• Title/Summary/Keyword: Mobile cloud computing

Search Result 282, Processing Time 0.023 seconds

A Dynamic Task Distribution approach using Clustering of Data Centers and Virtual Machine Migration in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 데이터센터 클러스터링과 가상기계 이주를 이용한 동적 태스크 분배방법)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.103-111
    • /
    • 2016
  • Offloading tasks from mobile devices to available cloud servers were improved since the introduction of the cloudlet. With the implementation of dynamic offloading algorithms, mobile devices can choose the appropriate server for the set of tasks. However, current task distribution approaches do not consider the number of VM, which can be a critical factor in the decision making. This paper proposes a dynamic task distribution on clustered data centers. A proportional VM migration approach is also proposed, where it migrates virtual machines to the cloud servers proportionally according to their allocated CPU, in order to prevent overloading of resources in servers. Moreover, we included the resource capacity of each data center in terms of the maximum CPU in order to improve the migration approach in cloud servers. Simulation results show that the proposed mechanism for task distribution greatly improves the overall performance of the system.

Design of Configuration Management using Homomorphic Encryption in Mobile Cloud Service (모바일 클라우드 서비스 상에서 준동형 암호 기반의 형상 관리 방안)

  • Kim, Sun-Joo;Kim, Jin-Mook;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2217-2223
    • /
    • 2012
  • As smartphone users are over 20 million, companies, which offer cloud computing services, try to support various mobile devices. If so, users can use the same cloud computing service using mobile devices, as sharing document. When user share the work, there are problem in configuration management, data confidentiality and integrity. In this paper, we propose a method that cloud computing users share document efficiently, edit encrypted docuements, and manage configuration based on homomorphic encryption, which integrity is verifiable.

Methods for Stabilizing QoS in Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 QoS 안정화 기법)

  • La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.507-516
    • /
    • 2013
  • Mobile devices have limited computing power and resources. Since mobile devices are equipped with rich network connectivity, an approach to subscribe cloud services can effectively remedy the problem, which is called Mobile Cloud Computing (MCC). Most works on MCC depend on a method to offload functional components at runtime. However, these works only consider the limited verion of offloading to a pre-defined, designated node. Moveover, there is the limitation of managing services subscribed by applications. To provide a comprehensive and practical solution for MCC, in this paper, we propose a self-stabilizing process and its management-related methods. The proposed process is based on an autonomic computing paradigm and works with diverse quality remedy actions such as migration or replicating services. And, we devise a pratical offloading mechanism which is still in an initial stage of the study. The proposed offloading mechanism is based on our proposed MCC meta-model. By adopting the self-stabilization process for MCC, many of the technical issues are effectively resolved, and mobile cloud environments can maintain consistent levels of quality in autonomous manner.

Emerging IT Services Model : Cloud Business Model, Focused on M-Pesa Case (새로운 IT 서비스 모델, 클라우드 비즈니스 모델 : M-Pesa 사례 분석)

  • Hahm, Yukun;Youn, Youngsoo;Kang, Hansoo;Kim, Jinsung
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.287-304
    • /
    • 2012
  • Cloud computing, which means a new way of deploying information technology(IT) in organizations as a service and charging per use, has a deep impact on organizations' IT accessibility, agility and efficiency of its usage. More than that, the emergence of cloud computing surpasses a mere technological innovation, making business model innovation possible. We call this innovation realized by could computing a cloud business model. This study develops a comprehensive framework of business model, first, and then defines and analyzes the cloud business model through this framework. This study also examines the case of M-Pesa mobile payment as a cloud business model in which a new value creation and profit realization schemes have been realized and industry value network has changed. Finally, this study discusses the business implications from this new business model.

Clustering-Based Mobile Gateway Management in Integrated CRAHN-Cloud Network

  • Hou, Ling;Wong, Angus K.Y.;Yeung, Alan K.H.;Choy, Steven S.O.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.2960-2976
    • /
    • 2018
  • The limited storage and computing capacity hinder the development of cognitive radio ad hoc networks (CRAHNs). To solve the problem, a new paradigm of cloud-based CRAHN has been proposed, in which a CRAHN will make use of the computation and storage resources of the cloud. This paper envisions an integrated CRAHN-cloud network architecture. In this architecture, some cognitive radio users (CUs) who satisfy the required metrics could perform as mobile gateway candidates to connect other ordinary CUs with the cloud. These mobile gateway candidates are dynamically clustered according to different related metrics. Cluster head and time-to-live value are determined in each cluster. In this paper, the gateway advertisement and discovery issues are first addressed to propose a hybrid gateway discovery mechanism. After that, a QoS-based gateway selection algorithm is proposed for each CU to select the optimal gateway. Simulations are carried out to evaluate the performance of the overall scheme, which incorporates the proposed clustering and gateway selection algorithms. The results show that the proposed scheme can achieve about 11% higher average throughput, 10% lower end-to-end delay, and 8% lower packet drop fractions compared with the existing scheme.

A Design of Measuring impact of Distance between a mobile device and Cloudlet (모바일 장치와 클라우드 사이 거리의 영향 측정에 대한 연구)

  • Eric, Niyonsaba;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.232-235
    • /
    • 2015
  • In recent years, mobile devices are equipped with functionalities comparable to those computers. However, mobile devices have limited resources due to constraints, such as low processing power, limited memory, unpredictable connectivity, and limited battery life. To enhance the capacity of mobile devices, an interesting idea is to use cloud computing and virtualization techniques to shift the workload from mobile devices to a computational infrastructure. Those techniques consist of migrating resource-intensive computations from a mobile device to the resource-rich cloud, or server (called nearby infrastructure). In order to achieve their goals, researchers designed mobile cloud applications models (examples: CloneCloud, Cloudlet, and Weblet). In this paper, we want to highlight on cloudlet architecture (nearby infrastructure with mobile device), its methodology and discuss about the impact of distance between cloudlet and mobile device in our work design.

  • PDF

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges

  • Alqarni, Manal M.;Cherif, Asma;Alkayal, Entisar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.952-973
    • /
    • 2021
  • In recent years, mobile devices have become an essential part of daily life. More and more applications are being supported by mobile devices thanks to edge computing, which represents an emergent architecture that provides computing, storage, and networking capabilities for mobile devices. In edge computing, heavy tasks are offloaded to edge nodes to alleviate the computations on the mobile side. However, offloading computational tasks may incur extra energy consumption and delays due to network congestion and server queues. Therefore, it is necessary to optimize offloading decisions to minimize time, energy, and payment costs. In this article, different offloading models are examined to identify the offloading parameters that need to be optimized. The paper investigates and compares several optimization techniques used to optimize offloading decisions, specifically Swarm Intelligence (SI) models, since they are best suited to the distributed aspect of edge computing. Furthermore, based on the literature review, this study concludes that a Cuckoo Search Algorithm (CSA) in an edge-based architecture is a good solution for balancing energy consumption, time, and cost.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Improvement of Mobile Web Usability for Mobile Cloud Computing (모바일 클라우드 컴퓨팅에 최적화된 모바일 웹 사용성 개선)

  • Lee, Myung-Sun;Oh, Hyoung-Yong;Min, Byoung-Won;Oh, Yong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.85-95
    • /
    • 2011
  • Recently, sudden interests of mobile cloud computing as well as conventional internet environment are rapidly increased as cloud computing spread out in our web society. Mobile devices including smart phone are rapidly changing in a wholesale way that covers hardwares, applications, and services. However, the Internet access using mobile device is not quite smooth in this local mobile internet environment which suffers from lack of understanding and observance of Web Standards. Although most of domestic web sites are developed focusing on various functions and eye-catching designs, this should became one of the main factors that make the usability and accessability decrease when accessing web with smart phones or table PCs. Therefore, this paper suggested a web interface that considered usability and accessability under mobile cloud environment and we tried to prove it via usability test. It could be found that there was an improvement of usability of interface of the main page that has been optimized to the mobile device environment suggested from the previous research we present, but this paper aimed to prove a usability improvement of total website as a whole by performing the usability test on the entire website. Selecting a special website optimized for mobile cloud computing, we prove an improvement of usability and accessibility. Therefore, we offer a guideline about user interface design applications to developers or companies who want to construct mobile website.

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.