Vous êtes sur la page 1sur 5

Submitted by

Term paper
Context aware of mobile cloud computing

Submitted to
Neha bassan
Introduction crucial requirement for unleashing the power
of mobile computing towards unrestricted
Mobile Cloud Computing (MCC) is the ubiquitous computing.
combination of cloud computing, mobile
computing and wireless networks to bring Energy-efficient transmission: MCC requires
rich computational resources to mobile users, frequent transmissions between cloud
network operators, as well as cloud platform and mobile devices, due to the
computing providers.[1][2][3] The ultimate stochastic nature of wireless networks, the
goal of MCC is to enable execution of rich transmission protocol should be carefully
mobile applications on a plethora of mobile designed.[12][13]
devices, with a rich user experience.[4] MCC
provides business opportunities for mobile Context-awareness issues: Context-aware
network operators as well as cloud and socially-aware computing are
providers.[5][6] More comprehensively, inseparable traits of contemporary handheld
MCC can be defined as "a rich mobile computers. To achieve the vision of mobile
computing technology that leverages unied computing among heterogeneous converged
elastic resources of varied clouds and networks and computing devices, designing
network technologies toward unrestricted resource-efcient environment-aware
functionality, storage, and mobility to serve a applications is an essential need.
multitude of mobile devices anywhere,
anytime through the channel of Ethernet or Live VM migration issues: Executing
Internet regardless of heterogeneous resource-intensive mobile application via
environments and platforms based on the Virtual Machine (VM) migration-based
pay-as-you-use principle application ofoading involves encapsulation
of application in VM instance and migrating
In the MCC landscape, an amalgam of
mobile computing, cloud computing, and it to the cloud, which is a challenging task due
communication networks (to augment to additional overhead of deploying and
smartphones) creates several complex managing VM on mobile devices.
challenges such as Mobile Computation
Offloading, Seamless Connectivity, Long Mobile communication congestion
WAN Latency, Mobility Management, issues: Mobile data trafc is tremendously
Context-Processing, Energy Constraint, hiking by ever increasing mobile user
Vendor/data Lock-in, Security and demands for exploiting cloud resources
Privacy,[11] Elasticity that hinder MCC which impact on mobile network operators
success and adoption.[5][7] and demand future efforts to enable smooth
Open research issues[edit] communication between mobile and cloud
Although significant research and endpoints.
development in MCC is available in the
literature, efforts in the following domains is Trust, security, and privacy issues: Trust is an
still lacking:[3][7] essential factor for the success of the
burgeoning MCC paradigm. It is because the
Architectural issues: A reference architecture data along with
for heterogeneous MCC environment is a code/component/application/complete VM is
offloaded to the cloud for execution. Advantages of MCC
Moreover, just like software and mobile
application piracy, the MCC application Mobile applications leverage remote
development models are also affected by the processing, extending battery lifetime
piracy issue.[14] Pirax[14] is known to be the
first specialized framework for controlling MCC enables mobile users to store and
application piracy in MCC environment. access large data on the cloud. Mobile
Moblie computing applications are no longer constrained by
the storage capacity of the device.
Cloud computing is the trend in which
resources are provided to a local client on an Keeping data and applications in the cloud
on-demand basis, usually by means of the reduces the potential for loss of data in the
internet. Mobile cloud computing (MCC) is event of a hardware failure, improving
simply cloud computing in which at least reliability and availability
some of the devices involved are mobile.
This paper goes over multiple techniques and MCC can be designed with a
methods for mobile cloud computing. It
comprehensive data security model for
explores both general-purpose mobile cloud
both service providers and users by
computing solutions and application-specific
solutions. It also discusses instances of allowing protected copyrighted digital
mobile cloud computing where mobile contents in the cloud. MCC providers have
devices serve as the cloud rather than the security services in place such as virus
client. Finally it discusses some issues raised scanning, malicious code detection and
by this technology such as privacy and data authentication for mobile users
ownership.
The data and services in the cloud are
always available even when the users are
moving from place to place

Sharing data in the Cloud provides the user


with access to the latest documentation
even while on the goMobile applications
can be scaled to meet the growing user
demands

Service providers can easily add and


expand their service offerings

Multiple services from different providers


Keywords: "Cloud computing, Mobile cloud can be integrated easily through the cloud
computing, smartphones, mobile to meet todays complex user demands
applications
Cloud Apps in Your Mobile
Googles Gmail and Google Voice for remote data and service. In order
iPhone are just two of the well-known mobile t o e n a b l e a p p l i c a t i o n s a n d s ys t e m s
cloud apps. Mobile cloud computing is t o c o n t i n u e t o o p e r a t e i n s u c h d yn a
referred to as the infrastructure where both m-ic environments, mobile cloud
the data storage and the data processing applications must react with dynamical
happen outside of the mobile device. From a adjusting of the computing
consumers point-of-view, a cloud-based functionality between the mobile
mobile application is similar to an app device and cloud depending on
purchased or downloaded from a mobile circumstances. In other words, the
application store like iTunes, where the computation o f clients and
processing power is driven not from the cloud has to be daptive in resp
handheld device, but from the cloud. When onse t o t h e changes in mobile
launched from the iPhone homescreen, the environments .
apps perform like any other app on the Mobile cloud computing could be
iPhone.Online Applications.An online described as the avail -ability of
application assumes that the cloud computing services in a
connection between mobile devices and m o b i l e e c o s ys t e m , i.e. world wide
backend systems is available most of distributed storage system, exceed
the time. Smartphones are popular due traditionalmobile device capabilities,
to the power and utility of their and ofoad processing, storageand
applications, but there are problems such as security. To leverage the full potential
cross-platformissues. Here Web technologies of mobile cloud computing we need to
can overcome them; applications based on consider the capabilities and
Web technology are a powerful constraints of existing architectures.
alternative to native applications. A. Augmented Execution
Mobile have the potential to overcome Augmented execution refers to a technique
some of the disadvantages of ofine used to overcomethe limitations of
applications because they are: smartphones in terms of computation,
multi-platform directly accessible from memoryand battery. Chun and Maniatis [14]
anywhere knowledge web propose an architecture that
technologies are wide
s p r e a d i n g a m o n g developers, greatly
minimizing the learning curve required to
start creating mobile applicationsHowever,
mobile .

C. Issues with Ofine and Online


Mobile Applications
Current applications are statically
partitioned, i.e. most of the execution
happens on the device or on backend
systems.
However, mobile clients could face
wide variations and rapid
changes in network conditions and local
resource availabilityw h e n a c c e s s i n g
Security identification of threats
phones, and so on, and radically
Essentially securing an Information System changing the way enterprises manage IT.
(IS), involves identifying unique threats and
challenges which need to be addressed by Yes, plenty of questions are still left to be
implementing the appropriate answered regarding security within the
countermeasures. Ultimately, the identified
security requirements and selected security cloud and how customers and cloud
controls are introduced to the standard service providers (CSPs) will manage
systems engineering process, to effectively
issues and expectations, but it would be a
integrate the security controls with the
information systems functional and severe understatement to say simply that
operational requirements, as well as other cloud computing has generated interest
in the marketplace.

The hype regarding cloud computing is


unavoidable. It has caught the
imagination of consumers, businesses,
financial analysts, and of course, the
CSPs themselves. Search for cloud
computing on the Internet and you will
uncover thousands of articles defining it,
praising it, ridiculing it, and selling it.

Conclusion

As we have noted throughout this book,


cloud computing has the potential to be a
disruptive force by affecting the
deployment and use of technology. The
cloud could be the next evolution in the
history of computing, following in the
footsteps of mainframes,
minicomputers, PCs, servers, smart

Vous aimerez peut-être aussi