oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Data Security of Mobile Cloud Computing on Cloud Server
Mohammad Waseem, Abdullah Lakhan, Irfan Ali Jamali
Open Access Library Journal (OALib Journal) , 2016, DOI: 10.4236/oalib.1102377
Abstract: Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage services, although these properties offer flexibility and scalability in controlling data, however, at the same time it reminds us with new security threats. These security issues can be resolved by proper handling of data. The cloud server provider can secure the data by applying the encryption and decryption techniques while storing the data over the cloud. In this paper, we proposed some encryption and decryption methods for securing the data over the cloud so that an unauthorized person or machine cannot access the confidential data owing to encrypted form.
On Optimal and Fair Service Allocation in Mobile Cloud Computing  [PDF]
M. Reza Rahimi,Nalini Venkatasubramanian,Sharad Mehrotra,Athanasios V. Vasilakos
Computer Science , 2013,
Abstract: This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile applications as a location-time workflows (LTW) of tasks; here users mobility patterns are translated to mobile service usage patterns. We show that an optimal mapping of LTWs to tiered cloud resources considering multiple QoS goals such application delay, device power consumption and user cost/price is an NP-hard problem for both single and group-based applications. We propose an efficient heuristic algorithm called MuSIC that is able to perform well (73% of optimal, 30% better than simple strategies), and scale well to a large number of users while ensuring high mobile application QoS. We evaluate MuSIC and the 2-tier mobile cloud approach via implementation (on real world clouds) and extensive simulations using rich mobile applications like intensive signal processing, video streaming and multimedia file sharing applications. Our experimental and simulation results indicate that MuSIC supports scalable operation (100+ concurrent users executing complex workflows) while improving QoS. We observe about 25% lower delays and power (under fixed price constraints) and about 35% decrease in price (considering fixed delay) in comparison to only using the public cloud. Our studies also show that MuSIC performs quite well under different mobility patterns, e.g. random waypoint and Manhattan models.
An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems  [PDF]
Yang Zhang,Dusit Niyato,Ping Wang
Computer Science , 2013,
Abstract: A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.
Joint resource allocation scheme based on evolutionary gamefor mobile edge computing  [PDF]
Zhang Jing, Xia Weiwei, Huang Bonan, Zou Qian, Shen Lianfeng
- , 2018, DOI: 10.3969/j.issn.1003-7985.2018.04.001
Abstract: To satisfy mobile terminals’(MTs)offloading requirements and reduce MTs’ cost, a joint cloud and wireless resource allocation scheme based on the evolutionary game(JRA-EG)is proposed for overlapping heterogeneous networks in mobile edge computing environments. MTs that have tasks offloading requirements in the same service area form a population. MTs in one population acquire different wireless and computation resources by selecting different service providers(SPs). An evolutionary game is formulated to model the SP selection and resource allocation of the MTs. The cost function of the game consists of energy consumption, time delay and monetary cost. The solutions of evolutionary equilibrium(EE)include the centralized algorithm based on replicator dynamics and the distributed algorithm based on Q-learning. Simulation results show that both algorithms can converge to the EE rapidly. The differences between them are the convergence speed and trajectory stability. Compared with the existing schemes, the JRA-EG scheme can save more energy and have a smaller time delay when the data size becomes larger. The proposed scheme can schedule the wireless and computation resources reasonably so that the offloading cost is reduced efficiently.
Study of Data Mining Approach for Mobile Computing Environment
Prof. R. R. Shelke,Dr. V. M. Thakare,Dr. R . V. Dharaskar
International Journal on Computer Science and Engineering , 2012,
Abstract: Efficient Data mining Techniques are required to discover useful Information andknowledge. This is due to the effective involvement of computers and the improvement inDatabase Technology which has provided large Data. The mobile Data Allocation scheme is proposed such that the data are replicated statically for traditional Databases’ for which themoving patterns of Mobile users to mine theresults and improve the Mobile system are used.Data mining services play an important role in the field of mobile communication industry. Data mining is also called knowledge discovery in several databaseincluding mobile databases. In thispaper,study of different data mining algorithms in mobile environment is given . Algorithms for maximum moving path,create,select , update, alter is studied .
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment  [cached]
Swarnpreet SIngh Saini,Ritu Bagga,Devinder Singh,Tarun Jangwal
International Journal of Computer & Electronics Research , 2012,
Abstract: Cloud computing in mobile platforms has invoked a new wave of evolution in the rapidly developing the mobile world. Although several striking research work has been conducted in the high computing counterparts of mobile technology, field of cloud computing for mobile world is vastly unexplored. In this paper, we introduce the concept of Mobile Cloud Computing (MCC), ita s inner workings and the various implementable architectures related to the MCC.[6] The market of mobile recently has been evolving rapidly and cloud computing is spreading into mobile also. That is why mobile cloud computing is becoming a new and fast growing issue today. Cloud computing is the computing that provides virtualized IT resources as a service by using the Internet technology. In cloud computing, a user lends IT resources (software, storage, server, network) as needed, uses them, get a support of real-time scalability according to service load, and pays as he goes. Especially the cloud computing environment distributes IT resources and allocates according to usera s request, so there should be a study on technology that manages these resources and deals with it, effectively [11].and we discussed the architecture of MCC (Mobile cloud computing) with the different services needed by the client and the server in MCC.
A Client/Server Message Oriented Middleware for Mobile Robots  [cached]
Danilo H. F. Menezes,Marco T. Chella,Hendrik T. Macedo
Journal of Software , 2012, DOI: 10.4304/jsw.7.5.1155-1163
Abstract: Mobile robots offer a wide range of applications in educational and research fields. Sensing, planning, control, reasoning, and learning are human-like capabilities that can be artificially replicated in a computer-based robotic system as software applications. The development of software for mobile robot application is a complex task due to the fact that the wide range of robots are composed of heterogeneous hardware components which need different device software drivers and different low-level communication protocols. This paper presents a Client/Server Message Oriented Middle for Mobile Robots which separates the user application from the hardware and low-level implementation. The middleware has been already ported to two different robotic platforms. As a case study, a path planning and self-localization algorithms have been implemented and applied successfully.
Preserving Privacy of Mobile Reader Holders in Server-less RFID Authentication and Searching Protocols  [PDF]
Wei Xie,Chen Zhang,Quan Zhang,Chaojing Tang
Computer Science , 2013,
Abstract: Along with the development of internet of things and pervasive computing, researchers are increasingly focusing on server-less RFID authentication and searching protocols, which utilize mobile RFID readers. However, revealing privacy of mobile reader holders is a widely neglected problem in current research. This paper concentrates on preserving privacy of mobile reader holders in server-less RFID authentication and searching protocols. We propose a detailed requirement as a principle for future protocol designs, and a scheme to enhance most current protocols. We apply our scheme to two classical protocols. The comparisons between the original and our enhanced protocols show that our scheme is secure and effective.
Resource Allocation in Communications and Computing  [PDF]
Yi Su,Fangwen Fu,Shuo Guo
Journal of Electrical and Computer Engineering , 2013, DOI: 10.1155/2013/328395
Abstract: Communication networks and computing systems have demonstrated their importance in the past few decades as a fundamental driver of economic growth. Over the years, they have not only expanded in their sizes, such as geographical area and number of terminals, but also in the variety of services, users, and deployment environments. The purpose of resource allocation in such environments is to intelligently assign the limited available resources among terminals/clients in an efficient way to satisfy end users’ service requirements. With the dramatic developments and fast evolution of communication networks and computing systems, resource allocation continues to be the fundamental challenge, because better quality of service is required with the increasing demand for bandwidth-hungry and/or computation-intensive services. In particular, it has to cope with various new emerging system architectures, such as cognitive networks, mesh networks, multihop networks, peer-to-peer networks, multistandard networks, cloud computing systems, and data centers, distributed intelligence in a multitude of devices operating autonomously enables shifting traditional centralized allocation mechanisms into fully distributed solutions. In recent years, many tools including optimization theory, control theory, game theory, and auction theory have been employed to model and solve a variety of practical resource allocation problems. Therefore, resource allocation in communication networks and computing systems is a pressing research topic that has huge applications. It is imperative to develop advanced resource allocation techniques for ensuring the optimal performance of these systems and networks. The goal of this special issue is to bring together the most updated research contributions in this area. Indeed, we see a wide range of new analytical techniques and novel application scenarios emerging as evidenced in the papers presented here. The nine accepted papers are relevant to resource allocations optimizations in orthogonal frequency division multiplexing (OFDM-) based communication systems, cognitive radio, satellite communications, grid computing, and network virtualization. J. Y. Baudais et al. in “Robustness maximization of parallel multichannel systems,” study bit-loading solutions of both robustness optimization problems over independent parallel channels. Their investigation is based on analytical approach, using generalized Lagrangian relaxation tool, and on greedy-type algorithm approach. The asymptotic convergence of both robustness optimizations is proved for both
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems  [PDF]
Sriram N. Premnath,Zygmunt J. Haas
Computer Science , 2014,
Abstract: Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. We propose a new method of delegating computations of resource-constrained mobile clients, in which multiple servers interact to construct an encrypted program known as garbled circuit. Next, using garbled inputs from a mobile client, another server executes this garbled circuit and returns the resulting garbled outputs. Our system assures privacy of the mobile client's data, even if the executing server chooses to collude with all but one of the other servers. We adapt the garbled circuit design of Beaver et al. and the secure multiparty computation protocol of Goldreich et al. for the purpose of building a secure cloud computing for mobile systems. Our method incorporates the novel use of the cryptographically secure pseudo random number generator of Blum et al. that enables the mobile client to efficiently retrieve the result of the computation, as well as to verify that the evaluator actually performed the computation. We analyze the server-side and client-side complexity of our system. Using real-world data, we evaluate our system for a privacy preserving search application that locates the nearest bank/ATM from the mobile client. We also measure the time taken to construct and evaluate the garbled circuit for varying number of servers, demonstrating the feasibility of our secure and verifiable cloud computing for mobile systems.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.