Results 1 - 10
of
12
Review Mining Personal Data Using Smartphones and Wearable Devices: A Survey
"... www.mdpi.com/journal/sensors ..."
(Show Context)
Refactoring Local to Cloud Data Types for Mobile Apps
"... ABSTRACT Mobile cloud computing can greatly enrich the capabilities of today's pervasive mobile devices. Storing data on the cloud can enable features such as automatic backup, seamless transition between multiple devices, and multiuser support for existing apps. However, the process of conver ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
ABSTRACT Mobile cloud computing can greatly enrich the capabilities of today's pervasive mobile devices. Storing data on the cloud can enable features such as automatic backup, seamless transition between multiple devices, and multiuser support for existing apps. However, the process of converting local into cloud data types requires high expertise, is difficult, and time-consuming. Refactoring techniques can greatly simplify this process. In this paper we present a formative study where we analyzed and successfully converted four real-world touchdevelop apps into cloud-enabled apps. Based on these lessons, we designed and implemented, CLOUDIFYER, a tool that automatically refactors local data types into cloud data types on the touchdevelop platform. Our empirical evaluation on a corpus of 123 mobile apps resulting in 2722 transformations shows (i) that the refactoring is widely applicable, (ii) CLOUDIFYER saves human effort, and (iii) CLOUDIFYER is accurate.
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges
"... As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges re-sulting from the marriage of powerful yet affordable mobile devices and cloud computing. In this paper we survey existing mobile cloud computing applications, as well as s ..."
Abstract
- Add to MetaCart
(Show Context)
As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges re-sulting from the marriage of powerful yet affordable mobile devices and cloud computing. In this paper we survey existing mobile cloud computing applications, as well as speculate future generation mobile cloud computing applications. We provide insights for the enabling technologies and challenges that lie ahead for us to move forward from mobile computing to mobile cloud computing for building the next generation mobile cloud applications. For each of the challenges, we provide a survey of existing solutions, identify research gaps, and suggest future research areas. Key Words: Mobile computing, cloud computing, mobile cloud com-puting, mobile cloud applications.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2015.2400460, IEEE Transactions on Cloud Computing IEEE T
"... Abstract—Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. However, the employed security strategy must also take into account the optimization of the data retrieval time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively approaches the security and performance issues. In the DROPS methodology, we divide a file into fragments, and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker. Moreover, the nodes storing the fragments, are separated with certain distance by means of graph T-coloring to prohibit an attacker of guessing the locations of the fragments. Furthermore, the DROPS methodology does not rely on the traditional cryptographic techniques for the data security; thereby relieving the system of computationally expensive methodologies. We show that the probability to locate and compromise all of the nodes storing the fragments of a single file is extremely low. We also compare the performance of the DROPS methodology with ten other schemes. The higher level of security with slight performance overhead was observed. Index Terms—Centrality, cloud security, fragmentation, replication, performance. F 1
Software Piracy Control Framework in Mobile Cloud Computing Systems
"... The ubiquity of the cloud computing allows the mobile devices to connect and use the traditional cloud computing services [1]. However, unlike the normal computing machines, the mobile devices are resource constrained. The precincts of low processing power, less storage capacity, limited energy, and ..."
Abstract
- Add to MetaCart
(Show Context)
The ubiquity of the cloud computing allows the mobile devices to connect and use the traditional cloud computing services [1]. However, unlike the normal computing machines, the mobile devices are resource constrained. The precincts of low processing power, less storage capacity, limited energy, and the capricious internet connectivity does not allow the compute and storage
Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges
, 2014
"... Seamless application execution is vital for the usability of various delay-sensitive mobile cloud applications. However, the resource-intensive migration process and intrinsic limitations of the wireless medium impede the realization of seamless execution in mobile cloud computing (MCC) environment. ..."
Abstract
- Add to MetaCart
Seamless application execution is vital for the usability of various delay-sensitive mobile cloud applications. However, the resource-intensive migration process and intrinsic limitations of the wireless medium impede the realization of seamless execution in mobile cloud computing (MCC) environment. This work is the first comprehensive survey that studies the state-of-the-art cloud-based mobile application execution frameworks (CMAEFs) in perspective of seamless application execution in MCC and investigates the frameworks suitability for the seamless execution. The seamless execution enabling approaches for the CMAEFs are identified and classified based on the implementation locations. We also investigate the seamless application execution enabling approaches to identify advantages and disadvantages of employing such approaches for attaining the seamless application execution in MCC. The existing frameworks are compared based on the significant parameters derived from the taxonomy of the seamless application execution enabling approaches. The principles for enabling the seamless application execution within the MCC are also highlighted. Finally, open research challenges in realizing the seamless application execution are discussed.
Keywords:
, 2015
"... upsurges the capabilities of the hardware resources by optimal and shared utilization. ud provid tion [78]. omers to p extraordinary expertise pertaining to the cloud specific technologies [5]. The management of the technology and s has moved from user to the service provider’s end [5]. ..."
Abstract
- Add to MetaCart
(Show Context)
upsurges the capabilities of the hardware resources by optimal and shared utilization. ud provid tion [78]. omers to p extraordinary expertise pertaining to the cloud specific technologies [5]. The management of the technology and s has moved from user to the service provider’s end [5].
1 Personalized Healthcare Cloud Services for Disease Risk Assessment and Wellness Management using Social Media
"... We propose a cloud based framework that effectively manages the health related Big-data and benefits from the ubiquity of the Internet and social media. The framework facilitates the mobile and desktop users by offering: (a) disease risk assessment service and (b) consultation service with the healt ..."
Abstract
- Add to MetaCart
(Show Context)
We propose a cloud based framework that effectively manages the health related Big-data and benefits from the ubiquity of the Internet and social media. The framework facilitates the mobile and desktop users by offering: (a) disease risk assessment service and (b) consultation service with the health experts on Twitter. The disease risk assessment is performed through a collaborative filtering based approach whereas the hubs and authorities based approach is employed to identify the health experts from Twitter. The framework is implemented as Software as a Service (SaaS) to provide the disease risk assessment and expert user interaction services. Experimental results exhibit that the proposed framework achieves high accuracy as compared to the state-of-the-art approaches in terms of disease risk assessment and expert user recommendation.
Encrypting Contacts in Mobile Cloud using Polyalphabetic Substitution
"... Abstract — Cloud computing environment provides a great flexibility and availability of computing resources at a lower cost. This emerging technology opens a new era of e-services in different disciplines. In fact, the researchers take into account the mobile cloud computing because the combination ..."
Abstract
- Add to MetaCart
Abstract — Cloud computing environment provides a great flexibility and availability of computing resources at a lower cost. This emerging technology opens a new era of e-services in different disciplines. In fact, the researchers take into account the mobile cloud computing because the combination of mobile computing, mobile web and cloud computing.The mobile cloud computing is basically an integration of cloud computing with mobile. The main issue mobile cloud computing facing today is security and authenticity. We have tried to address this issue by securing contacts of mobile in cloud using polyalphabetic substitution method.
Director: Engineering (SSIET) St. Soldier Group of Institution
"... Abstract—this paper state the issue related to mobile cloud computing for real-time video streaming. Recently the media streaming particularly video streaming becoming very popular among the users of hand held devices. Due to exponential growth in mobile device users, mobile network is facing large ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—this paper state the issue related to mobile cloud computing for real-time video streaming. Recently the media streaming particularly video streaming becoming very popular among the users of hand held devices. Due to exponential growth in mobile device users, mobile network is facing large traffic of video signals. Due to this growth of users, video streaming especially real-time video streaming is now an interesting area of research. To increase the streaming speed and quality of real-time video a lot of work and progress is being done in hardware architecture of mobile devices. We have multi-core processors and enough memory space in modern mobile devices. The concept of GPU is also introduced in mobile devices to overcome the problem of speed in video data processing. But very less work is done to utilize the capability of these devices through parallel architecture development for real-time video streaming process.