SlideShare a Scribd company logo
1 of 45
Introduction to Mobile-Cloud
Computing
What is Mobile Cloud Computing?
Mobile cloud computing (MCC) at its simplest,
refers to an infrastructure where both the data
storage and data processing happen outside of
the mobile device.
Mobile cloud applications move the computing
power and data storage away from the mobile
devices and into powerful and centralized
computing platforms located in clouds, which are
then accessed over the wireless connection
based on a thin native client.
Why Mobile Cloud Computing?
• Mobile devices face many resource challenges
(battery life, storage, bandwidth etc.)
• Cloud computing offers advantages to users by
allowing them to use infrastructure, platforms
and software by cloud providers at low cost and
elastically in an on-demand fashion.
• Mobile cloud computing provides mobile users
with data storage and processing services in
clouds, obviating the need to have a powerful
device configuration (e.g. CPU speed, memory
capacity etc), as all resource-intensive computing
can be performed in the cloud.
MCC Popularity
• According to a recent study by ABI Research,
more than 240 million business will use cloud
services through mobile devices by 2015.
• That traction will push the revenue of mobile
cloud computing to $5.2 billion.
• Mobile cloud computing is a highly promising
trend for the future of mobile computing.
MCC Architecture
MCC Architecture
• Mobile devices are connected to the mobile
networks via base stations that establish and control
the connections and functional interfaces between
the networks and mobile devices.
• Mobile users’ requests and information are
transmitted to the central processors that are
connected to servers providing mobile network
services.
• The subscribers’ requests are delivered to a cloud
through the Internet.
• In the cloud, cloud controllers process the requests
to provide mobile users with the corresponding
cloud services.
Advantages of MCC
• Extending battery lifetime:
– Computation offloading migrates large
computations and complex processing from
resource-limited devices (i.e., mobile devices) to
resourceful machines (i.e., servers in clouds).
– Remote application execution can save energy
significantly.
– Many mobile applications take advantages from
task migration and remote processing.
Advantages of MCC
• Improving data storage capacity and
processing power:
– MCC enables mobile users to store/access large
data on the cloud.
– MCC helps reduce the running cost for
computation intensive applications.
– Mobile applications are not constrained by
storage capacity on the devices because their data
now is stored on the cloud.
Advantages of MCC
• Improving reliability and availability:
– Keeping data and application in the clouds reduces
the chance of lost on the mobile devices.
– MCC can be designed as a comprehensive data
security model for both service providers and users:
• Protect copyrighted digital contents in clouds.
• Provide security services such as virus scanning, malicious
code detection, authentication for mobile users.
– With data and services in the clouds, then are
always(almost) available even when the users are
moving.
Advantages of MCC
• Dynamic provisioning:
– Dynamic on-demand provisioning of resources on a
fine-grained, self-service basis
– No need for advanced reservation
• Scalability:
– Mobile applications can be performed and scaled to
meet the unpredictable user demands
– Service providers can easily add and expand a service
Advantages of MCC
• Multi-tenancy:
– Service providers can share the resources and
costs to support a variety of applications and large
no. of users.
• Ease of Integration:
– Multiple services from different providers can be
integrated easily through the cloud and the
Internet to meet the users’ demands.
MCC Applications
• Mobile Commerce:
– M-commerce allows business models for commerce
using mobile devices.
– Examples: Mobile financial, mobile advertising, mobile
shopping…
– M-commerce applications face various challenges (low
bandwidth, high complexity of devices, security, …)
– Integrated with cloud can help address these issues
– Example: Combining 3G and cloud to increase data
processing speed and security level.
MCC Applications
• Mobile Learning:
– M-learning combines e-learning and mobility
– Traditional m-learning has limitations on high cost of
devices/network, low transmission rate, limited
educational resources
– Cloud-based m-learning can solve these limitations
– Enhanced communication quality between students
and teachers
– Help learners access remote learning resources
– A natural environment for collaborative learning
MCC Applications
• Mobile Healthcare:
– M-healthcare is to minimize the limitations of traditional
medical treatment (eg. Small storage, security/privacy,
medical errors, …)
– M-healthcare provides mobile users with convenient
access to resources(eg. medical records)
– M-healthcare offers hospitals and healthcare organizations
a variety of on-demand services on clouds
– Examples:
• Comprehensive health monitoring services
• Intelligent emergency management system
• Health-aware mobile devices (detect pulse-rate, blood pressure,
level of alcohol etc)
• Pervasive access to healthcare information
• Pervasive lifestyle incentive management (to manage healthcare
expenses)
MCC Applications
• Mobile Gaming:
– M-game is a high potential market generating
revenues for service providers.
– Can completely offload game engine requiring large
computing resource (e.g., graphic rendering) to the
server in the cloud.
– Offloading can also save energy and increase game
playing time (eg. MAUI allows fine-grained energy-
aware offloading of mobile codes to a cloud)
– Rendering adaptation technique can dynamically
adjust the game rendering parameters based on
communication constraints and gamers’ demands
MCC Applications
• Assistive technologies:
– Pedestrian crossing guide for blind and visually-
impaired
– Mobile currency reader for blind and visually
impaired
– Lecture transcription for hearing impaired students
• Other applications:
– Sharing photos/videos
– Keyword-based, voice-based, tag-based searching
– Monitoring a house, smart home systems
– …
MCC Issues
• Mobile communication issues:
– Low bandwidth: One of the biggest issues, because
the radio resource for wireless networks is much
more scarce than wired networks
– Service availability: Mobile users may not be able to
connect to the cloud to obtain a service due to traffic
congestion, network failures, mobile signal strength
problems
– Heterogeneity: Handling wireless connectivity with
highly heterogeneous networks to satisfy MCC
requirements (always-on connectivity, on-demand
scalability, energy efficiency) is a difficult problem
MCC Issues
• Computing issues:
Computation offloading:
• One of the main features of MCC
• Offloading is not always effective in saving energy
• It is critical to determine whether to offload and
which portions of the service codes to offload
• Two types:
– Offloading in a static environment
– Offloading in a dynamic environment
Computation Offloading Approaches in
a Static Environment
• Kumar and Lu suggest a program partitioning
based on estimation of energy consumption
before execution
• Optimal program partitioning for offloading is
dynamically calculated based on the trade-off
between the communication and computation
costs at run time.
K. Kumar and Y. Lu, “Cloud Computing for Mobile
Users: Can Offloading Computation Save Energy,”
IEEE Computer, vol. 43, no. 4, April 2010.
Computation Offloading Approaches in
a Static Environment
• Li et al. present an offloading scheme based on
profiling information about computation time and data
sharing at the level of procedure calls.
• A cost graph is constructed and a branch-and-bound
algorithm is applied to minimize the total energy
consumption of computation and the total data
communication cost.
Z. Li, C. Wang, and R. Xu, “Computation offloading to save
energy on handheld devices: a partition scheme,” in Proc
2001 Intl Conf on Compilers, architecture, and synthesis
for embedded systems (CASES), pp. 238-246, Nov 2001.
Computation Offloading Approaches in
a Static Environment
• Chen et al. present an approach to decide which
components of Java programs should be offloaded.
• First divide a Java program into methods and compute
execution costs for these methods.
• Then compare the local execution costs of each method
with the estimated remote execution costs to make an
optimal execution decision.
G. Chen, B. T. Kang, M. Kandermir, N. Vijaykrishnan, M. J.
Irwin, and R. Chandranouli, “Studying energy trade offs in
offloading computation/compilation in Java-enabled mobile
devices,” IEEE Transactions on Parallel and Distributed
Systems, 15(9):795-806, Sept 2004.
Computation Offloading Approaches in
a Static Environment
• Wang and Li propose a polynomial time algorithm to find an
optimal program partition.
• First partition a program into distributed subprograms by
producing a program abstraction.
• Then, task allocations and data transfer of the abstract memory
locations are determined subject to the control and data flow
defined over the abstraction.
• The abstraction is divided into clusters and a heuristic algorithm is
applied to find the optimal partition to minimize the execution cost
of the program.
C. Wang and Z. Li, “A computation offloading scheme on handheld
devices,” Journal of Parallel and Distributed Computing, Special issue
on middleware, 64(6):740-746. June 2004.
Computation Offloading Approaches in
a Static Environment
• Hunt and Scott present an automatic distributed
partitioning system (ADPS) called Coign, which
automatically transforms a program into distributed
applications without accessing the source codes.
• Coign constructs a graph model of the application’s
inter-component communication through scenario-
based profiling to find the best distribution.
G. C. Hunt and M. L. Scott, “The Coign automatic
distributed partitioning system,” in Proc 3rd Symposium
on Operating systems design and implementation (OSDI),
pp. 187-200, Feb 1999.
Computation Offloading Approaches in
a Static Environment
• Xian et al. propose an offloading method which does
not require the estimation of execution time.
• Online statistics of the comp time are used to compute
optimal timeout and if the computation is not finished
within timeout, it is offloaded to the server.
• Saves up to 17% more energy than existing methods.
C. Xian, Y. H. Lu, and Z. Li, “Adaptive computation
offloading for energy conservation on battery-powered
systems,” in Intl Conf on Parallel and Distributed Systems,
vol. 2, pp. 1, December 2009.
Computation Offloading Issues in a
Dynamic Environment
• Offloading in a dynamic network environment (e.g.,
changing connection status and bandwidth) is harder.
• Environment changes can cause additional problems.
• The transmitted data may not reach the destination
• The data executed on the server could be lost when it
has to be returned to the sender.
Computation Offloading Approaches in
a Dynamic Environment
• Ou et al. analyze offloading systems in wireless
environments
• They consider three circumstances of executing an
application to estimate the efficiency of offloading.
– performed locally (without offloading)
– performed in ideal offloading systems (without failures)
– performed with the presence of offloading and failure
recoveries (re-offload after failure)
S. Ou, K. Yang, A. Liotta, and L. Hu. “Performance Analysis
of Offloading Systems in Mobile Wireless Environments,”
in Proc IEEE Intl Conf on Communications (ICC), pp. 1821,
August 2007.
Computation Offloading Approaches in
a Dynamic Environment
• Chun and Maniatis present a system to partition an
application in three steps: application structuring,
partitioning choice, and security.
– Programs are structured to be seamlessly and dynamically
executed between mobile and cloud.
– The application decides what modules to run at the client and at
the server dynamically at a runtime.
– The system will choose a suitable partitioning policy so that the
total energy consumption is minimized.
– Modules containing sensitive data will be executed locally.
B-G. Chun and P. Maniatis, “Dynamically partitioning applications
between weak devices and clouds,” in Proceedings of the 1st ACM
Workshop on Mobile Cloud Computing & Services: Social Networks
and Beyond (MCS), no. 7, June 2010.
Computation Offloading Approaches in
a Dynamic Environment
• MAUI is an architecture to dynamically partition an
application at a runtime in three steps.
• First, use code portability to create two versions of a mobile
application (for mobile device and cloud).
• Second, use programing reflection to identify which
methods are marked ‘remoteable’ or not and type safety to
extract only the program state needed by the ‘remoteable’
methods. Then, send the necessary program state to the
cloud.
E. Cuervo, A. Balasubramanian, Dae-ki Cho, A. Wolman, S.
Saroiu, R. Chandra, and P. Bahl, “MAUI: Making Smartphones
Last Longer with Code offload,” in Proc 8th Intl Conf on Mobile
Systems, Applications, and Services, pp. 49-62, June 2010.
Computation Offloading Approaches in
a Dynamic Environment
• Angin and Bhargava propose a computation offloading framework
based on mobile agents.
• During installation of the mobile application on the device, it is
partitioned by the application partitioner component.
• When the user launches the application, the offloading manager
component of the framework first contacts a cloud registry to
locate virtual machine instances in the cloud to offload application
partitions to.
• Then these application partitions are packaged in mobile agents
and sent over the network to the selected instances to start
running, and the application task is completed with agent
collaboration without further management by the mobile platform.
P. Angin, B. Bhargava. “An Agent-based optimization framework for
mobile-cloud computing,” Journal of Wireless Mobile Networks,
Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2,
2013.
MCC Security Issues
• Protecting user privacy and data/application
secrecy from adversaries is key to establish
and maintain consumers’ trust in the mobile
platform, especially in MCC.
• MCC security issues have two main categories:
– Security for mobile users
– Securing data on clouds
Security for Mobile Users
• Mobile devices are exposed to numerous security
threats like malicious codes and their
vulnerability.
• GPS can cause privacy issues for subscribers.
• Security for mobile applications:
– Installing and running security software are the
simplest ways to detect security threats.
– Mobile devices are resource constrained, protecting
them from the threats is more difficult than that for
resourceful devices.
Mobile User Security Approaches
• Oberheide et al. present an approach to move the threat
detection capabilities to clouds.
• An extension of the CloudAV platform consisting of host
agent and network service components.
• Host agent runs on mobile devices to inspect the file
activity on a system.
• If an identified file is not available in a cache of previous
analyzed files, this file will be sent to the incloud network
service for verification.
• The second major component of CloudAV is a network
service that is responsible for file verification
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F.
Jahanian. “Virtualized in-cloud security services for mobile
devices,” in Proc 1st Workshop on Virtualization in Mobile
Computing (MobiVirt), pp. 31-35, June 2008.
Mobile User Security Approaches
• Portokalidis et al. present a paradigm in which attack
detection for a smartphone is performed on a remote
server in the cloud.
• The smartphone records only a minimal execution
trace, and transmits it to the security server in the
cloud.
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos,
“Paranoid Android: versatile protection for smartphones,”
in Proc 26th Annual Computer Security Application
Conference (ACSAC), pp. 347-356, September 2010.
Privacy Issues in MCC
• Location based services (LBS) faces a privacy
issue on mobile users’ provide private
information such as their current location.
• This problem becomes even worse if an
adversary knows user’s important
information.
Privacy Issues in MCC
• Zhangwei and Mingjun propose the location trusted server
(LTS) approach.
• After receiving mobile users’ requests, LTS gathers their
location information and cloaks the information called
“cloaked region” to conceal user’s information.
• The “cloaked region” is sent to LBS, so LBS knows only
general information about the users but cannot identify
them.
• H. Zhangwei and X. Mingjun, “A Distributed Spatial Cloaking
Protocol for Location Privacy,” in Proc 2nd Intl Conf on
Networks Security Wireless Communications and Trusted
Computing (NSWCTC), vol. 2, pp. 468, June 2010.
Context-aware Mobile Cloud Services
• It is important to fulfill mobile users’ satisfaction
by monitoring their preferences and providing
appropriate services to each of the users.
• Context-aware mobile cloud services try to utilize
the local contexts (e.g., data types, network
status, device environments, and user
preferences) to improve the quality of service
(QoS).
Mobile Service Clouds
• Samimi et al. build the Mobile Service Cloud model.
• When a customer uses a service, the request firstly goes to
a service gateway which will choose an appropriate primary
proxy to meet the requirements and then sends the result
to the user.
• In disconnection, MSCs will establish transient proxies for
mobile devices to monitor the service path, and support
dynamic reconfiguration.
• The model addresses the disconnection issue and can
maintain the QoS at an acceptable level.
F. A. Samimi, P. K. Mckinley, and S. M. Sadjadi, “Mobile Service
Clouds: A Self-Managing Infrastructure for Autonomic Mobile
Computing Services,” in Proceedings of the 2nd International
Workshop on Self-Managed Networks, Systems & Services
(SelfMan), vol. 3996, pp. 130-141, 2006.
Context-aware Mobile Cloud
Services
• La and Kim propose an algorithm to choose a context-aware
adapter.
• The algorithm first determines the gaps occurring in the given
contexts. A gap is defined as a result of context changes.
• Then, the algorithm determines a cause of predefined gaps before
saving the current states of the service invocation for
disconnection.
• For each identified gap, this algorithm will choose an appropriate
adapter for the mobile user.
H. H. La and S. D. Kim, “A Conceptual Framework for Provisioning
Context-aware Mobile Cloud Services,” in Proceedings of the 3rd IEEE
International Conference on Cloud Computing (CLOUD), pp. 466,
August 2010.
Open Issues in MCC
• Network Access Management:
– An efficient network access management not only
improves link performance but also optimizes
bandwidth usage.
– Cognitive radio can be expected as a solution to
achieve the wireless access management.
– Can automatically changes its transmission or
reception parameters, in a way where the wireless
communications can have spectrum agility in terms of
selecting available wireless channels opportunistically.
– Integrated with MCC for better spectrum utilization
Open Issues in MCC
• Quality of Service:
– How to ensure QoS is still a big issue, especially on
network delay.
– CloneCloud and Cloudlets are expected to reduce the
network delay.
– CloneCloud uses nearby computers or data centers to
increase the speed of smart phone applications.
– The idea is to clone the entire set of data and
applications from the smartphone onto the cloud and
to selectively execute some operations on the clones,
reintegrating the results back into the smartphone.
Open Issues in MCC
• Quality of Service:
– A cloudlet is a trusted, resource-rich computer or
cluster of computers which is well-connected to the
Internet and available for use by nearby mobile
devices with on one-hop wireless connection.
– Mobile users may meet the demand for real-time
interactive response by low-latency, one-hop, high-
bandwidth wireless access to the cloudlet.
– Can help mobile users overcome the limits of cloud
computing as WAN latency and low bandwidth.
Open Issues in MCC
• Pricing:
– MCC involves with both mobile service provider
(MSP) and cloud service provider (CSP) with
different services management, customers
management, methods of payment and prices.
– This will lead to many issues.
– The business model including pricing and revenue
sharing has to be carefully developed for MCC.
Open Issues in MCC
• Standard Interface:
– Interoperability becomes an important issue when
mobile users need to interact with the cloud.
– Web interfaces may not be the best option.
– It is not specifically designed for mobile devices.
– May have more overhead.
– Compatibility among devices for web interface could
be an issue.
– Standard protocol, signaling, and interface for
interacting between mobile users and cloud would be
required. (HTML5 & CSS3)
Open Issues in MCC
• Service Convergence:
– Services will be differentiated according to the types, cost,
availability and quality.
– A single cloud may not be enough to meet mobile user’s
demands.
– New scheme is needed in which the mobile users can utilize
multiple cloud in a unified fashion.
– The scheme should be able to automatically discover and
compose services for user.
– Sky computing is a model where resources from multiple clouds
providers are leveraged to create a large scale distributed
infrastructure.
– The mobile sky computing will enable providers to support a
cross-cloud communication and enable users to implement
mobile services and applications.
– Service integration (i.e., convergence) would need to be
explored.
References
• Le Guan, Xu Ke, Meina Song, and Junde Song, “A Survey of
Research on Mobile Cloud Computing”, IEEE/ACIS 10th
International Conference on Computer and Information
Science (ICIS), 2010, pp. 387-392.
• Xiaopeng Fan, Jiannong Cao, and Haixia Mao. “A Survey of
Mobile Cloud Computing,” ZTE Communications, 9(1):4-8,
Mar 2011.
• Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. “A
survey of Mobile Cloud Computing: Architecture,
Applications, and Approaches”, Wireless Communication
and Mobile Computing.
• http://www.csie.ndhu.edu.tw/~showyang/MCloud2012/04
MobileCloudSurvey.pdf
• Chetan S., Gautam Kumar, K. Dinesh, Mathew K. and
Abhimanyu M.A., “Cloud Computing for Mobile World,”
2010. (http://chetan.ueuo.com/projects/CCMW.pdf)

More Related Content

What's hot

Implementation of a decentralized real-time management system for electrical ...
Implementation of a decentralized real-time management system for electrical ...Implementation of a decentralized real-time management system for electrical ...
Implementation of a decentralized real-time management system for electrical ...journalBEEI
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82Muhammad Saad Ali
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEditor Jacotech
 
Bw31297301
Bw31297301Bw31297301
Bw31297301IJMER
 
The integration of smart meters into electrical grids bangladesh chapter
The integration of smart meters into electrical grids bangladesh chapterThe integration of smart meters into electrical grids bangladesh chapter
The integration of smart meters into electrical grids bangladesh chapterAlexander Decker
 
11.the integration of smart meters into electrical grids bangladesh chapter
11.the integration of smart meters into electrical grids bangladesh chapter11.the integration of smart meters into electrical grids bangladesh chapter
11.the integration of smart meters into electrical grids bangladesh chapterAlexander Decker
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksEricsson
 
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
 
Substation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridSubstation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridAlexander Decker
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 

What's hot (19)

Implementation of a decentralized real-time management system for electrical ...
Implementation of a decentralized real-time management system for electrical ...Implementation of a decentralized real-time management system for electrical ...
Implementation of a decentralized real-time management system for electrical ...
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82
 
Emerging models for ad hoc network
Emerging models for ad hoc networkEmerging models for ad hoc network
Emerging models for ad hoc network
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integration
 
Bw31297301
Bw31297301Bw31297301
Bw31297301
 
The integration of smart meters into electrical grids bangladesh chapter
The integration of smart meters into electrical grids bangladesh chapterThe integration of smart meters into electrical grids bangladesh chapter
The integration of smart meters into electrical grids bangladesh chapter
 
11.the integration of smart meters into electrical grids bangladesh chapter
11.the integration of smart meters into electrical grids bangladesh chapter11.the integration of smart meters into electrical grids bangladesh chapter
11.the integration of smart meters into electrical grids bangladesh chapter
 
Smart grid'
Smart grid'Smart grid'
Smart grid'
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networks
 
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE
 
1388829756 64344765
1388829756  643447651388829756  64344765
1388829756 64344765
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
 
K1802036171
K1802036171K1802036171
K1802036171
 
Substation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridSubstation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart grid
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 

Viewers also liked

Herramientas TIC en la Universidad de Guadalajara
Herramientas TIC en la Universidad de GuadalajaraHerramientas TIC en la Universidad de Guadalajara
Herramientas TIC en la Universidad de GuadalajaraRafael Velázquez Patiño
 
How to manage urinary incontinence
How to manage urinary incontinenceHow to manage urinary incontinence
How to manage urinary incontinenceannaiarul hospital
 
Aigüestortes i estany Sant Maurici
Aigüestortes i estany Sant MauriciAigüestortes i estany Sant Maurici
Aigüestortes i estany Sant Mauricimanelpujad
 
Delta de l’Ebre
Delta de l’EbreDelta de l’Ebre
Delta de l’Ebremanelpujad
 
Zona volcànica de la garrotxa
Zona volcànica de la garrotxaZona volcànica de la garrotxa
Zona volcànica de la garrotxamanelpujad
 
El delta del Llobregat
El delta del Llobregat El delta del Llobregat
El delta del Llobregat manelpujad
 
A vocational summer training at Jindal Steel and Power Limited
A vocational summer training at Jindal Steel and Power LimitedA vocational summer training at Jindal Steel and Power Limited
A vocational summer training at Jindal Steel and Power LimitedKishan Gabel
 
Carlton Technologies Technical Center Transformation Strategy January 2017
Carlton Technologies Technical Center Transformation Strategy January 2017Carlton Technologies Technical Center Transformation Strategy January 2017
Carlton Technologies Technical Center Transformation Strategy January 2017Jason Woods, CPA
 
Endoscopic removal of colonic polyps
Endoscopic removal of colonic polypsEndoscopic removal of colonic polyps
Endoscopic removal of colonic polypsannaiarul hospital
 

Viewers also liked (15)

NIRAJ CV (1)
NIRAJ CV (1)NIRAJ CV (1)
NIRAJ CV (1)
 
Herramientas TIC en la Universidad de Guadalajara
Herramientas TIC en la Universidad de GuadalajaraHerramientas TIC en la Universidad de Guadalajara
Herramientas TIC en la Universidad de Guadalajara
 
How to manage urinary incontinence
How to manage urinary incontinenceHow to manage urinary incontinence
How to manage urinary incontinence
 
Poblet
Poblet Poblet
Poblet
 
Cap de Creus
 Cap de Creus Cap de Creus
Cap de Creus
 
Alt Pirineu
Alt PirineuAlt Pirineu
Alt Pirineu
 
Aigüestortes i estany Sant Maurici
Aigüestortes i estany Sant MauriciAigüestortes i estany Sant Maurici
Aigüestortes i estany Sant Maurici
 
Illes Medes
Illes MedesIlles Medes
Illes Medes
 
Delta de l’Ebre
Delta de l’EbreDelta de l’Ebre
Delta de l’Ebre
 
Zona volcànica de la garrotxa
Zona volcànica de la garrotxaZona volcànica de la garrotxa
Zona volcànica de la garrotxa
 
El delta del Llobregat
El delta del Llobregat El delta del Llobregat
El delta del Llobregat
 
A vocational summer training at Jindal Steel and Power Limited
A vocational summer training at Jindal Steel and Power LimitedA vocational summer training at Jindal Steel and Power Limited
A vocational summer training at Jindal Steel and Power Limited
 
Carlton Technologies Technical Center Transformation Strategy January 2017
Carlton Technologies Technical Center Transformation Strategy January 2017Carlton Technologies Technical Center Transformation Strategy January 2017
Carlton Technologies Technical Center Transformation Strategy January 2017
 
TRAINING CERTIFICATES
TRAINING CERTIFICATESTRAINING CERTIFICATES
TRAINING CERTIFICATES
 
Endoscopic removal of colonic polyps
Endoscopic removal of colonic polypsEndoscopic removal of colonic polyps
Endoscopic removal of colonic polyps
 

Similar to Mcc

Mobile computing.pptx
Mobile computing.pptxMobile computing.pptx
Mobile computing.pptxssuser6063b0
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptxYash771676
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting ines beltaief
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing402chandan
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicranjana dalwani
 
08_Mobile-Cloud-Introduction.pdf
08_Mobile-Cloud-Introduction.pdf08_Mobile-Cloud-Introduction.pdf
08_Mobile-Cloud-Introduction.pdfHossainOrnob
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computingvaishnavi_sv
 
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIESMOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIESOgunlana Kunle
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud ComputingKamal Patel
 
Mobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXMobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXFuGenx Technologies
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyIEEEFINALYEARPROJECTS
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingSuzanne Simmons
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudGearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudamelpakkath
 
A survey of mobile cloud computing Architecture, applications, and approache...
A survey of mobile cloud computing  Architecture, applications, and approache...A survey of mobile cloud computing  Architecture, applications, and approache...
A survey of mobile cloud computing Architecture, applications, and approache...Brittany Allen
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 

Similar to Mcc (20)

Mobile computing.pptx
Mobile computing.pptxMobile computing.pptx
Mobile computing.pptx
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
08_Mobile-Cloud-Introduction.pdf
08_Mobile-Cloud-Introduction.pdf08_Mobile-Cloud-Introduction.pdf
08_Mobile-Cloud-Introduction.pdf
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Details About Mobile Cloud Computing
Details About Mobile Cloud ComputingDetails About Mobile Cloud Computing
Details About Mobile Cloud Computing
 
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIESMOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud Computing
 
Mobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenXMobile Cloud Computing by FuGenX
Mobile Cloud Computing by FuGenX
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudGearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloud
 
A survey of mobile cloud computing Architecture, applications, and approache...
A survey of mobile cloud computing  Architecture, applications, and approache...A survey of mobile cloud computing  Architecture, applications, and approache...
A survey of mobile cloud computing Architecture, applications, and approache...
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 

Recently uploaded

pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

Mcc

  • 2. What is Mobile Cloud Computing? Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client.
  • 3. Why Mobile Cloud Computing? • Mobile devices face many resource challenges (battery life, storage, bandwidth etc.) • Cloud computing offers advantages to users by allowing them to use infrastructure, platforms and software by cloud providers at low cost and elastically in an on-demand fashion. • Mobile cloud computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive computing can be performed in the cloud.
  • 4. MCC Popularity • According to a recent study by ABI Research, more than 240 million business will use cloud services through mobile devices by 2015. • That traction will push the revenue of mobile cloud computing to $5.2 billion. • Mobile cloud computing is a highly promising trend for the future of mobile computing.
  • 6. MCC Architecture • Mobile devices are connected to the mobile networks via base stations that establish and control the connections and functional interfaces between the networks and mobile devices. • Mobile users’ requests and information are transmitted to the central processors that are connected to servers providing mobile network services. • The subscribers’ requests are delivered to a cloud through the Internet. • In the cloud, cloud controllers process the requests to provide mobile users with the corresponding cloud services.
  • 7. Advantages of MCC • Extending battery lifetime: – Computation offloading migrates large computations and complex processing from resource-limited devices (i.e., mobile devices) to resourceful machines (i.e., servers in clouds). – Remote application execution can save energy significantly. – Many mobile applications take advantages from task migration and remote processing.
  • 8. Advantages of MCC • Improving data storage capacity and processing power: – MCC enables mobile users to store/access large data on the cloud. – MCC helps reduce the running cost for computation intensive applications. – Mobile applications are not constrained by storage capacity on the devices because their data now is stored on the cloud.
  • 9. Advantages of MCC • Improving reliability and availability: – Keeping data and application in the clouds reduces the chance of lost on the mobile devices. – MCC can be designed as a comprehensive data security model for both service providers and users: • Protect copyrighted digital contents in clouds. • Provide security services such as virus scanning, malicious code detection, authentication for mobile users. – With data and services in the clouds, then are always(almost) available even when the users are moving.
  • 10. Advantages of MCC • Dynamic provisioning: – Dynamic on-demand provisioning of resources on a fine-grained, self-service basis – No need for advanced reservation • Scalability: – Mobile applications can be performed and scaled to meet the unpredictable user demands – Service providers can easily add and expand a service
  • 11. Advantages of MCC • Multi-tenancy: – Service providers can share the resources and costs to support a variety of applications and large no. of users. • Ease of Integration: – Multiple services from different providers can be integrated easily through the cloud and the Internet to meet the users’ demands.
  • 12. MCC Applications • Mobile Commerce: – M-commerce allows business models for commerce using mobile devices. – Examples: Mobile financial, mobile advertising, mobile shopping… – M-commerce applications face various challenges (low bandwidth, high complexity of devices, security, …) – Integrated with cloud can help address these issues – Example: Combining 3G and cloud to increase data processing speed and security level.
  • 13. MCC Applications • Mobile Learning: – M-learning combines e-learning and mobility – Traditional m-learning has limitations on high cost of devices/network, low transmission rate, limited educational resources – Cloud-based m-learning can solve these limitations – Enhanced communication quality between students and teachers – Help learners access remote learning resources – A natural environment for collaborative learning
  • 14. MCC Applications • Mobile Healthcare: – M-healthcare is to minimize the limitations of traditional medical treatment (eg. Small storage, security/privacy, medical errors, …) – M-healthcare provides mobile users with convenient access to resources(eg. medical records) – M-healthcare offers hospitals and healthcare organizations a variety of on-demand services on clouds – Examples: • Comprehensive health monitoring services • Intelligent emergency management system • Health-aware mobile devices (detect pulse-rate, blood pressure, level of alcohol etc) • Pervasive access to healthcare information • Pervasive lifestyle incentive management (to manage healthcare expenses)
  • 15. MCC Applications • Mobile Gaming: – M-game is a high potential market generating revenues for service providers. – Can completely offload game engine requiring large computing resource (e.g., graphic rendering) to the server in the cloud. – Offloading can also save energy and increase game playing time (eg. MAUI allows fine-grained energy- aware offloading of mobile codes to a cloud) – Rendering adaptation technique can dynamically adjust the game rendering parameters based on communication constraints and gamers’ demands
  • 16. MCC Applications • Assistive technologies: – Pedestrian crossing guide for blind and visually- impaired – Mobile currency reader for blind and visually impaired – Lecture transcription for hearing impaired students • Other applications: – Sharing photos/videos – Keyword-based, voice-based, tag-based searching – Monitoring a house, smart home systems – …
  • 17. MCC Issues • Mobile communication issues: – Low bandwidth: One of the biggest issues, because the radio resource for wireless networks is much more scarce than wired networks – Service availability: Mobile users may not be able to connect to the cloud to obtain a service due to traffic congestion, network failures, mobile signal strength problems – Heterogeneity: Handling wireless connectivity with highly heterogeneous networks to satisfy MCC requirements (always-on connectivity, on-demand scalability, energy efficiency) is a difficult problem
  • 18. MCC Issues • Computing issues: Computation offloading: • One of the main features of MCC • Offloading is not always effective in saving energy • It is critical to determine whether to offload and which portions of the service codes to offload • Two types: – Offloading in a static environment – Offloading in a dynamic environment
  • 19. Computation Offloading Approaches in a Static Environment • Kumar and Lu suggest a program partitioning based on estimation of energy consumption before execution • Optimal program partitioning for offloading is dynamically calculated based on the trade-off between the communication and computation costs at run time. K. Kumar and Y. Lu, “Cloud Computing for Mobile Users: Can Offloading Computation Save Energy,” IEEE Computer, vol. 43, no. 4, April 2010.
  • 20. Computation Offloading Approaches in a Static Environment • Li et al. present an offloading scheme based on profiling information about computation time and data sharing at the level of procedure calls. • A cost graph is constructed and a branch-and-bound algorithm is applied to minimize the total energy consumption of computation and the total data communication cost. Z. Li, C. Wang, and R. Xu, “Computation offloading to save energy on handheld devices: a partition scheme,” in Proc 2001 Intl Conf on Compilers, architecture, and synthesis for embedded systems (CASES), pp. 238-246, Nov 2001.
  • 21. Computation Offloading Approaches in a Static Environment • Chen et al. present an approach to decide which components of Java programs should be offloaded. • First divide a Java program into methods and compute execution costs for these methods. • Then compare the local execution costs of each method with the estimated remote execution costs to make an optimal execution decision. G. Chen, B. T. Kang, M. Kandermir, N. Vijaykrishnan, M. J. Irwin, and R. Chandranouli, “Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices,” IEEE Transactions on Parallel and Distributed Systems, 15(9):795-806, Sept 2004.
  • 22. Computation Offloading Approaches in a Static Environment • Wang and Li propose a polynomial time algorithm to find an optimal program partition. • First partition a program into distributed subprograms by producing a program abstraction. • Then, task allocations and data transfer of the abstract memory locations are determined subject to the control and data flow defined over the abstraction. • The abstraction is divided into clusters and a heuristic algorithm is applied to find the optimal partition to minimize the execution cost of the program. C. Wang and Z. Li, “A computation offloading scheme on handheld devices,” Journal of Parallel and Distributed Computing, Special issue on middleware, 64(6):740-746. June 2004.
  • 23. Computation Offloading Approaches in a Static Environment • Hunt and Scott present an automatic distributed partitioning system (ADPS) called Coign, which automatically transforms a program into distributed applications without accessing the source codes. • Coign constructs a graph model of the application’s inter-component communication through scenario- based profiling to find the best distribution. G. C. Hunt and M. L. Scott, “The Coign automatic distributed partitioning system,” in Proc 3rd Symposium on Operating systems design and implementation (OSDI), pp. 187-200, Feb 1999.
  • 24. Computation Offloading Approaches in a Static Environment • Xian et al. propose an offloading method which does not require the estimation of execution time. • Online statistics of the comp time are used to compute optimal timeout and if the computation is not finished within timeout, it is offloaded to the server. • Saves up to 17% more energy than existing methods. C. Xian, Y. H. Lu, and Z. Li, “Adaptive computation offloading for energy conservation on battery-powered systems,” in Intl Conf on Parallel and Distributed Systems, vol. 2, pp. 1, December 2009.
  • 25. Computation Offloading Issues in a Dynamic Environment • Offloading in a dynamic network environment (e.g., changing connection status and bandwidth) is harder. • Environment changes can cause additional problems. • The transmitted data may not reach the destination • The data executed on the server could be lost when it has to be returned to the sender.
  • 26. Computation Offloading Approaches in a Dynamic Environment • Ou et al. analyze offloading systems in wireless environments • They consider three circumstances of executing an application to estimate the efficiency of offloading. – performed locally (without offloading) – performed in ideal offloading systems (without failures) – performed with the presence of offloading and failure recoveries (re-offload after failure) S. Ou, K. Yang, A. Liotta, and L. Hu. “Performance Analysis of Offloading Systems in Mobile Wireless Environments,” in Proc IEEE Intl Conf on Communications (ICC), pp. 1821, August 2007.
  • 27. Computation Offloading Approaches in a Dynamic Environment • Chun and Maniatis present a system to partition an application in three steps: application structuring, partitioning choice, and security. – Programs are structured to be seamlessly and dynamically executed between mobile and cloud. – The application decides what modules to run at the client and at the server dynamically at a runtime. – The system will choose a suitable partitioning policy so that the total energy consumption is minimized. – Modules containing sensitive data will be executed locally. B-G. Chun and P. Maniatis, “Dynamically partitioning applications between weak devices and clouds,” in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS), no. 7, June 2010.
  • 28. Computation Offloading Approaches in a Dynamic Environment • MAUI is an architecture to dynamically partition an application at a runtime in three steps. • First, use code portability to create two versions of a mobile application (for mobile device and cloud). • Second, use programing reflection to identify which methods are marked ‘remoteable’ or not and type safety to extract only the program state needed by the ‘remoteable’ methods. Then, send the necessary program state to the cloud. E. Cuervo, A. Balasubramanian, Dae-ki Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, “MAUI: Making Smartphones Last Longer with Code offload,” in Proc 8th Intl Conf on Mobile Systems, Applications, and Services, pp. 49-62, June 2010.
  • 29. Computation Offloading Approaches in a Dynamic Environment • Angin and Bhargava propose a computation offloading framework based on mobile agents. • During installation of the mobile application on the device, it is partitioned by the application partitioner component. • When the user launches the application, the offloading manager component of the framework first contacts a cloud registry to locate virtual machine instances in the cloud to offload application partitions to. • Then these application partitions are packaged in mobile agents and sent over the network to the selected instances to start running, and the application task is completed with agent collaboration without further management by the mobile platform. P. Angin, B. Bhargava. “An Agent-based optimization framework for mobile-cloud computing,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2, 2013.
  • 30. MCC Security Issues • Protecting user privacy and data/application secrecy from adversaries is key to establish and maintain consumers’ trust in the mobile platform, especially in MCC. • MCC security issues have two main categories: – Security for mobile users – Securing data on clouds
  • 31. Security for Mobile Users • Mobile devices are exposed to numerous security threats like malicious codes and their vulnerability. • GPS can cause privacy issues for subscribers. • Security for mobile applications: – Installing and running security software are the simplest ways to detect security threats. – Mobile devices are resource constrained, protecting them from the threats is more difficult than that for resourceful devices.
  • 32. Mobile User Security Approaches • Oberheide et al. present an approach to move the threat detection capabilities to clouds. • An extension of the CloudAV platform consisting of host agent and network service components. • Host agent runs on mobile devices to inspect the file activity on a system. • If an identified file is not available in a cache of previous analyzed files, this file will be sent to the incloud network service for verification. • The second major component of CloudAV is a network service that is responsible for file verification J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. “Virtualized in-cloud security services for mobile devices,” in Proc 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31-35, June 2008.
  • 33. Mobile User Security Approaches • Portokalidis et al. present a paradigm in which attack detection for a smartphone is performed on a remote server in the cloud. • The smartphone records only a minimal execution trace, and transmits it to the security server in the cloud. G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, “Paranoid Android: versatile protection for smartphones,” in Proc 26th Annual Computer Security Application Conference (ACSAC), pp. 347-356, September 2010.
  • 34. Privacy Issues in MCC • Location based services (LBS) faces a privacy issue on mobile users’ provide private information such as their current location. • This problem becomes even worse if an adversary knows user’s important information.
  • 35. Privacy Issues in MCC • Zhangwei and Mingjun propose the location trusted server (LTS) approach. • After receiving mobile users’ requests, LTS gathers their location information and cloaks the information called “cloaked region” to conceal user’s information. • The “cloaked region” is sent to LBS, so LBS knows only general information about the users but cannot identify them. • H. Zhangwei and X. Mingjun, “A Distributed Spatial Cloaking Protocol for Location Privacy,” in Proc 2nd Intl Conf on Networks Security Wireless Communications and Trusted Computing (NSWCTC), vol. 2, pp. 468, June 2010.
  • 36. Context-aware Mobile Cloud Services • It is important to fulfill mobile users’ satisfaction by monitoring their preferences and providing appropriate services to each of the users. • Context-aware mobile cloud services try to utilize the local contexts (e.g., data types, network status, device environments, and user preferences) to improve the quality of service (QoS).
  • 37. Mobile Service Clouds • Samimi et al. build the Mobile Service Cloud model. • When a customer uses a service, the request firstly goes to a service gateway which will choose an appropriate primary proxy to meet the requirements and then sends the result to the user. • In disconnection, MSCs will establish transient proxies for mobile devices to monitor the service path, and support dynamic reconfiguration. • The model addresses the disconnection issue and can maintain the QoS at an acceptable level. F. A. Samimi, P. K. Mckinley, and S. M. Sadjadi, “Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services,” in Proceedings of the 2nd International Workshop on Self-Managed Networks, Systems & Services (SelfMan), vol. 3996, pp. 130-141, 2006.
  • 38. Context-aware Mobile Cloud Services • La and Kim propose an algorithm to choose a context-aware adapter. • The algorithm first determines the gaps occurring in the given contexts. A gap is defined as a result of context changes. • Then, the algorithm determines a cause of predefined gaps before saving the current states of the service invocation for disconnection. • For each identified gap, this algorithm will choose an appropriate adapter for the mobile user. H. H. La and S. D. Kim, “A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services,” in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD), pp. 466, August 2010.
  • 39. Open Issues in MCC • Network Access Management: – An efficient network access management not only improves link performance but also optimizes bandwidth usage. – Cognitive radio can be expected as a solution to achieve the wireless access management. – Can automatically changes its transmission or reception parameters, in a way where the wireless communications can have spectrum agility in terms of selecting available wireless channels opportunistically. – Integrated with MCC for better spectrum utilization
  • 40. Open Issues in MCC • Quality of Service: – How to ensure QoS is still a big issue, especially on network delay. – CloneCloud and Cloudlets are expected to reduce the network delay. – CloneCloud uses nearby computers or data centers to increase the speed of smart phone applications. – The idea is to clone the entire set of data and applications from the smartphone onto the cloud and to selectively execute some operations on the clones, reintegrating the results back into the smartphone.
  • 41. Open Issues in MCC • Quality of Service: – A cloudlet is a trusted, resource-rich computer or cluster of computers which is well-connected to the Internet and available for use by nearby mobile devices with on one-hop wireless connection. – Mobile users may meet the demand for real-time interactive response by low-latency, one-hop, high- bandwidth wireless access to the cloudlet. – Can help mobile users overcome the limits of cloud computing as WAN latency and low bandwidth.
  • 42. Open Issues in MCC • Pricing: – MCC involves with both mobile service provider (MSP) and cloud service provider (CSP) with different services management, customers management, methods of payment and prices. – This will lead to many issues. – The business model including pricing and revenue sharing has to be carefully developed for MCC.
  • 43. Open Issues in MCC • Standard Interface: – Interoperability becomes an important issue when mobile users need to interact with the cloud. – Web interfaces may not be the best option. – It is not specifically designed for mobile devices. – May have more overhead. – Compatibility among devices for web interface could be an issue. – Standard protocol, signaling, and interface for interacting between mobile users and cloud would be required. (HTML5 & CSS3)
  • 44. Open Issues in MCC • Service Convergence: – Services will be differentiated according to the types, cost, availability and quality. – A single cloud may not be enough to meet mobile user’s demands. – New scheme is needed in which the mobile users can utilize multiple cloud in a unified fashion. – The scheme should be able to automatically discover and compose services for user. – Sky computing is a model where resources from multiple clouds providers are leveraged to create a large scale distributed infrastructure. – The mobile sky computing will enable providers to support a cross-cloud communication and enable users to implement mobile services and applications. – Service integration (i.e., convergence) would need to be explored.
  • 45. References • Le Guan, Xu Ke, Meina Song, and Junde Song, “A Survey of Research on Mobile Cloud Computing”, IEEE/ACIS 10th International Conference on Computer and Information Science (ICIS), 2010, pp. 387-392. • Xiaopeng Fan, Jiannong Cao, and Haixia Mao. “A Survey of Mobile Cloud Computing,” ZTE Communications, 9(1):4-8, Mar 2011. • Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. “A survey of Mobile Cloud Computing: Architecture, Applications, and Approaches”, Wireless Communication and Mobile Computing. • http://www.csie.ndhu.edu.tw/~showyang/MCloud2012/04 MobileCloudSurvey.pdf • Chetan S., Gautam Kumar, K. Dinesh, Mathew K. and Abhimanyu M.A., “Cloud Computing for Mobile World,” 2010. (http://chetan.ueuo.com/projects/CCMW.pdf)