• Title/Summary/Keyword: mobile computing environments

Search Result 349, Processing Time 0.023 seconds

Intergrating Security Model for Mobile-Grid (Mobile-Grid 환경에서의 통합 보안 모델)

  • Kang, Su-Youen;Lee, Sung-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

A Token-based Mutual Exclusion Algorithm in Mobile Computing Environments (모바일 컴퓨팅 환경에서의 토큰기반 상호배제 알고리즘)

  • Yang, Seung-Il;Lee, Tae-Gyu;Park, Sung-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.263-274
    • /
    • 2010
  • Mutual exclusion that applied on existing systems was designed for static distributed systems. but now computing environments are going to mobile computing environments. Therefore a mutual exclusion algorithm in static distributed environments should be designed for new computing environments. So this paper proposes a mobile mutual exclusion algorithm to support the mutual exclusion of shared resources in mobile computer environments. Mobile computing resources as wireless hosts cause new issues because of their mobility and weakness and made mutual exclusion problem more complex than stationary distributed environments. So we proposed a new mobile token mutual exclusion algorithm with deadlock-free and starvation-free in mobile computing environments based on spanning tree topology and extend for mobile computing environments. The proposed algorithm minimizes message complexity in case of free hopping in cellular networks.

Dynamic Scheduling Method for Cooperative Resource Sharing in Mobile Cloud Computing Environments

  • Kwon, Kyunglag;Park, Hansaem;Jung, Sungwoo;Lee, Jeungmin;Chung, In-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.484-503
    • /
    • 2016
  • Mobile cloud computing has recently become a new paradigm for the utilization of a variety of shared mobile resources via wireless network environments. However, due to the inherent characteristics of mobile devices, a limited battery life, and a network access requirement, it is necessary for mobile servers to provide a dynamic approach for managing mobile resources efficiently in mobile cloud computing environments. Since on-demand job requests occur frequently and the number of mobile devices is drastically increased in mobile cloud computing environments, a different mobile resource management method is required to maximize the computational power. In this paper, we therefore propose a cooperative, mobile resource sharing method that considers both the inherent properties and the number of mobile devices in mobile cloud environments. The proposed method is composed of four main components: mobile resource monitor, job handler, resource handler, and results consolidator. In contrast with conventional mobile cloud computing, each mobile device under the proposed method can be either a service consumer or a service provider in the cloud. Even though each device is resource-poor when a job is processed independently, the computational power is dramatically increased under the proposed method, as the devices cooperate simultaneously for a job. Therefore, the mobile computing power throughput is dynamically increased, while the computation time for a given job is reduced. We conduct case-based experiments to validate the proposed method, whereby the feasibility of the method for the purpose of cooperative computation is shown.

QoS guaranteed I-MRSVP Protocol for Supporting Integrated Mobility in Mobile Computing Environments (이동 컴퓨팅 환경에서 통합 이동성을 지원하는 QoS 보장형 I-MRSVP 프로토콜)

  • 박상윤;임동규;김원태;엄영익
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.388-403
    • /
    • 2003
  • RSVP was published as a resource reservation protocol to guarantee QoS for realtime applications in wired network environments. As mobile application services in wireless network environments are more popular, QoS guaranteeing problem becomes an important issue in mobile computing environments. Therefore, the researches about cooperation between RSVP and Mobile IP supporting mobility in mobile computing environments are activating today. In this paper, we propose I-MRSVP(Integrated-Mobile RSVP), a QoS guaranteed resource reservation protocol supporting the integrated mobility in mobile computing environments. I-MRSVP protocol supports the integrated mobility providing interoperability between Mobile IP-based macro cells and Cellular IP-based micro cells. To minimize resource reservation overheads, it provides efficient resource reservation functions by using the signal strength based predictive resource reservation scheme.

Analyses of Wireless Network Security in Heterogeneous Environments (이종 시스템 환경하에서의 무선 네트워크의 보안 대책)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.717-720
    • /
    • 2007
  • With the convergence of mobile devices and the Internet ubiquitous computing promises to revolutionalize the way that we access services and run application. However, ubiquitous computing environments, in particular, mobile and wireless environments interfaced with the Internet, currently possess security vulnerabilities that are ripe for attack from cyber-threats. Thus, this paper discusses the Limitation of current security mechanisms in ubiquitous computing environments

  • PDF

User Mobility Model Based Computation Offloading Decision for Mobile Cloud

  • Lee, Kilho;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.3
    • /
    • pp.155-162
    • /
    • 2015
  • The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are becoming more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as a desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to choose good offloading decisions in mobile environments. In general, users' mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision-making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation results show that the proposed technique can help boost the performance of mobile devices in terms of response time and energy consumption, when users are highly mobile.

Analysis of Optimistic Cache Protocols based on broadcasting for Mobile Computing Environments (이동 컴퓨팅 환경에서 방송기반의 낙관적 캐쉬 프로토콜들에 대한 분석)

  • Cho, Sung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.177-185
    • /
    • 2005
  • Caching in mobile computing environments Is an important technique that will reduce the effects such as limitation of bandwidth, restriction of resources and frequent disconnection. To reduce limitation and disconnection problems in mobile computing, a new form of caching system have been proposed based on a broadcast approach. This paper proposes a broadcast based cache protocol and examines the behaviors of the proposed scheme and well known schemes such as multiversion based scheme and Certification Reports. By a detailed simulation, we show some characteristics of different approaches to detect and resolve conflicts. We also show proposed scheme out performs other schemes with a low space and operation overhead.

  • PDF

A Dynamic Packet Recovery Mechanism for Realtime Service in Mobile Computing Environments

  • Park, Kwang-Roh;Oh, Yeun-Joo;Lim, Kyung-Shik;Cho, Kyoung-Rok
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.356-368
    • /
    • 2003
  • This paper analyzes the characteristics of packet losses in mobile computing environments based on the Gilbert model and then describes a mechanism that can recover the lost audio packets using redundant data. Using information periodically reported by a receiver, the sender dynamically adjusts the amount and offset values of redundant data with the constraint of minimizing the bandwidth consumption of wireless links. Since mobile computing environments can be often characterized by frequent and consecutive packet losses, loss recovery mechanism need to deal efficiently with both random and consecutive packet losses. To achieve this, the suggested mechanism uses relatively large, discontinuous exponential offset values. That gives the same effect as using both the sequential and interleaving redundant information. To verify the effectiveness of the mechanism, we extended and implemented RTP/RTCP and applications. The experimental results show that our mechanism, with an exponential offset, achieves a remarkably low complete packet loss rate and adapts dynamically to the fluctuation of the packet loss pattern in mobile computing environments.

  • PDF

A Monitoring Scheme Based on Artificial Intelligence in Mobile Edge Cloud Computing Environments (모바일 엣지 클라우드 환경에서 인공지능 기반 모니터링 기법)

  • Lim, JongBeom;Choi, HeeSeok;Yu, HeonChang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.27-32
    • /
    • 2018
  • One of the crucial issues in mobile edge cloud computing environments is to monitor mobile devices. Due to the inherit properties of mobile devices, they are prone to unstable behavior that leads to failures. In order to satisfy the service level agreement (SLA), the mobile edge cloud administrators should take appropriate measures through a monitoring scheme. In this paper, we propose a monitoring scheme of mobile devices based on artificial intelligence in mobile edge cloud computing environments. The proposed monitoring scheme is able to measure faults of mobile devices based on previous and current monitoring information. To this end, we adapt the hidden markov chain model, one of the artificial intelligence technologies, to monitor mobile devices. We validate our monitoring scheme based on the hidden markov chain model. The proposed monitoring scheme can also be used in general cloud computing environments to monitor virtual machines.

The Patterns of Mobile Internet Service for Post PCs in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 포스트 PC의 모바일 인터넷 서비스 유형)

  • Kim, In-Jai;Shim, Hyoung-Seop;Jung, Min-Ho
    • Journal of Information Technology Services
    • /
    • v.6 no.3
    • /
    • pp.179-193
    • /
    • 2007
  • Mobile Internet Service has been accelerated in ubiquitous computing environment. The purpose of this study is to suggest the patterns of mobile internet services based upon the current and future environments. The types of mobile internet service are explicated on the basis of current and future usage. A two-dimensional framework using level of timeliness and service purpose is utilized for classifying mobile internet service. Future trends of mobile internet service are carefully suggested.