SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895
AN OVERVIEW ON MOBILE CLOUD COMPUTING
Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4
1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Given the advances in mobile telephones, users
start to consider a mobile phone a personal information
processing tool. So users wanted various operations be
performed on the top of mobile devices. Researchers havelong
acknowledged that mobile hardware is necessarily resource-
poor on static client and server hardware. Mobile cloud
computing (MCC) Which combines mobile computing and
cloud computing is a good result for this problem and has
become one of the industry buzz words and a major discussion
topic since 2009.This paper presents a review of the
background, security and open issues in mobile cloud
computing.
Key Words: mobile cloud computing, partitioning,
augmentation.
1. INTRODUCTION
The increasing use of mobile phones is clear from the study
from Juniper Research, which states that the consumer and
enterprise market for cloud-based mobile
applications expected to increase to $9.5 billion by 2014. In
recent years, applications targeted at mobile devices have
started becoming abundant with applications in various
categories such as amusement, social networking, travel,
health, games, business and news. The popularity in the
mobile computing are clear by browsing throughmobileapp
download centers such as Apple's iTunes or Nokia's Ovi
suite. The ground for the mobile cloud computing is that
mobile computing is able to offer a tool to the user whenand
where it is a needed irrespective of user movement, hence
supporting location independence. Indeed, 'mobility' is one
of the important features of a permeating computing
environment where the user is able to continue his/her
work flawless careless of his/her cause. These place the
problem of executing many useful programs that could aid
the user and create a pervasive environment. According to
Tim O'Reilly 'the future of mobility belongs to services that
respond in real-time to information that are supplied either
by nonhuman sensors or by their users. Real time
application demands intensive computing resources to one
character of mobile applications that demand high levels of
reactivity. Location-based social networking process in
mobile applications makesuse of the phone'svarioussensor
data. Nevertheless, extensive use of sensors, such as
obtaining a GPS reading, isexpensive in terms of energy and
this limits the mobile phone in providing the user a better
service through its embedded sensors. Furthermore,
consider applications that call for extensive processing -
image processing for video games, speech synthesis, natural
language processing, augmented reality, wearable
computing-all these demand high computational capacities
thusrestricting the developersin implementingapplications
for mobile telephone sets. problems will be solved in the
future by considering the trends in mobile phone
architecture and battery. This is, in fact, not merely a
temporary technological deficiency, but intrinsictomobility,
and a barrier that needs to overcome to actualized the full
potential of mobile computing. [2].
Fig:1 Mobile cloud computing architecture
2. MOBILE CLOUD COMPUTING BACKGROUND
Today, both hardware and software of mobile devices get
more capital improvementsthan before, somesmartphones
such as I Phones, Android serials, window mobile phones
and blackberry, are no longer just traditional mobile phones
with the conversation, SMS, Email and website browser, but
are daily necessities to the user. Still, at any given cost and
level of technology, considerations such as weight, size,
battery life, ergonomics and heat dissipation exact a severe
penalty in computational resourcessuch as processorspeed,
storage size, and disk capacity. Thus, three approaches are
aimed for mobile cloud applications:
1. Extending out the access to cloud services to mobile
devices. In this approach users use mobile devices often
through web browsers, to use software/applications as
services extended by cloud. The mobile cloud is most often
viewed as a Software-as-a-service (SaaS) Cloud and all the
computation and data treatment are usually performed in
the swarm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896
2. Enabling mobile devices to act collaboratively as cloud
resource providers. This approach makesuseoftheresource
at personal mobile devices to give a virtual mobile cloud,
which is useful in an ad hoc networking environment
without function of internet cloud.
3. Portable devices using cloud resources are augmented by
the execution of mobile applications. This attack uses the
cloud storage and processing for applications working on
mobile devices. The mobile cloud is thought as an
Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service
(PaaS) cloud. In this partial offloading of computation and
data warehousing is done to clod from the mobile devices
[1].
Fig:2 Cloud Computing Framework
3. ARCHITECTURE
With mobile cloud computing, mobile network and cloud
computing joined, thereby providing an ideal service for
mobile customers. Cloud computing exists when tasks and
data retained on each device. Applications run on a remote
server and then shipped to the client. Here the mobile
devices connect to the mobile networks through the base
stations; they will set up and manipulatetheconnections(air
interface) And functional interfaces between the mobile
networks and fluid devices. Mobile users send service
requests to the cloud through a WWW browser or desktop
application. The information is transmitted to the central
processors that tied to the serversprovidingmobilenetwork
services. Here, services like AAA (Authentication,
Authorization and Accounting) can store subscriber data in
databases and can offer the users based on Home Agent
(HA). The request of the subscriber is then saved to the
internet. Cloud controllerspresent in the cloud, providesthe
request to the mobile users with the corresponding cloud
services. These services originated based on the concepts of
utility computing, virtualization and service-oriented
architecture. The major use of a cloud computing system is
storing data in the cloud and using technology on the client
to use that data. Various business models rapidly evolved to
harnessthis technology by providing software applications,
programming platforms, data-storage, computing
infrastructure and hardware as services. [3]
Fig:3 Mobile Cloud Computing Architecture
4. SECURITY ISSUES
Many sources have presented classifications of security
issues in communication networks. There are five central
goals of security of information system.
 Confidentiality: preventingunauthorizedusersfrom
gaining admission to critical information of any
particular user.
 Integrity: Ensuresunauthorizedchange,destruction
or creation of information cannot take space.
 Availability: Ensuring authorized users getting the
access they need.
 Legitimate: Ensuring that only authorized users
receive access to services.
 Accountability: Ensuring that the users are held
responsible for their security related activities by
arranging the user and his/her body processes
linked if and when necessary. The way these goals
achieved depends on the security policy adoptedby
the service providers.[4]
5. SECURITY COUNTERMEASURES
Secure mobile computing is critical in evolution any
application of wireless networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897
5.1 Security Requirements
Similar to traditional networks, the goalsof securing mobile
computing can delimited by the following attributes:
availability, confidentiality, integrity, authenticity and non-
repudiation.
 Availability: ensures that the intended network
services are available when the intended
parties required.
 Confidentiality: ensuresthat the intended receivers
can use the data and is never revealed to
unauthorized entities.
 Authenticity: allowsa user to find out identityofthe
entity it is communicating with. Without
certification, an adversary can masquerade a
legitimate user, thusgaining unauthorizedaccessto
resources and sensitive information andinterfering
with operation of users.
 Integrity: guarantees that data is never corrupted
during transmission. But the authorized partiescan
change it.
 Non-repudiation: ensures that an entity can prove
the transmission or reception of information from
another entity, i.e., a sender/receiver cannot falsely
deny having received or sent certain data. [4]
6. OPEN ISSUES IN MOBILE CLOUD COMPUTING
There are some issues occurred while implementing the
cloud computing for mobile. These topics can related to
networking, related to limited resources, related to security
of mobile users and clouds. Some subjects explained as
follows:
 LIMITED RESOURCES: having limited resources in
mobile devices makes use of cloud computing in
mobile devices difficult. Basic limitations related to
limited computing power, limitedresources,limited
battery, and low of quality display.
 NETWORK RELATED ISSUES: All processinginMCC
performed along the network. Thus there are some
issues related to the network like bandwidth,
latency, availability and heterogeneity.
 SECURITY: Mobile devices also have to face a
number of troubles related to security and privacy.
To master this problem threat detection services is
now performed at the clouds, but this also has to
face many challenges. There are so many security
threats like, hacking, viruses, Trojan horses in
mobile devices also. The role of global positioning
system (GPS) in mobile devices gives birth to the
privacy issues.
 LOW BANDWIDTH: Bandwidth is one of the big
events at MCC since the radio resource for wireless
networks is much scarce as compared with the
traditional wired networks.
 AVAILABILITY: In MCC service availabilitybecomes
more important issue than that in the cloud
computing with wired networks. Mobile phone
users may not able to link up to the cloud to get
service due to network failures, traffic congestion
and the out-of-signal. [5]
7. CONCLUSION
Mobile Cloud Computing is one of the technology trends in
the fourth coming processas it unitesthe advantagesofboth
cloud computing and mobile computing, and hence
providing optimal services. MCC offers more possibilitiesfor
access services in a convenient way. It is anticipated that
after some more years the number of mobile users will be
using cloud computing on their mobile devices. This report
has provided an overview of mobile cloud computing in
which itsdefinitions, architecture, existingworkapplication,
advantages and challenges have presented. [5]
REFERENCES
[1] Nitesh Kaushik, Gaurav, Jitender Kumar ,”
A Literature Survey on Mobile Cloud Computing: Open
Issues and Future Directions” International Journal Of
Engineering And Computer ScienceISSN:2319-7242Volume
3 Issue 5 may, 2014 Page No. 6165-6172
[2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile
Cloud Computing” Volume 4, No. 10, September-October
2013, ISSN No. 0976-5697 , International Journal of
Advanced Research in Computer Science
[3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile
Cloud Computing Architecture, ApplicationsandChallenges”
International Journal of Scientific Research Engineering &
Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6,
September 2014
[4] T.Balasubramanian” MobileComputing–AnIntroduction
With Issues In Mobile Security” International Journal of
Review and Research in Applied Sciences and Engineering,
Vol.7 No.1 2015, ISSN: 2231-0061
[5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile
Cloud Computing for Smart Phones” International Journalof
Science, Engineering and Technology Research (IJSETR),
Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798

More Related Content

What's hot

Cloud computing in indian perspective
Cloud computing in indian perspectiveCloud computing in indian perspective
Cloud computing in indian perspectiveAjit Kumar
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application developmentLightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingVineet Garg
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Bhavya Siddappa
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud ComputingKamal Patel
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingEnd-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingDr Sukhpal Singh Gill
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...IRJET Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...ijasuc
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...PacketTrap Msp
 

What's hot (20)

Cloud computing in indian perspective
Cloud computing in indian perspectiveCloud computing in indian perspective
Cloud computing in indian perspective
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application developmentLightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Mcc
MccMcc
Mcc
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud Computing
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingEnd-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
 
Securing io t_with_aws
Securing io t_with_awsSecuring io t_with_aws
Securing io t_with_aws
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
 

Similar to IRJET- An Overview on Mobile Cloud Computing

A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingIRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoptionijtsrd
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 

Similar to IRJET- An Overview on Mobile Cloud Computing (20)

A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

IRJET- An Overview on Mobile Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895 AN OVERVIEW ON MOBILE CLOUD COMPUTING Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4 1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India 2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Given the advances in mobile telephones, users start to consider a mobile phone a personal information processing tool. So users wanted various operations be performed on the top of mobile devices. Researchers havelong acknowledged that mobile hardware is necessarily resource- poor on static client and server hardware. Mobile cloud computing (MCC) Which combines mobile computing and cloud computing is a good result for this problem and has become one of the industry buzz words and a major discussion topic since 2009.This paper presents a review of the background, security and open issues in mobile cloud computing. Key Words: mobile cloud computing, partitioning, augmentation. 1. INTRODUCTION The increasing use of mobile phones is clear from the study from Juniper Research, which states that the consumer and enterprise market for cloud-based mobile applications expected to increase to $9.5 billion by 2014. In recent years, applications targeted at mobile devices have started becoming abundant with applications in various categories such as amusement, social networking, travel, health, games, business and news. The popularity in the mobile computing are clear by browsing throughmobileapp download centers such as Apple's iTunes or Nokia's Ovi suite. The ground for the mobile cloud computing is that mobile computing is able to offer a tool to the user whenand where it is a needed irrespective of user movement, hence supporting location independence. Indeed, 'mobility' is one of the important features of a permeating computing environment where the user is able to continue his/her work flawless careless of his/her cause. These place the problem of executing many useful programs that could aid the user and create a pervasive environment. According to Tim O'Reilly 'the future of mobility belongs to services that respond in real-time to information that are supplied either by nonhuman sensors or by their users. Real time application demands intensive computing resources to one character of mobile applications that demand high levels of reactivity. Location-based social networking process in mobile applications makesuse of the phone'svarioussensor data. Nevertheless, extensive use of sensors, such as obtaining a GPS reading, isexpensive in terms of energy and this limits the mobile phone in providing the user a better service through its embedded sensors. Furthermore, consider applications that call for extensive processing - image processing for video games, speech synthesis, natural language processing, augmented reality, wearable computing-all these demand high computational capacities thusrestricting the developersin implementingapplications for mobile telephone sets. problems will be solved in the future by considering the trends in mobile phone architecture and battery. This is, in fact, not merely a temporary technological deficiency, but intrinsictomobility, and a barrier that needs to overcome to actualized the full potential of mobile computing. [2]. Fig:1 Mobile cloud computing architecture 2. MOBILE CLOUD COMPUTING BACKGROUND Today, both hardware and software of mobile devices get more capital improvementsthan before, somesmartphones such as I Phones, Android serials, window mobile phones and blackberry, are no longer just traditional mobile phones with the conversation, SMS, Email and website browser, but are daily necessities to the user. Still, at any given cost and level of technology, considerations such as weight, size, battery life, ergonomics and heat dissipation exact a severe penalty in computational resourcessuch as processorspeed, storage size, and disk capacity. Thus, three approaches are aimed for mobile cloud applications: 1. Extending out the access to cloud services to mobile devices. In this approach users use mobile devices often through web browsers, to use software/applications as services extended by cloud. The mobile cloud is most often viewed as a Software-as-a-service (SaaS) Cloud and all the computation and data treatment are usually performed in the swarm.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896 2. Enabling mobile devices to act collaboratively as cloud resource providers. This approach makesuseoftheresource at personal mobile devices to give a virtual mobile cloud, which is useful in an ad hoc networking environment without function of internet cloud. 3. Portable devices using cloud resources are augmented by the execution of mobile applications. This attack uses the cloud storage and processing for applications working on mobile devices. The mobile cloud is thought as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud. In this partial offloading of computation and data warehousing is done to clod from the mobile devices [1]. Fig:2 Cloud Computing Framework 3. ARCHITECTURE With mobile cloud computing, mobile network and cloud computing joined, thereby providing an ideal service for mobile customers. Cloud computing exists when tasks and data retained on each device. Applications run on a remote server and then shipped to the client. Here the mobile devices connect to the mobile networks through the base stations; they will set up and manipulatetheconnections(air interface) And functional interfaces between the mobile networks and fluid devices. Mobile users send service requests to the cloud through a WWW browser or desktop application. The information is transmitted to the central processors that tied to the serversprovidingmobilenetwork services. Here, services like AAA (Authentication, Authorization and Accounting) can store subscriber data in databases and can offer the users based on Home Agent (HA). The request of the subscriber is then saved to the internet. Cloud controllerspresent in the cloud, providesthe request to the mobile users with the corresponding cloud services. These services originated based on the concepts of utility computing, virtualization and service-oriented architecture. The major use of a cloud computing system is storing data in the cloud and using technology on the client to use that data. Various business models rapidly evolved to harnessthis technology by providing software applications, programming platforms, data-storage, computing infrastructure and hardware as services. [3] Fig:3 Mobile Cloud Computing Architecture 4. SECURITY ISSUES Many sources have presented classifications of security issues in communication networks. There are five central goals of security of information system.  Confidentiality: preventingunauthorizedusersfrom gaining admission to critical information of any particular user.  Integrity: Ensuresunauthorizedchange,destruction or creation of information cannot take space.  Availability: Ensuring authorized users getting the access they need.  Legitimate: Ensuring that only authorized users receive access to services.  Accountability: Ensuring that the users are held responsible for their security related activities by arranging the user and his/her body processes linked if and when necessary. The way these goals achieved depends on the security policy adoptedby the service providers.[4] 5. SECURITY COUNTERMEASURES Secure mobile computing is critical in evolution any application of wireless networks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897 5.1 Security Requirements Similar to traditional networks, the goalsof securing mobile computing can delimited by the following attributes: availability, confidentiality, integrity, authenticity and non- repudiation.  Availability: ensures that the intended network services are available when the intended parties required.  Confidentiality: ensuresthat the intended receivers can use the data and is never revealed to unauthorized entities.  Authenticity: allowsa user to find out identityofthe entity it is communicating with. Without certification, an adversary can masquerade a legitimate user, thusgaining unauthorizedaccessto resources and sensitive information andinterfering with operation of users.  Integrity: guarantees that data is never corrupted during transmission. But the authorized partiescan change it.  Non-repudiation: ensures that an entity can prove the transmission or reception of information from another entity, i.e., a sender/receiver cannot falsely deny having received or sent certain data. [4] 6. OPEN ISSUES IN MOBILE CLOUD COMPUTING There are some issues occurred while implementing the cloud computing for mobile. These topics can related to networking, related to limited resources, related to security of mobile users and clouds. Some subjects explained as follows:  LIMITED RESOURCES: having limited resources in mobile devices makes use of cloud computing in mobile devices difficult. Basic limitations related to limited computing power, limitedresources,limited battery, and low of quality display.  NETWORK RELATED ISSUES: All processinginMCC performed along the network. Thus there are some issues related to the network like bandwidth, latency, availability and heterogeneity.  SECURITY: Mobile devices also have to face a number of troubles related to security and privacy. To master this problem threat detection services is now performed at the clouds, but this also has to face many challenges. There are so many security threats like, hacking, viruses, Trojan horses in mobile devices also. The role of global positioning system (GPS) in mobile devices gives birth to the privacy issues.  LOW BANDWIDTH: Bandwidth is one of the big events at MCC since the radio resource for wireless networks is much scarce as compared with the traditional wired networks.  AVAILABILITY: In MCC service availabilitybecomes more important issue than that in the cloud computing with wired networks. Mobile phone users may not able to link up to the cloud to get service due to network failures, traffic congestion and the out-of-signal. [5] 7. CONCLUSION Mobile Cloud Computing is one of the technology trends in the fourth coming processas it unitesthe advantagesofboth cloud computing and mobile computing, and hence providing optimal services. MCC offers more possibilitiesfor access services in a convenient way. It is anticipated that after some more years the number of mobile users will be using cloud computing on their mobile devices. This report has provided an overview of mobile cloud computing in which itsdefinitions, architecture, existingworkapplication, advantages and challenges have presented. [5] REFERENCES [1] Nitesh Kaushik, Gaurav, Jitender Kumar ,” A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions” International Journal Of Engineering And Computer ScienceISSN:2319-7242Volume 3 Issue 5 may, 2014 Page No. 6165-6172 [2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile Cloud Computing” Volume 4, No. 10, September-October 2013, ISSN No. 0976-5697 , International Journal of Advanced Research in Computer Science [3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile Cloud Computing Architecture, ApplicationsandChallenges” International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 [4] T.Balasubramanian” MobileComputing–AnIntroduction With Issues In Mobile Security” International Journal of Review and Research in Applied Sciences and Engineering, Vol.7 No.1 2015, ISSN: 2231-0061 [5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile Cloud Computing for Smart Phones” International Journalof Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798