SlideShare a Scribd company logo
Chandu Veera Ramakrishna
16F91A05B0
Prakasam Engineering College,Kandukur.
ABSTRACT
 Cloud computing is a very useful solution to many individual users and
organizations.
 It can provide many services based on different needs and requirements.
 However, there are many issues related to the user data that need to be
addressed when using cloud computing.
 Among the most important issues are: data ownership, data privacy, and
storage.
 In other words, more important data will be encrypted with more secure
encryption algorithm and larger key sizes, while less important data might even
not be encrypted.
 The results of applying the proposed framework show improvement and
efficiency over other existing frameworks.
INTRODUCTION
 An Efficient and Secured Framework for Mobile Cloud Computing
Smartphones provide a wide range of applications, such as face detection,
augmented reality, image and video processing, and video gaming and
speech recognition.
 These applications are complex and there is an increasing demand for
computing resources.
 Despite advances in smartphones, however, the extent of battery life
remained one of the main challenges in improving computational
requirements through battery upgrading.
FEATURES
 The framework also adds a new security layer, which in the off-607
loading case uses an AES technique to protect the data methods before
transferring to the cloud.
Frame work architecture and content
 The framework design consists of six modules, namely, estimator, profile,
network and bandwidth monitor, decision maker, mobile manager, and cloud
manager.
 First, the framework works at the method level, wherever the developers have to
be compelled to add AN annotation (Remote) specifically intensive strategy at
the developing step.
 These strategies should need further computation and might be offloaded to the
cloud for remote execution. These strategies should not
 a) depend upon the user interface or
 b) use any I/O mobile device like GPS, camera, or measuring device.
FRAME WORK MODULES
 1. Estimator
 The estimator module is responsible for identifying these strategies for
native execution on the mobile device and remote execution on the cloud
with totally different input sizes at the installation step.
 Then, the module obtains the values of execution time, memory usage,
CPU utilization, and energy consumption for every annotated technique
for these totally different input sizes
 Finally, the values are communicated and sent to the profile module.
FRAME WORK MODULE
2. Profile
 The profile module obtains the values of execution time, memory usage,
CPU utilization, and energy consumption from figurer module for every
annotated technique.
 Then, the module creates a brand new file for every technique and stores
these values into the file.
 These files are updated when every running method and utilized by the
decision maker module as a history-based go into the offloading decision.
FRAME WORK MODULE
 3. Network and Bandwidth Monitor
 This module only monitors this standing of the network and gathers cell
connection state and its information measure, Wi-Fi association state and
its information measure, and signal strength of cell and Wi-Fi connection.
 Then, this data is shipped to {the call ,the choice} maker module to
support the determination the offloading decision.
FRAME WORK MODULE
 4. Decision Maker
 The choice build, that is, the core module of the planned framework,
contains associate whole number linear programming model and
decision-making rule that predicts at runtime wherever the annotated
strategies are executed.
 The goal of the model is to search out associate application partitioning
strategy that minimizes the energy consumption, transfer knowledge,
memory usage, and electronic equipment utilization, in smartphones,
subject to bound constraints.
FRAME WORK MODULES
 5. Mobile Manager
 The mobile manager module is responsible for causing a computer file
containing the method code and its needed libraries at the installation step.
 The mobile manager handles the execution of the method supported the model
decision.
 If the tactic is dead regionally on the mobile device, the files are updated with
new values through the profile module.
 AES technique and communicates with the cloud manager module to transfer
this knowledge with the method name.
 Finally, the mobile manager receives and delivers the results to the appliance.
FRAME WORK MODULE
 6. Cloud Manager
 The cloud manager module is that the solely module deployed on the cloud side.
 This module is written strictly in Java.
 Therefore, any application will take pleasure in the projected framework to offload its
computation to any resource that runs the Java Virtual Machine (JVM).
 Communication between the cloud manager and also the mobile manager modules is
managed by wading bird communication middleware within the 1st communication.
 Then, the cloud manager receives the ways data and decrypts them within the following
run.
 Then, the manager executes the tactic remotely and sends the result back to the mobile
manager module with the new values to be updated by the profile module.
FRAME WORK EXECUTION FLOW
ALGORITHM
 Framework execution flow Input: Input size,
memory usage, CPU utilization and energy
consumption for each annotated method.
 Output: Execution place and result for each method.
 Read annotated methods name.
 Check the current network status using Network &
Bandwidth monitor Module.
 if there isn’t connection then
 Execute the method locally on the mobile device.
 else
 for each method i do
 Read C transfer, C memory, and CCPU and C power
through the profile module.
 Solve the optimization model in and determine the
offloading decision.
 if the decision is offloading then 10. Encrypt
the method data using AES Algorithm.
 Send it to the cloud for remote execution.
 Return Result back to the mobile device
(communication managed using Mobile
Manager & Cloud Manger Modules).
 else
 Execute the method locally on the mobile
device.
 end if
 end for
 end if
 Update the profile file with new values.
SYSTEM BRIEF VIEW
 SYSTEM VIEW AND LAYERED ARCHITECTURE
CONCLUSION
 This framework will offload only the appliance strategies that consume
substantial mobile resources.
 The offloading decision is formed using a developed 0–1 number applied
mathematics model.
 This call is formed dynamically at runtime supported four constraints,
namely, memory usage, C.P.U. utilization, energy consumption, and
execution time.
 The framework also adds a replacement security layer that uses associate
AES technique to shield the strategies knowledge before transferring to
the cloud within the offloading case.
Presented To:
Dr.S.Srinivasulu Rao Phd.,M.Tech

More Related Content

What's hot

Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
Marcelo Sávio
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
Utshab Saha
 
Unit v
Unit vUnit v
Unit v
upendarrao3
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
Dr. Ramkumar Lakshminarayanan
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
pavan penugonda
 
Advanced topics in artificial neural networks
Advanced topics in artificial neural networksAdvanced topics in artificial neural networks
Advanced topics in artificial neural networks
swapnac12
 
Unit 4
Unit 4Unit 4
Suspicious Activity Detection python Project Abstract
Suspicious Activity Detection python Project AbstractSuspicious Activity Detection python Project Abstract
Suspicious Activity Detection python Project Abstract
Venkat Projects
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
Lippo Group Digital
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
MachinePulse
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Heman Pathak
 
Neuromorphic computing
Neuromorphic computingNeuromorphic computing
Neuromorphic computing
SreekuttanJayakumar
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
Piyush Rochwani
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Ecg analysis in the cloud
Ecg analysis in the cloudEcg analysis in the cloud
Ecg analysis in the cloud
gaurav jain
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0s
Ignacio M. Llorente
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
Debjyoti Ghosh
 

What's hot (20)

Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 
Unit v
Unit vUnit v
Unit v
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Advanced topics in artificial neural networks
Advanced topics in artificial neural networksAdvanced topics in artificial neural networks
Advanced topics in artificial neural networks
 
Unit 4
Unit 4Unit 4
Unit 4
 
Suspicious Activity Detection python Project Abstract
Suspicious Activity Detection python Project AbstractSuspicious Activity Detection python Project Abstract
Suspicious Activity Detection python Project Abstract
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Neuromorphic computing
Neuromorphic computingNeuromorphic computing
Neuromorphic computing
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Ecg analysis in the cloud
Ecg analysis in the cloudEcg analysis in the cloud
Ecg analysis in the cloud
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0s
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
 

Similar to AN EFFICIENT AND SECURED FRAMEWORK FOR MOBILE CLOUD COMPUTING

Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
IEEEFINALYEARPROJECTS
 
Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...
Anindya Duti Dhar
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
SimulationX
 
Ameya_Kasbekar_Resume
Ameya_Kasbekar_ResumeAmeya_Kasbekar_Resume
Ameya_Kasbekar_Resume
Ameya Kasbekar
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
allan sam
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
IOSR Journals
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
IRJET Journal
 
Clone cloud
Clone cloudClone cloud
Clone cloud
Bhagavathi Dhass
 
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET Journal
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Marketing Donalba
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
IJECEIAES
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Dr. Richard Otieno
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSINGHOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
cscpconf
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
 
Dynamic Framework Design for Offloading Mobile Applications to Cloud
Dynamic Framework Design for Offloading Mobile Applications to CloudDynamic Framework Design for Offloading Mobile Applications to Cloud
Dynamic Framework Design for Offloading Mobile Applications to Cloud
iosrjce
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
HODCS6
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
Chhatrapati shivaji institute of technology, Deori
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 

Similar to AN EFFICIENT AND SECURED FRAMEWORK FOR MOBILE CLOUD COMPUTING (20)

Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...Identifying parameters for Code Offloading as a practical solution to optimiz...
Identifying parameters for Code Offloading as a practical solution to optimiz...
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
 
Ameya_Kasbekar_Resume
Ameya_Kasbekar_ResumeAmeya_Kasbekar_Resume
Ameya_Kasbekar_Resume
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
 
Clone cloud
Clone cloudClone cloud
Clone cloud
 
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSINGHOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
HOMOGENEOUS MULTISTAGE ARCHITECTURE FOR REAL-TIME IMAGE PROCESSING
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Dynamic Framework Design for Offloading Mobile Applications to Cloud
Dynamic Framework Design for Offloading Mobile Applications to CloudDynamic Framework Design for Offloading Mobile Applications to Cloud
Dynamic Framework Design for Offloading Mobile Applications to Cloud
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

AN EFFICIENT AND SECURED FRAMEWORK FOR MOBILE CLOUD COMPUTING

  • 1. Chandu Veera Ramakrishna 16F91A05B0 Prakasam Engineering College,Kandukur.
  • 2. ABSTRACT  Cloud computing is a very useful solution to many individual users and organizations.  It can provide many services based on different needs and requirements.  However, there are many issues related to the user data that need to be addressed when using cloud computing.  Among the most important issues are: data ownership, data privacy, and storage.  In other words, more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted.  The results of applying the proposed framework show improvement and efficiency over other existing frameworks.
  • 3. INTRODUCTION  An Efficient and Secured Framework for Mobile Cloud Computing Smartphones provide a wide range of applications, such as face detection, augmented reality, image and video processing, and video gaming and speech recognition.  These applications are complex and there is an increasing demand for computing resources.  Despite advances in smartphones, however, the extent of battery life remained one of the main challenges in improving computational requirements through battery upgrading.
  • 4. FEATURES  The framework also adds a new security layer, which in the off-607 loading case uses an AES technique to protect the data methods before transferring to the cloud.
  • 5. Frame work architecture and content  The framework design consists of six modules, namely, estimator, profile, network and bandwidth monitor, decision maker, mobile manager, and cloud manager.  First, the framework works at the method level, wherever the developers have to be compelled to add AN annotation (Remote) specifically intensive strategy at the developing step.  These strategies should need further computation and might be offloaded to the cloud for remote execution. These strategies should not  a) depend upon the user interface or  b) use any I/O mobile device like GPS, camera, or measuring device.
  • 6. FRAME WORK MODULES  1. Estimator  The estimator module is responsible for identifying these strategies for native execution on the mobile device and remote execution on the cloud with totally different input sizes at the installation step.  Then, the module obtains the values of execution time, memory usage, CPU utilization, and energy consumption for every annotated technique for these totally different input sizes  Finally, the values are communicated and sent to the profile module.
  • 7. FRAME WORK MODULE 2. Profile  The profile module obtains the values of execution time, memory usage, CPU utilization, and energy consumption from figurer module for every annotated technique.  Then, the module creates a brand new file for every technique and stores these values into the file.  These files are updated when every running method and utilized by the decision maker module as a history-based go into the offloading decision.
  • 8. FRAME WORK MODULE  3. Network and Bandwidth Monitor  This module only monitors this standing of the network and gathers cell connection state and its information measure, Wi-Fi association state and its information measure, and signal strength of cell and Wi-Fi connection.  Then, this data is shipped to {the call ,the choice} maker module to support the determination the offloading decision.
  • 9. FRAME WORK MODULE  4. Decision Maker  The choice build, that is, the core module of the planned framework, contains associate whole number linear programming model and decision-making rule that predicts at runtime wherever the annotated strategies are executed.  The goal of the model is to search out associate application partitioning strategy that minimizes the energy consumption, transfer knowledge, memory usage, and electronic equipment utilization, in smartphones, subject to bound constraints.
  • 10. FRAME WORK MODULES  5. Mobile Manager  The mobile manager module is responsible for causing a computer file containing the method code and its needed libraries at the installation step.  The mobile manager handles the execution of the method supported the model decision.  If the tactic is dead regionally on the mobile device, the files are updated with new values through the profile module.  AES technique and communicates with the cloud manager module to transfer this knowledge with the method name.  Finally, the mobile manager receives and delivers the results to the appliance.
  • 11. FRAME WORK MODULE  6. Cloud Manager  The cloud manager module is that the solely module deployed on the cloud side.  This module is written strictly in Java.  Therefore, any application will take pleasure in the projected framework to offload its computation to any resource that runs the Java Virtual Machine (JVM).  Communication between the cloud manager and also the mobile manager modules is managed by wading bird communication middleware within the 1st communication.  Then, the cloud manager receives the ways data and decrypts them within the following run.  Then, the manager executes the tactic remotely and sends the result back to the mobile manager module with the new values to be updated by the profile module.
  • 12. FRAME WORK EXECUTION FLOW ALGORITHM  Framework execution flow Input: Input size, memory usage, CPU utilization and energy consumption for each annotated method.  Output: Execution place and result for each method.  Read annotated methods name.  Check the current network status using Network & Bandwidth monitor Module.  if there isn’t connection then  Execute the method locally on the mobile device.  else  for each method i do  Read C transfer, C memory, and CCPU and C power through the profile module.  Solve the optimization model in and determine the offloading decision.  if the decision is offloading then 10. Encrypt the method data using AES Algorithm.  Send it to the cloud for remote execution.  Return Result back to the mobile device (communication managed using Mobile Manager & Cloud Manger Modules).  else  Execute the method locally on the mobile device.  end if  end for  end if  Update the profile file with new values.
  • 13. SYSTEM BRIEF VIEW  SYSTEM VIEW AND LAYERED ARCHITECTURE
  • 14. CONCLUSION  This framework will offload only the appliance strategies that consume substantial mobile resources.  The offloading decision is formed using a developed 0–1 number applied mathematics model.  This call is formed dynamically at runtime supported four constraints, namely, memory usage, C.P.U. utilization, energy consumption, and execution time.  The framework also adds a replacement security layer that uses associate AES technique to shield the strategies knowledge before transferring to the cloud within the offloading case.