Submit Search
Upload
IRJET- An Overview on Mobile Cloud Computing
•
0 likes
•
18 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3202.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
40120130405016
40120130405016
IAEME Publication
Smart Computing Mobile Cloud
Smart Computing Mobile Cloud
ijtsrd
20120130406025
20120130406025
IAEME Publication
IRJET - Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
IRJET Journal
Iot vijaya priya r cat1
Iot vijaya priya r cat1
ChetanShahukari
Recommended
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
40120130405016
40120130405016
IAEME Publication
Smart Computing Mobile Cloud
Smart Computing Mobile Cloud
ijtsrd
20120130406025
20120130406025
IAEME Publication
IRJET - Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
IRJET Journal
Iot vijaya priya r cat1
Iot vijaya priya r cat1
ChetanShahukari
Cloud computing in indian perspective
Cloud computing in indian perspective
Ajit Kumar
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
Mobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
TELKOMNIKA JOURNAL
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Mcc
Mcc
9881452223
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
Mobile-Cloud Computing
Mobile-Cloud Computing
Kamal Patel
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Dr Sukhpal Singh Gill
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
Securing io t_with_aws
Securing io t_with_aws
MichaelRodriguesdosS1
Mobile cloud computing
Mobile cloud computing
Fatih Özlü
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
More Related Content
What's hot
Cloud computing in indian perspective
Cloud computing in indian perspective
Ajit Kumar
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
Mobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
TELKOMNIKA JOURNAL
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Mcc
Mcc
9881452223
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
Mobile-Cloud Computing
Mobile-Cloud Computing
Kamal Patel
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Dr Sukhpal Singh Gill
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
Securing io t_with_aws
Securing io t_with_aws
MichaelRodriguesdosS1
Mobile cloud computing
Mobile cloud computing
Fatih Özlü
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
What's hot
(20)
Cloud computing in indian perspective
Cloud computing in indian perspective
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing
Mobile Cloud Computing
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Mcc
Mcc
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Mobile-Cloud Computing
Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
IJET-V3I1P24
IJET-V3I1P24
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
Securing io t_with_aws
Securing io t_with_aws
Mobile cloud computing
Mobile cloud computing
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
Similar to IRJET- An Overview on Mobile Cloud Computing
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
IRJET Journal
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET Journal
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
Fog Computing
Fog Computing
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
ijtsrd
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
IRJET Journal
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Similar to IRJET- An Overview on Mobile Cloud Computing
(20)
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
Fog Computing
Fog Computing
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Recently uploaded
(20)
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
IRJET- An Overview on Mobile Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895 AN OVERVIEW ON MOBILE CLOUD COMPUTING Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4 1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India 2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Given the advances in mobile telephones, users start to consider a mobile phone a personal information processing tool. So users wanted various operations be performed on the top of mobile devices. Researchers havelong acknowledged that mobile hardware is necessarily resource- poor on static client and server hardware. Mobile cloud computing (MCC) Which combines mobile computing and cloud computing is a good result for this problem and has become one of the industry buzz words and a major discussion topic since 2009.This paper presents a review of the background, security and open issues in mobile cloud computing. Key Words: mobile cloud computing, partitioning, augmentation. 1. INTRODUCTION The increasing use of mobile phones is clear from the study from Juniper Research, which states that the consumer and enterprise market for cloud-based mobile applications expected to increase to $9.5 billion by 2014. In recent years, applications targeted at mobile devices have started becoming abundant with applications in various categories such as amusement, social networking, travel, health, games, business and news. The popularity in the mobile computing are clear by browsing throughmobileapp download centers such as Apple's iTunes or Nokia's Ovi suite. The ground for the mobile cloud computing is that mobile computing is able to offer a tool to the user whenand where it is a needed irrespective of user movement, hence supporting location independence. Indeed, 'mobility' is one of the important features of a permeating computing environment where the user is able to continue his/her work flawless careless of his/her cause. These place the problem of executing many useful programs that could aid the user and create a pervasive environment. According to Tim O'Reilly 'the future of mobility belongs to services that respond in real-time to information that are supplied either by nonhuman sensors or by their users. Real time application demands intensive computing resources to one character of mobile applications that demand high levels of reactivity. Location-based social networking process in mobile applications makesuse of the phone'svarioussensor data. Nevertheless, extensive use of sensors, such as obtaining a GPS reading, isexpensive in terms of energy and this limits the mobile phone in providing the user a better service through its embedded sensors. Furthermore, consider applications that call for extensive processing - image processing for video games, speech synthesis, natural language processing, augmented reality, wearable computing-all these demand high computational capacities thusrestricting the developersin implementingapplications for mobile telephone sets. problems will be solved in the future by considering the trends in mobile phone architecture and battery. This is, in fact, not merely a temporary technological deficiency, but intrinsictomobility, and a barrier that needs to overcome to actualized the full potential of mobile computing. [2]. Fig:1 Mobile cloud computing architecture 2. MOBILE CLOUD COMPUTING BACKGROUND Today, both hardware and software of mobile devices get more capital improvementsthan before, somesmartphones such as I Phones, Android serials, window mobile phones and blackberry, are no longer just traditional mobile phones with the conversation, SMS, Email and website browser, but are daily necessities to the user. Still, at any given cost and level of technology, considerations such as weight, size, battery life, ergonomics and heat dissipation exact a severe penalty in computational resourcessuch as processorspeed, storage size, and disk capacity. Thus, three approaches are aimed for mobile cloud applications: 1. Extending out the access to cloud services to mobile devices. In this approach users use mobile devices often through web browsers, to use software/applications as services extended by cloud. The mobile cloud is most often viewed as a Software-as-a-service (SaaS) Cloud and all the computation and data treatment are usually performed in the swarm.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896 2. Enabling mobile devices to act collaboratively as cloud resource providers. This approach makesuseoftheresource at personal mobile devices to give a virtual mobile cloud, which is useful in an ad hoc networking environment without function of internet cloud. 3. Portable devices using cloud resources are augmented by the execution of mobile applications. This attack uses the cloud storage and processing for applications working on mobile devices. The mobile cloud is thought as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud. In this partial offloading of computation and data warehousing is done to clod from the mobile devices [1]. Fig:2 Cloud Computing Framework 3. ARCHITECTURE With mobile cloud computing, mobile network and cloud computing joined, thereby providing an ideal service for mobile customers. Cloud computing exists when tasks and data retained on each device. Applications run on a remote server and then shipped to the client. Here the mobile devices connect to the mobile networks through the base stations; they will set up and manipulatetheconnections(air interface) And functional interfaces between the mobile networks and fluid devices. Mobile users send service requests to the cloud through a WWW browser or desktop application. The information is transmitted to the central processors that tied to the serversprovidingmobilenetwork services. Here, services like AAA (Authentication, Authorization and Accounting) can store subscriber data in databases and can offer the users based on Home Agent (HA). The request of the subscriber is then saved to the internet. Cloud controllerspresent in the cloud, providesthe request to the mobile users with the corresponding cloud services. These services originated based on the concepts of utility computing, virtualization and service-oriented architecture. The major use of a cloud computing system is storing data in the cloud and using technology on the client to use that data. Various business models rapidly evolved to harnessthis technology by providing software applications, programming platforms, data-storage, computing infrastructure and hardware as services. [3] Fig:3 Mobile Cloud Computing Architecture 4. SECURITY ISSUES Many sources have presented classifications of security issues in communication networks. There are five central goals of security of information system. Confidentiality: preventingunauthorizedusersfrom gaining admission to critical information of any particular user. Integrity: Ensuresunauthorizedchange,destruction or creation of information cannot take space. Availability: Ensuring authorized users getting the access they need. Legitimate: Ensuring that only authorized users receive access to services. Accountability: Ensuring that the users are held responsible for their security related activities by arranging the user and his/her body processes linked if and when necessary. The way these goals achieved depends on the security policy adoptedby the service providers.[4] 5. SECURITY COUNTERMEASURES Secure mobile computing is critical in evolution any application of wireless networks.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897 5.1 Security Requirements Similar to traditional networks, the goalsof securing mobile computing can delimited by the following attributes: availability, confidentiality, integrity, authenticity and non- repudiation. Availability: ensures that the intended network services are available when the intended parties required. Confidentiality: ensuresthat the intended receivers can use the data and is never revealed to unauthorized entities. Authenticity: allowsa user to find out identityofthe entity it is communicating with. Without certification, an adversary can masquerade a legitimate user, thusgaining unauthorizedaccessto resources and sensitive information andinterfering with operation of users. Integrity: guarantees that data is never corrupted during transmission. But the authorized partiescan change it. Non-repudiation: ensures that an entity can prove the transmission or reception of information from another entity, i.e., a sender/receiver cannot falsely deny having received or sent certain data. [4] 6. OPEN ISSUES IN MOBILE CLOUD COMPUTING There are some issues occurred while implementing the cloud computing for mobile. These topics can related to networking, related to limited resources, related to security of mobile users and clouds. Some subjects explained as follows: LIMITED RESOURCES: having limited resources in mobile devices makes use of cloud computing in mobile devices difficult. Basic limitations related to limited computing power, limitedresources,limited battery, and low of quality display. NETWORK RELATED ISSUES: All processinginMCC performed along the network. Thus there are some issues related to the network like bandwidth, latency, availability and heterogeneity. SECURITY: Mobile devices also have to face a number of troubles related to security and privacy. To master this problem threat detection services is now performed at the clouds, but this also has to face many challenges. There are so many security threats like, hacking, viruses, Trojan horses in mobile devices also. The role of global positioning system (GPS) in mobile devices gives birth to the privacy issues. LOW BANDWIDTH: Bandwidth is one of the big events at MCC since the radio resource for wireless networks is much scarce as compared with the traditional wired networks. AVAILABILITY: In MCC service availabilitybecomes more important issue than that in the cloud computing with wired networks. Mobile phone users may not able to link up to the cloud to get service due to network failures, traffic congestion and the out-of-signal. [5] 7. CONCLUSION Mobile Cloud Computing is one of the technology trends in the fourth coming processas it unitesthe advantagesofboth cloud computing and mobile computing, and hence providing optimal services. MCC offers more possibilitiesfor access services in a convenient way. It is anticipated that after some more years the number of mobile users will be using cloud computing on their mobile devices. This report has provided an overview of mobile cloud computing in which itsdefinitions, architecture, existingworkapplication, advantages and challenges have presented. [5] REFERENCES [1] Nitesh Kaushik, Gaurav, Jitender Kumar ,” A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions” International Journal Of Engineering And Computer ScienceISSN:2319-7242Volume 3 Issue 5 may, 2014 Page No. 6165-6172 [2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile Cloud Computing” Volume 4, No. 10, September-October 2013, ISSN No. 0976-5697 , International Journal of Advanced Research in Computer Science [3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile Cloud Computing Architecture, ApplicationsandChallenges” International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 [4] T.Balasubramanian” MobileComputing–AnIntroduction With Issues In Mobile Security” International Journal of Review and Research in Applied Sciences and Engineering, Vol.7 No.1 2015, ISSN: 2231-0061 [5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile Cloud Computing for Smart Phones” International Journalof Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798
Download now