A Survey of Mobile Cloud Computing Advantages, Challenges and Approaches

Mohammad Rasoul Momeni

Abstract


Despite explosive growth of mobile computing and its popularity, full exploiting from it, is difficult due to lack of sufficient processing power, storage, also problems such as mobility, frequent disconnections and so on. With exploiting cloud computing along mobile computing a new technology appears called mobile cloud computing. It can overcome these obstacles by executing mobile applications on the cloud instead of mobile devices. Mobile cloud is a new and applicable technology that covers many fields such as: healthcare, vehicular, gaming, commerce and so on. The ABI Research believes that the number of mobile cloud computing users is expected to grow from 43 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2015. This paper presents a comprehensive survey of mobile cloud computing and explains its advantages, challenges and approaches. Also the future research directions are given.


Keywords


mobile cloud computing, mobile applications, mobile computing, mobility

Full Text:

PDF

References


M. Satyanarayanan, “Fundamental challenges in mobile computing,†in Proceedings of the 5th annual ACM symposium on Principles of distributed computing, pp. 1-7, May 1996.

W. Vogels, A head in the clouds the power of infrastructure as a service, in: Proceedings of the1st Workshop on Cloud Computing and Applications, CCA’08.

Mell P, Grance T (2011) The nist definition of cloud computing (draft). http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf.

Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/ IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, 2009.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, et al., A view of Cloud computing , Commun. ACM. 53 (2010) 50–58.

http://www.mobilecloudcomputingforum.com/

Jacson H. Christensen, “Using RESTful web-services and cloud computing to create next generation mobile applications,†in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA), pp. 627-634, October 2009.

L. Liu, R. Moulic, and D. Shea, “Cloud Service Portal for Mobile Device Management,†in Proceedings of IEEE 7th International Conference on e-Business Engineering (ICEBE), pp. 474, January 2011.

Z. Sanaei, S. Abolfazli, A. Gani, and R. K. Buyya, “Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges,†IEEE Communications Surveys & Tutorials, 2013.

Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang, “A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches†Wiley wireless communications and mobile computing, 2013.

Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing†springer Journal of Supercomput (2013) 63:561–592.

K. Bent. (2012, May) Obama: Government Agencies Have One Year To Deploy Smartphone-Friendly Services. [Online]. Available: http://www.crn.com/news/mobility/240000931/obama-governmentagencies- have-one-year-to-deploy-smartphone-friendly-services.htm? cid=rssFeed.

T. Khalifa, K. Naik, and A. Nayak, “A Survey of Communication Protocols for Automatic Meter Reading Applications,†IEEE Communications Surveys & Tutorials, vol. 13, no. 2, pp. 168–182, 2011.

R. Buyya, C. Vecchiola, and T. Selvi, Mastering Cloud Computing. Morgan Kaufmann, USA, 2013.

S. Abolfazli, Z. Sanaei, Ejaz Ahmed, Abdullah Gani, Rajkumar Buyya, “Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges†IEEE Communications Surveys & Tutorials, 2013.

K. Jackson. (2009) Missouri University Researchers Create Smaller and More Efficient Nuclear Battery. [Online]. Available: http://munews.missouri.edu/news-releases/2009/1007-muresearchers- create-smaller-and-more-efficient-nuclear-battery/

Y. Guo, L. Zhang, J. Kong, J. Sun, T. Feng, and X. Chen, “Jupiter: transparent augmentation of smartphone capabilities through cloud computing,†in Proc. ACM MobiHeld ’11, Cascais, Portugal, 2011, p. 2.

W. Zheng, P. Xu, X. Huang, and N. Wu, “Design a cloud storage platform for pervasive computing environments,†Cluster Computing, vol. 13, no. 2, pp. 141–151, 2010.

G. Lawton, “Cloud Streaming Brings Video to Mobile Devices,†IEEE Computer, vol. 45, no. 2, pp. 14–16, 2012.

B. Seshasayee, R. Nathuji, and K. Schwan, “Energy-aware mobile service overlays: Cooperative dynamic power management in distributed mobile systems,†in Proc. IEEE ICAC’07, Jacksonville, Florida, USA, 2007, p. 6.

Y. J. Hong, K. Kumar, and Y. H. Lu, “Energy efficient content-based image retrieval for mobile systems,†in Proc. IEEE ISCAS ’09, Taipei, Taiwan, 2009, pp. 1673–1676.

Kremer, J. Hicks, and J. Rehg, “A compilation framework for power and energy management on mobile computers,†Languages and Compilers for Parallel Computing, pp. 115–131, 2003.

S. Gurun and C. Krintz, “Addressing the energy crisis in mobile computing with developing power aware software,†vol. 8, no. 64MB, 2003. [Online]. Available: http://www.cs.ucsb.edu/research/ tech reports/reports/2003-15.ps

J. Flinn and M. Satyanarayanan, “Energy-aware adaptation for mobile applications,†in Proc. ACM SOSP’ 99, vol. 33, 1999, pp. 48–63.

E. D. Lara, D. S. Wallach, and W. Zwaenepoel, “Puppeteer: Component-based adaptation for mobile computing,†in Proc. USENIX USITS, 2001, pp. 14–25.

Niroshinie Fernando , Seng W. Loke , Wenny Rahayu, “mobile cloud computing: A survey†Elsevier Future Generation Computer Systems 29 (2013) 84–106.

M. Satyanarayanan, “Mobile computing: the next decade,†ACM SIGMOBILE Mobile Computing and Communications Review, vol. 15, no. 2, pp. 2–10, 2011.

T. Imielinski and H. Korth, Introduction to Mobile Computing, ser. The Springer International Series in Engineering and Computer Science, 1996, vol. 353, pp. 1–43.

http://aws.amazon.com/s3/

E. Vartiainen, and K. V. -V. Mattila, “User experience of mobile photo sharing in the cloud,†in Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia (MUM), December 2010.

http://www.flickr.com/

U. Kremer, J. Hicks, and J. Rehg, “A Compilation Framework for Power and Energy Management on Mobile Computers,†in Proceedings of the 14th International Conference on Languages and Compliers for Parallel Computing, pp. 115 - 131, August, 2001.

W. Zheng, P. Xu, X. Huang, and N. Wu, “Design a cloud storage platform for pervasive computing environments,†Cluster Computing, vol. 13, no. 2, pp. 141–151, 2010.

W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on cloud storage architecture and key technologies,†in Proc. ACM ICIS ’09, Seoul, Republic of Korea, 2009, pp. 1044–1048.

J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. “Virtualized in-cloud security services for mobile devices,†in Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31-35, June 2008.

A. Klein, C. Mannweiler, and H. D. Schotten, “A Framework for Intelligent Radio Network Access Based on Context Models,†in Proceedings of the 22nd WWRF meeting 2009, May 2009.

A. Klein, C. Mannweiler, J. Schneider, and D. Hans, “Access Schemes for Mobile Cloud Computing,†in Proceedings of the 11th International Conference on Mobile Data Management (MDM), pp. 387, June 2010.

J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. “Virtualized in-cloud security services for mobile devices,†in Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31-35, June 2008.

Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani “Towards secure mobile cloud computing: A survey†Elsevier Future Generation Computer Systems 29 (2013) 1278–1299.

A. Tanenbaum and M. Van Steen, “Distributed Systems: Principles and Paradigms,†Pearson Prentice Hall, 2007.

W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and efficient access to outsourced data,†in ACM Cloud Computing Security Workshop (CCSW), pp. 55 - 66, 2009.

W. Itani, A. Kayssi, and A. Chehab, “Energy-efficient incremental integrity for securing storage in mobile cloud computing,†International Conference on Energy Aware Computing (ICEAC), pp. 1, January 2011.

S.C. Hsueh, J.Y. Lin, M.Y. Lin, Secure cloud storage for conventional data archive of smart phones , in: Proc. 15th IEEE Int. Symposium on Consumer Electronics, ISCE ’11, Singapore, June 2011.

R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users,†in Proceedings of the 2010 ACM workshop on Cloud computing security workshop (CCSW), pp. 1 - 6, 2010.

Z. Song, J. Molina, S. Lee, S. Kotani, and R. Masuoka. “TrustCube: An Infrastructure that Builds Trust in Client,†in Proceedings of the 1st International Conference on Future of Trust in Computing, 2009.

M. Jakobsson, E. Shi, P. Golle, and R.Chow, “Implicit Authentication for Mobile Devices,†in Processing of the 4th USENIX Workshop on Hot Topics in Security (HotSec), August 2009.

E. Shi, Y. Niu, M. Jakobsson, and R. Chow. “Implicit Authentication through Learning User Behavior,†in Proceedings of the implicit authentication Security Conference (ISC), October 2010.

M. Fahrmair, W. Sitou, B. Spanfelner, Security and privacy rights management for mobile and ubiquitous computing, in: Workshop on UbiComp Privacy, pp. 97–08.

J. Han, Y. Zhu, Y. Liu, J. Cai, L. Hu, Provide privacy for mobile p2p systems, in: 25th IEEE International Conference on Distributed Computing Systems Workshops, 2005, pp. 829–834.

J. Han, Y. Liu, Rumor riding: anonymizing unstructured peer-to-peer systems, in: Proceedings of the 2006 14th IEEE International Conference on Network Protocols, 2006, ICNP’06, pp. 22–31.

G. Ghinita, P. Kalnis, S. Skiadopoulos, Prive: anonymous location-based queries in distributed mobile systems, in: Proceedings of the 16th International Conference on World Wide Web, WWW’07, ACM, New York, NY, USA, 2007, pp. 371–380.

Y. Dong, J. Peng, D. Wang, H. Zhu, F. Wang, Sun C. Chan, and Michael P. Mesnier, “RFS: a network file system for mobile devices and the cloud,†ACM SIGOPS Operating Systems Review, vol. 45, no. 1, pp. 101-111, January 2011.

Jacson H. Christensen, “Using RESTful web-services and cloud computing to create next generation mobile applications,†in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA), pp. 627-634, October 2009.

M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, The case for VM-based cloudlets in mobile computing, IEEE Pervasive Computing 8 (2009) 14–23.

M. Rahman and F. A. M. Mir, “Fourth Generation (4G) Mobile Networks - Features, Technologies & Issues,†in Proceedings of the 6th IEEE International Conference on 3G and Beyond, pp. 1, June 2007.

U. Varshney and R. Jain, “Issues in emerging 4G wireless networks,†Computer, vol. 34, no. 6, pp. 94 - 96, August 2002.

Saman Zonouz,et , Amir Houmansadr, Robin Berthier, Nikita Borisov ,William Sanders.†Secloud: A cloud-based comprehensive and lightweight security solution for smartphones“; Proc: Elsevier ,2013.

Md. AI-Hasan , Kaushik Deb, Mohammad Obaidur Rahman, “User Authentication Approach for Data Security Between Smartphone and Cloudâ€; Strategic Technalogy (IFOST),2013 8th International Forum on, Publisher: IEEE 2013.

Hong gang Wang, Shaoen Wu, Min Chen, Wei Wang, “Security Protection between Users and the Mobile Media Cloudâ€, IEEE Communications Magazine , March 2014.

Momeni, M. R., 2014. A Lightweight Authentication Scheme for Mobile Cloud Computing. International Journal of Computer Science and Business Informatics, Vol. 14, No. 2, pp. 153-160.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)