• Title/Summary/Keyword: Mobile Cloud Services

Search Result 189, Processing Time 0.02 seconds

Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing

  • Liu, Xing;Yuan, Chaowei;Peng, Enda;Yang, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1587-1605
    • /
    • 2015
  • Mobile cloud computing (MCC) combines mobile Internet and cloud computing to improve the performance of applications. In MCC, the data processing and storage for mobile devices (MDs) is provided on the remote cloud. However, MCC faces the problem of energy efficiency caused by randomly varying channels. In this paper, by introducing the Lyapunov optimization method, we propose a combined service subscription and delivery (CSSD) algorithm that can guide the users to subscribe to services reasonably. This algorithm can also determine whether to deliver the data and to whom data is sent in the current time unit based on the queue backlog and the channel state. Numerical results validate the correctness and effectiveness of our proposed CSSD algorithm.

Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client

  • Gandeva Bayu Satrya;Soo Young Shin
    • Journal of Internet Technology
    • /
    • v.19 no.6
    • /
    • pp.1741-1752
    • /
    • 2018
  • The best known software developers all offer cloud storage services. Microsoft offers Onedrive to its users, Apple offers iCloud Drive and Google offers Google Drive or GDrive. The battle between these software developers is ongoing and they will always strive to give the best services to their users. It is not only technology that is evolving, however, but also ways in which security can be breached and data abused. The security of information on the Internet is increasingly at risk and there are many threats to cloud storage platforms. This research used the mobile forensics approach to help in identifying and analyzing user behavior that may occur while using GDrive application for cybercrime. The novelty of comparison and analyzing methods performed in this research can help to find remnant data from all activities performed by GDrive users in Android smartphones. Hence, this proposed method can assist investigators in finding remnant data on GDrive client and can provide knowledge for legal practitioners.

Resource Allocation for Converged Mobile Multimedia Services (모바일 멀티미디어 융합 서비스를 위한 자원 할당 방법)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.45-54
    • /
    • 2012
  • Advances in mobile communication and digital video technology enable to commercialize converged multimedia services such as VoD in the mobile networks. Media convergence is evolving into U-Cloud and mobile IP-TV services constituted by high-speed mobile multimedia networks and integrated personal devices. This paper proposes a resource allocation scheme to guarantee QoS of converged mobile multimedia services, and simultaneously maximize legacy services in heterogeneous wireless networks. Performances are analyzed by the simulation.

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

The Design of Dynamic Fog Cloud System using mDBaaS

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • Cloud computing has evolved into a core computing infrastructure for the internet that encompasses content, as well as communications, applications and commerce. By providing powerful computing and communications capabilities in the palm of the hand everywhere with a variety of smart devices, mobile applications such as virtual reality, sensing and navigation have emerged and radically changed the patterns people live. The data that is generated is getting bigger. Cloud computing, on the other hand, has problems with system load and speed due to the collection, processing and control of remote data. To solve this problem, fog computing has been proposed in which data is collected and processed at an edge. In this paper, we propose a system that dynamically selects a fog server that acts as a cloud in the edge. It serves as a mediator in the cloud, and provides information on the services and systems belonging to the cloud to the mobile device so that the mobile device can act as a fog. When the role of the fog system is complete, we provide it to the cloud to virtualize the fog. The heterogeneous problem of data of mobile nodes can be solved by using mDBaaS (Mobile DataBase as a Service) and we propose a system design method for this.

A Comparative Study For Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 비교 연구)

  • Jang, Rae-Young;Jung, Sung-Jae;Bae, Yu-Mi;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.277-280
    • /
    • 2011
  • After the concept of Cloud Computing was first introduced, IT industry had focused on it. The Cloud Computing market is increasing as many major coporations have been participating in it. Now, the possibility of Mobile Cloud Computing has rising. Needless to say, the growth of Mobile Cloud Computing is explosive. Mobile industry changes its operational system from FeaturePhone to SmartPhone which are based on iPhone or Android. The number of Smart phone users in Korea exceeds 10 millions. Through this study, we will examine sorts and acctual situations of available domestic and international Mobile Cloud Computing Services in SmartPhone. Also, we will investigate the problems of current Mobile Cloud Computing and present the solutions.

  • PDF

Real-time Estimation and Analysis of Time-based Accessibility and Usability for Ubiquitous Mobile-Web Services

  • Kim, Yung-Bok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.938-958
    • /
    • 2011
  • Ubiquitous web services have been expanding in various business areas with the evolution of wireless Internet technologies, accessible and usable with a variety of mobile Internet devices such as smart phones. Ubiquitous mobile-web information services can be evaluated for accessibility and usability with the mobile Internet devices interacting with mobile-web information servers. In human mobile-web activity, a web server could be a unified center for mobile-web interaction services as well as for real-time estimation and analysis of mobile-web interaction sessions. We present a real-time estimation and analysis scheme for time-based accessibility and usability in ubiquitous mobile-web services. With real-time estimation/analysis of sessions in a mobile-web server, we estimated the time-based accessibility and usability for comparison between different web services as well as for applications in mobile cloud computing services. We present empirical results based on the implementation of the real-time estimation/analysis scheme.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

Pratical Offloading Methods and Cost Models for Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 실용적인 오프로딩 기법 및 비용 모델)

  • Park, Min Gyun;Zhe, Piao Zhen;La, Hyun Jung;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.73-85
    • /
    • 2013
  • As a way of augmenting constrained resources of mobile devices such as CPU and memory, many works on mobile cloud computing (MCC), where mobile devices utilize remote resources of cloud services or PCs, /have been proposed. A typical approach to resolving resource problems of mobile nodes in MCC is to offload functional components to other resource-rich nodes. However, most of the current woks do not consider a characteristic of dynamically changed MCC environment and propose offloading mechanisms in a conceptual level. In this paper, in order to ensure performance of highly complex mobile applications, we propose four different types of offloading mechanisms which can be applied to diverse situations of MCC. And, the proposed offloading mechanisms are practically designed so that they can be implemented with current technologies. Moreover, we define cost models to derive the most sutilable situation of applying each offloading mechanism and prove the performance enhancement through offloadings in a quantitative manner.

Emerging IT Services Model : Cloud Business Model, Focused on M-Pesa Case (새로운 IT 서비스 모델, 클라우드 비즈니스 모델 : M-Pesa 사례 분석)

  • Hahm, Yukun;Youn, Youngsoo;Kang, Hansoo;Kim, Jinsung
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.287-304
    • /
    • 2012
  • Cloud computing, which means a new way of deploying information technology(IT) in organizations as a service and charging per use, has a deep impact on organizations' IT accessibility, agility and efficiency of its usage. More than that, the emergence of cloud computing surpasses a mere technological innovation, making business model innovation possible. We call this innovation realized by could computing a cloud business model. This study develops a comprehensive framework of business model, first, and then defines and analyzes the cloud business model through this framework. This study also examines the case of M-Pesa mobile payment as a cloud business model in which a new value creation and profit realization schemes have been realized and industry value network has changed. Finally, this study discusses the business implications from this new business model.