobile devices , 2007, SenSys '07.

[39]  B. Boehm Software risk management: principles and practices , 1991, IEEE Software.

[40]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[41]  Romit Roy Choudhury,et al.  Did you see Bob?: human localization using mobile phones , 2010, MobiCom.

[42]  Alec Wolman,et al.  Virtual Compass: Relative Positioning to Sense Mobile Social Interactions , 2010, Pervasive.

[43]  Philip K. McKinley,et al.  Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[44]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[45]  K.S. Banerjee,et al.  PowerSpy: fine-grained software energy profiling for mobile devices , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.

[46]  Fabrizio Capobianco 5 Reasons To Care About Mobile Cloud Computing , 2010 .

[47]  Xun Luo From Augmented Reality to Augmented Computing: A Look at Cloud-Mobile Convergence , 2009, 2009 International Symposium on Ubiquitous Virtual Reality.

[48]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[49]  Steven Cherry Spotting Snipers With Sound , 2008, IEEE Spectrum.

[50]  Dijiang Huang,et al.  MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.

[51]  T. H. Tse,et al.  A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[52]  Mahadev Satyanarayanan,et al.  PowerScope: a tool for profiling the energy usage of mobile applications , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[53]  Steve Mansfield-Devine Cloud Security: Danger in the clouds , 2008 .

[54]  Lee W. McKnight,et al.  Wireless Internet access: 3G vs. WiFi? , 2003 .

[55]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[56]  Alan Jay Smith,et al.  Software strategies for portable computer energy management , 1998, IEEE Wirel. Commun..

[57]  Laurence T. Yang,et al.  MMPI a message passing interface for the mobile environment , 2008, MoMM.

[58]  Cecilia Mascolo,et al.  Satin: A Component Model for Mobile Self Organisation , 2004, CoopIS/DOA/ODBASE.

[59]  Jian-jun Dong,et al.  A Distributed Online Test System Based on Bluetooth Technology , 2010, 2010 Second World Congress on Software Engineering.

[60]  Young Jin Nam,et al.  Cost-Aware Virtual USB Drive: Providing Cost-Effective Block I/O Management Commercial Cloud Storage for Mobile Devices , 2010, 2010 13th IEEE International Conference on Computational Science and Engineering.

[61]  Yunhao Liu,et al.  Provide privacy for mobile P2P systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[62]  Steven Ovadia Navigating the Challenges of the Cloud , 2010 .

[63]  Rajkumar Buyya,et al.  An autonomic cloud environment for hosting ECG data analysis services , 2012, Future Gener. Comput. Syst..

[64]  Yunhao Liu,et al.  Mutual Anonymity for Mobile P2P Systems , 2008, IEEE Transactions on Parallel and Distributed Systems.

[65]  James A. Landay,et al.  User interface issues in mobile computing , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.

[66]  Narseo Vallina-Rodriguez,et al.  ErdOS: achieving energy savings in mobile OS , 2011, MobiArch '11.

[67]  Jie Qiu,et al.  The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[68]  Juan-Carlos Cano,et al.  Evaluation of the energetic impact of Bluetooth low-power modes for ubiquitous computing applications , 2006, PE-WASUN '06.

[69]  Mahadev Satyanarayanan,et al.  Mobile computing: the next decade , 2010, MCS '10.

[70]  Jason Maassen,et al.  Ibis: a flexible and efficient Java‐based Grid programming environment , 2005, Concurr. Pract. Exp..

[71]  Dhananjay Kumar,et al.  Wireless Internet Access- 3 G v/s WiFi , 2014 .

[72]  Jesse Chang,et al.  Exploiting Rich Mobile Environments , 2005 .

[73]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[74]  Syed M. Rahman,et al.  An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.

[75]  Farnam Jahanian,et al.  When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments , 2010, HotMobile '10.

[76]  Iliya Markov,et al.  Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..

[77]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[78]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[79]  Chi-Hua Chen,et al.  Designing intelligent disaster prediction models and systems for debris-flow disasters in Taiwan , 2012, Expert Syst. Appl..

[80]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[81]  Henri E. Bal,et al.  Cuckoo: A Computation Offloading Framework for Smartphones , 2010, MobiCASE.

[82]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[83]  Xuejie Zhang,et al.  Realization of open cloud computing federation based on mobile agent , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[84]  René Mayrhofer,et al.  Friends Radar: Towards a Private P2P Location Sharing Platform , 2011, EUROCAST.

[85]  Ian F. Akyildiz,et al.  Mobility Management in Next Generation Wireless Systems , 1999, ICCCN.

[86]  Joseph G. Tront,et al.  Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[88]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[89]  Markus Endler,et al.  MoCA: A Middleware for Developing Collaborative Applications for Mobile Users , 2004, IEEE Distributed Syst. Online.

[90]  Daiyuan Peng,et al.  On Economic Mobile Cloud Computing Model , 2010, MobiCASE.

[91]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[92]  J.-C. Cano,et al.  Evaluation of the Trade-Off between Power Consumption and Performance in Bluetooth Based Systems , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).

[93]  Tom Pfeifer,et al.  Federation and Sharing in the Context Marketplace , 2007, LoCA.

[94]  Ki-Woong Park,et al.  Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices , 2008, IEEE Transactions on Computers.

[95]  Tobias Bjerregaard,et al.  A survey of research and practices of Network-on-chip , 2006, CSUR.

[96]  John Herbert,et al.  Interface Tailoring for Mobile Computing Devices , 2004, User Interfaces for All.

[97]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[98]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[99]  Mahadev Satyanarayanan,et al.  Agile application-aware adaptation for mobility , 1997, SOSP.

[100]  ParkKyu Ho,et al.  Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices , 2008 .

[101]  Yunhao Liu,et al.  Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.

[102]  Dijiang Huang,et al.  Mobile cloud computing service models: a user-centric approach , 2013, IEEE Network.

[103]  Andrew Lippman,et al.  'Follow me': a web-based, location-sharing architecture for large, indoor environments , 2010, WWW '10.

[104]  Jie Liu,et al.  Pocket cloudlets , 2011, ASPLOS XVI.

[105]  Paul Lukowicz,et al.  From Backpacks to Smartphones: Past, Present, and Future of Wearable Computers , 2009, IEEE Pervasive Computing.

[106]  Steven Cherry Update: WiFi takes on Bluetooth , 2008, IEEE Spectrum.

[107]  John Krumm,et al.  The NearMe Wireless Proximity Server , 2004, UbiComp.

[108]  Ralph Deters,et al.  Transparent caching for nomadic WS clients , 2005, IEEE International Conference on Web Services (ICWS'05).

[109]  Mahadev Satyanarayanan,et al.  Tactics-based remote execution for mobile computing , 2003, MobiSys '03.

[110]  Mads Darø Kristensen,et al.  Scavenger: Transparent development of efficient cyber foraging applications , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[111]  Lakshmish Ramaswamy,et al.  Free riding: a new challenge to peer-to-peer file sharing systems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[112]  Sam Malek,et al.  An energy consumption framework for distributed java-based systems , 2007, ASE.

[113]  David S. Rosenblum,et al.  VOLARE: context-aware adaptive cloud service discovery for mobile systems , 2010, ARM '10.

[114]  S. R. Subramanya,et al.  User interfaces for mobile content , 2006, Computer.

[115]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[116]  Beng Chin Ooi,et al.  PeerDB: a P2P-based system for distributed data sharing , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[117]  Hiroyuki Morikawa,et al.  DOLPHIN: A Practical Approach for Implementing a Fully Distributed Indoor Ultrasonic Positioning System , 2004, UbiComp.

[118]  David J. Scott,et al.  The Carrot Approach: Encouraging Use of Location Systems , 2004, UbiComp.

[119]  Kweku-Muata Osei-Bryson,et al.  Managing risks in information systems outsourcing: An approach to analyzing outsourcing risks and structuring incentive contracts , 2006, Eur. J. Oper. Res..

[120]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[121]  Sam Malek,et al.  Estimating the Energy Consumption in Pervasive Java-Based Systems , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[122]  Wei Dong,et al.  A New Credit Based Micropayment Scheme , 2008, 2008 IEEE International Conference on e-Business Engineering.

[123]  Soo Dong Kim,et al.  A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[124]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .