SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895
AN OVERVIEW ON MOBILE CLOUD COMPUTING
Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4
1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Given the advances in mobile telephones, users
start to consider a mobile phone a personal information
processing tool. So users wanted various operations be
performed on the top of mobile devices. Researchers havelong
acknowledged that mobile hardware is necessarily resource-
poor on static client and server hardware. Mobile cloud
computing (MCC) Which combines mobile computing and
cloud computing is a good result for this problem and has
become one of the industry buzz words and a major discussion
topic since 2009.This paper presents a review of the
background, security and open issues in mobile cloud
computing.
Key Words: mobile cloud computing, partitioning,
augmentation.
1. INTRODUCTION
The increasing use of mobile phones is clear from the study
from Juniper Research, which states that the consumer and
enterprise market for cloud-based mobile
applications expected to increase to $9.5 billion by 2014. In
recent years, applications targeted at mobile devices have
started becoming abundant with applications in various
categories such as amusement, social networking, travel,
health, games, business and news. The popularity in the
mobile computing are clear by browsing throughmobileapp
download centers such as Apple's iTunes or Nokia's Ovi
suite. The ground for the mobile cloud computing is that
mobile computing is able to offer a tool to the user whenand
where it is a needed irrespective of user movement, hence
supporting location independence. Indeed, 'mobility' is one
of the important features of a permeating computing
environment where the user is able to continue his/her
work flawless careless of his/her cause. These place the
problem of executing many useful programs that could aid
the user and create a pervasive environment. According to
Tim O'Reilly 'the future of mobility belongs to services that
respond in real-time to information that are supplied either
by nonhuman sensors or by their users. Real time
application demands intensive computing resources to one
character of mobile applications that demand high levels of
reactivity. Location-based social networking process in
mobile applications makesuse of the phone'svarioussensor
data. Nevertheless, extensive use of sensors, such as
obtaining a GPS reading, isexpensive in terms of energy and
this limits the mobile phone in providing the user a better
service through its embedded sensors. Furthermore,
consider applications that call for extensive processing -
image processing for video games, speech synthesis, natural
language processing, augmented reality, wearable
computing-all these demand high computational capacities
thusrestricting the developersin implementingapplications
for mobile telephone sets. problems will be solved in the
future by considering the trends in mobile phone
architecture and battery. This is, in fact, not merely a
temporary technological deficiency, but intrinsictomobility,
and a barrier that needs to overcome to actualized the full
potential of mobile computing. [2].
Fig:1 Mobile cloud computing architecture
2. MOBILE CLOUD COMPUTING BACKGROUND
Today, both hardware and software of mobile devices get
more capital improvementsthan before, somesmartphones
such as I Phones, Android serials, window mobile phones
and blackberry, are no longer just traditional mobile phones
with the conversation, SMS, Email and website browser, but
are daily necessities to the user. Still, at any given cost and
level of technology, considerations such as weight, size,
battery life, ergonomics and heat dissipation exact a severe
penalty in computational resourcessuch as processorspeed,
storage size, and disk capacity. Thus, three approaches are
aimed for mobile cloud applications:
1. Extending out the access to cloud services to mobile
devices. In this approach users use mobile devices often
through web browsers, to use software/applications as
services extended by cloud. The mobile cloud is most often
viewed as a Software-as-a-service (SaaS) Cloud and all the
computation and data treatment are usually performed in
the swarm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896
2. Enabling mobile devices to act collaboratively as cloud
resource providers. This approach makesuseoftheresource
at personal mobile devices to give a virtual mobile cloud,
which is useful in an ad hoc networking environment
without function of internet cloud.
3. Portable devices using cloud resources are augmented by
the execution of mobile applications. This attack uses the
cloud storage and processing for applications working on
mobile devices. The mobile cloud is thought as an
Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service
(PaaS) cloud. In this partial offloading of computation and
data warehousing is done to clod from the mobile devices
[1].
Fig:2 Cloud Computing Framework
3. ARCHITECTURE
With mobile cloud computing, mobile network and cloud
computing joined, thereby providing an ideal service for
mobile customers. Cloud computing exists when tasks and
data retained on each device. Applications run on a remote
server and then shipped to the client. Here the mobile
devices connect to the mobile networks through the base
stations; they will set up and manipulatetheconnections(air
interface) And functional interfaces between the mobile
networks and fluid devices. Mobile users send service
requests to the cloud through a WWW browser or desktop
application. The information is transmitted to the central
processors that tied to the serversprovidingmobilenetwork
services. Here, services like AAA (Authentication,
Authorization and Accounting) can store subscriber data in
databases and can offer the users based on Home Agent
(HA). The request of the subscriber is then saved to the
internet. Cloud controllerspresent in the cloud, providesthe
request to the mobile users with the corresponding cloud
services. These services originated based on the concepts of
utility computing, virtualization and service-oriented
architecture. The major use of a cloud computing system is
storing data in the cloud and using technology on the client
to use that data. Various business models rapidly evolved to
harnessthis technology by providing software applications,
programming platforms, data-storage, computing
infrastructure and hardware as services. [3]
Fig:3 Mobile Cloud Computing Architecture
4. SECURITY ISSUES
Many sources have presented classifications of security
issues in communication networks. There are five central
goals of security of information system.
 Confidentiality: preventingunauthorizedusersfrom
gaining admission to critical information of any
particular user.
 Integrity: Ensuresunauthorizedchange,destruction
or creation of information cannot take space.
 Availability: Ensuring authorized users getting the
access they need.
 Legitimate: Ensuring that only authorized users
receive access to services.
 Accountability: Ensuring that the users are held
responsible for their security related activities by
arranging the user and his/her body processes
linked if and when necessary. The way these goals
achieved depends on the security policy adoptedby
the service providers.[4]
5. SECURITY COUNTERMEASURES
Secure mobile computing is critical in evolution any
application of wireless networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897
5.1 Security Requirements
Similar to traditional networks, the goalsof securing mobile
computing can delimited by the following attributes:
availability, confidentiality, integrity, authenticity and non-
repudiation.
 Availability: ensures that the intended network
services are available when the intended
parties required.
 Confidentiality: ensuresthat the intended receivers
can use the data and is never revealed to
unauthorized entities.
 Authenticity: allowsa user to find out identityofthe
entity it is communicating with. Without
certification, an adversary can masquerade a
legitimate user, thusgaining unauthorizedaccessto
resources and sensitive information andinterfering
with operation of users.
 Integrity: guarantees that data is never corrupted
during transmission. But the authorized partiescan
change it.
 Non-repudiation: ensures that an entity can prove
the transmission or reception of information from
another entity, i.e., a sender/receiver cannot falsely
deny having received or sent certain data. [4]
6. OPEN ISSUES IN MOBILE CLOUD COMPUTING
There are some issues occurred while implementing the
cloud computing for mobile. These topics can related to
networking, related to limited resources, related to security
of mobile users and clouds. Some subjects explained as
follows:
 LIMITED RESOURCES: having limited resources in
mobile devices makes use of cloud computing in
mobile devices difficult. Basic limitations related to
limited computing power, limitedresources,limited
battery, and low of quality display.
 NETWORK RELATED ISSUES: All processinginMCC
performed along the network. Thus there are some
issues related to the network like bandwidth,
latency, availability and heterogeneity.
 SECURITY: Mobile devices also have to face a
number of troubles related to security and privacy.
To master this problem threat detection services is
now performed at the clouds, but this also has to
face many challenges. There are so many security
threats like, hacking, viruses, Trojan horses in
mobile devices also. The role of global positioning
system (GPS) in mobile devices gives birth to the
privacy issues.
 LOW BANDWIDTH: Bandwidth is one of the big
events at MCC since the radio resource for wireless
networks is much scarce as compared with the
traditional wired networks.
 AVAILABILITY: In MCC service availabilitybecomes
more important issue than that in the cloud
computing with wired networks. Mobile phone
users may not able to link up to the cloud to get
service due to network failures, traffic congestion
and the out-of-signal. [5]
7. CONCLUSION
Mobile Cloud Computing is one of the technology trends in
the fourth coming processas it unitesthe advantagesofboth
cloud computing and mobile computing, and hence
providing optimal services. MCC offers more possibilitiesfor
access services in a convenient way. It is anticipated that
after some more years the number of mobile users will be
using cloud computing on their mobile devices. This report
has provided an overview of mobile cloud computing in
which itsdefinitions, architecture, existingworkapplication,
advantages and challenges have presented. [5]
REFERENCES
[1] Nitesh Kaushik, Gaurav, Jitender Kumar ,”
A Literature Survey on Mobile Cloud Computing: Open
Issues and Future Directions” International Journal Of
Engineering And Computer ScienceISSN:2319-7242Volume
3 Issue 5 may, 2014 Page No. 6165-6172
[2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile
Cloud Computing” Volume 4, No. 10, September-October
2013, ISSN No. 0976-5697 , International Journal of
Advanced Research in Computer Science
[3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile
Cloud Computing Architecture, ApplicationsandChallenges”
International Journal of Scientific Research Engineering &
Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6,
September 2014
[4] T.Balasubramanian” MobileComputing–AnIntroduction
With Issues In Mobile Security” International Journal of
Review and Research in Applied Sciences and Engineering,
Vol.7 No.1 2015, ISSN: 2231-0061
[5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile
Cloud Computing for Smart Phones” International Journalof
Science, Engineering and Technology Research (IJSETR),
Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798
Ad

Recommended

IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
40120130405016
40120130405016
IAEME Publication
 
Smart Computing Mobile Cloud
Smart Computing Mobile Cloud
ijtsrd
 
20120130406025
20120130406025
IAEME Publication
 
IRJET - Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
IRJET Journal
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1
ChetanShahukari
 
Cloud computing in indian perspective
Cloud computing in indian perspective
Ajit Kumar
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
Mobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
TELKOMNIKA JOURNAL
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Mcc
Mcc
9881452223
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
 
Mobile-Cloud Computing
Mobile-Cloud Computing
Kamal Patel
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Dr Sukhpal Singh Gill
 
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 
Securing io t_with_aws
Securing io t_with_aws
MichaelRodriguesdosS1
 
Mobile cloud computing
Mobile cloud computing
Fatih Özlü
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
 
Details About Mobile Cloud Computing
Details About Mobile Cloud Computing
vaishnavi_sv
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 

More Related Content

What's hot (20)

Cloud computing in indian perspective
Cloud computing in indian perspective
Ajit Kumar
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
Mobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
TELKOMNIKA JOURNAL
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Mcc
Mcc
9881452223
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
 
Mobile-Cloud Computing
Mobile-Cloud Computing
Kamal Patel
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Dr Sukhpal Singh Gill
 
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 
Securing io t_with_aws
Securing io t_with_aws
MichaelRodriguesdosS1
 
Mobile cloud computing
Mobile cloud computing
Fatih Özlü
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
 
Cloud computing in indian perspective
Cloud computing in indian perspective
Ajit Kumar
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
Mobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
Lightweight IoT middleware for rapid application development
Lightweight IoT middleware for rapid application development
TELKOMNIKA JOURNAL
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
 
Mobile-Cloud Computing
Mobile-Cloud Computing
Kamal Patel
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Dr Sukhpal Singh Gill
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 
Mobile cloud computing
Mobile cloud computing
Fatih Özlü
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
 

Similar to IRJET- An Overview on Mobile Cloud Computing (20)

Details About Mobile Cloud Computing
Details About Mobile Cloud Computing
vaishnavi_sv
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
James Heller
 
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
Prashanth Reddy
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
A survey of mobile cloud computing Architecture, applications, and approache...
A survey of mobile cloud computing Architecture, applications, and approache...
Brittany Allen
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
Cloud_Computing.pptx
Cloud_Computing.pptx
Yash771676
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloud
amelpakkath
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
Thuy An Dang
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Yashank Pratap Singh
 
Mobile Cloud Computing1 informatique.pptx
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
Details About Mobile Cloud Computing
Details About Mobile Cloud Computing
vaishnavi_sv
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
James Heller
 
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
Prashanth Reddy
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
A survey of mobile cloud computing Architecture, applications, and approache...
A survey of mobile cloud computing Architecture, applications, and approache...
Brittany Allen
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
Cloud_Computing.pptx
Cloud_Computing.pptx
Yash771676
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloud
amelpakkath
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
Thuy An Dang
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Yashank Pratap Singh
 
Mobile Cloud Computing1 informatique.pptx
Mobile Cloud Computing1 informatique.pptx
ChouaibBakh
 
Ad

More from IRJET Journal (20)

Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

chemistry investigatory project for class 12
chemistry investigatory project for class 12
Susis10
 
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Yannis
 
The basics of hydrogenation of co2 reaction
The basics of hydrogenation of co2 reaction
kumarrahul230759
 
Low Power SI Class E Power Amplifier and Rf Switch for Health Care
Low Power SI Class E Power Amplifier and Rf Switch for Health Care
ieijjournal
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Development of Portable Biomass Briquetting Machine (S, A & D)-1.pptx
Development of Portable Biomass Briquetting Machine (S, A & D)-1.pptx
aniket862935
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
3. What is the principles of Teamwork_Module_V1.0.ppt
3. What is the principles of Teamwork_Module_V1.0.ppt
engaash9
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Structural Design for Residential-to-Restaurant Conversion
Structural Design for Residential-to-Restaurant Conversion
DanielRoman285499
 
Engineering Mechanics Introduction and its Application
Engineering Mechanics Introduction and its Application
Sakthivel M
 
Water demand - Types , variations and WDS
Water demand - Types , variations and WDS
dhanashree78
 
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
João Esperancinha
 
COMPOSITE COLUMN IN STEEL CONCRETE COMPOSITES.ppt
COMPOSITE COLUMN IN STEEL CONCRETE COMPOSITES.ppt
ravicivil
 
chemistry investigatory project for class 12
chemistry investigatory project for class 12
Susis10
 
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Yannis
 
The basics of hydrogenation of co2 reaction
The basics of hydrogenation of co2 reaction
kumarrahul230759
 
Low Power SI Class E Power Amplifier and Rf Switch for Health Care
Low Power SI Class E Power Amplifier and Rf Switch for Health Care
ieijjournal
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Development of Portable Biomass Briquetting Machine (S, A & D)-1.pptx
Development of Portable Biomass Briquetting Machine (S, A & D)-1.pptx
aniket862935
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
3. What is the principles of Teamwork_Module_V1.0.ppt
3. What is the principles of Teamwork_Module_V1.0.ppt
engaash9
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Structural Design for Residential-to-Restaurant Conversion
Structural Design for Residential-to-Restaurant Conversion
DanielRoman285499
 
Engineering Mechanics Introduction and its Application
Engineering Mechanics Introduction and its Application
Sakthivel M
 
Water demand - Types , variations and WDS
Water demand - Types , variations and WDS
dhanashree78
 
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
João Esperancinha
 
COMPOSITE COLUMN IN STEEL CONCRETE COMPOSITES.ppt
COMPOSITE COLUMN IN STEEL CONCRETE COMPOSITES.ppt
ravicivil
 

IRJET- An Overview on Mobile Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895 AN OVERVIEW ON MOBILE CLOUD COMPUTING Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4 1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India 2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Given the advances in mobile telephones, users start to consider a mobile phone a personal information processing tool. So users wanted various operations be performed on the top of mobile devices. Researchers havelong acknowledged that mobile hardware is necessarily resource- poor on static client and server hardware. Mobile cloud computing (MCC) Which combines mobile computing and cloud computing is a good result for this problem and has become one of the industry buzz words and a major discussion topic since 2009.This paper presents a review of the background, security and open issues in mobile cloud computing. Key Words: mobile cloud computing, partitioning, augmentation. 1. INTRODUCTION The increasing use of mobile phones is clear from the study from Juniper Research, which states that the consumer and enterprise market for cloud-based mobile applications expected to increase to $9.5 billion by 2014. In recent years, applications targeted at mobile devices have started becoming abundant with applications in various categories such as amusement, social networking, travel, health, games, business and news. The popularity in the mobile computing are clear by browsing throughmobileapp download centers such as Apple's iTunes or Nokia's Ovi suite. The ground for the mobile cloud computing is that mobile computing is able to offer a tool to the user whenand where it is a needed irrespective of user movement, hence supporting location independence. Indeed, 'mobility' is one of the important features of a permeating computing environment where the user is able to continue his/her work flawless careless of his/her cause. These place the problem of executing many useful programs that could aid the user and create a pervasive environment. According to Tim O'Reilly 'the future of mobility belongs to services that respond in real-time to information that are supplied either by nonhuman sensors or by their users. Real time application demands intensive computing resources to one character of mobile applications that demand high levels of reactivity. Location-based social networking process in mobile applications makesuse of the phone'svarioussensor data. Nevertheless, extensive use of sensors, such as obtaining a GPS reading, isexpensive in terms of energy and this limits the mobile phone in providing the user a better service through its embedded sensors. Furthermore, consider applications that call for extensive processing - image processing for video games, speech synthesis, natural language processing, augmented reality, wearable computing-all these demand high computational capacities thusrestricting the developersin implementingapplications for mobile telephone sets. problems will be solved in the future by considering the trends in mobile phone architecture and battery. This is, in fact, not merely a temporary technological deficiency, but intrinsictomobility, and a barrier that needs to overcome to actualized the full potential of mobile computing. [2]. Fig:1 Mobile cloud computing architecture 2. MOBILE CLOUD COMPUTING BACKGROUND Today, both hardware and software of mobile devices get more capital improvementsthan before, somesmartphones such as I Phones, Android serials, window mobile phones and blackberry, are no longer just traditional mobile phones with the conversation, SMS, Email and website browser, but are daily necessities to the user. Still, at any given cost and level of technology, considerations such as weight, size, battery life, ergonomics and heat dissipation exact a severe penalty in computational resourcessuch as processorspeed, storage size, and disk capacity. Thus, three approaches are aimed for mobile cloud applications: 1. Extending out the access to cloud services to mobile devices. In this approach users use mobile devices often through web browsers, to use software/applications as services extended by cloud. The mobile cloud is most often viewed as a Software-as-a-service (SaaS) Cloud and all the computation and data treatment are usually performed in the swarm.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896 2. Enabling mobile devices to act collaboratively as cloud resource providers. This approach makesuseoftheresource at personal mobile devices to give a virtual mobile cloud, which is useful in an ad hoc networking environment without function of internet cloud. 3. Portable devices using cloud resources are augmented by the execution of mobile applications. This attack uses the cloud storage and processing for applications working on mobile devices. The mobile cloud is thought as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud. In this partial offloading of computation and data warehousing is done to clod from the mobile devices [1]. Fig:2 Cloud Computing Framework 3. ARCHITECTURE With mobile cloud computing, mobile network and cloud computing joined, thereby providing an ideal service for mobile customers. Cloud computing exists when tasks and data retained on each device. Applications run on a remote server and then shipped to the client. Here the mobile devices connect to the mobile networks through the base stations; they will set up and manipulatetheconnections(air interface) And functional interfaces between the mobile networks and fluid devices. Mobile users send service requests to the cloud through a WWW browser or desktop application. The information is transmitted to the central processors that tied to the serversprovidingmobilenetwork services. Here, services like AAA (Authentication, Authorization and Accounting) can store subscriber data in databases and can offer the users based on Home Agent (HA). The request of the subscriber is then saved to the internet. Cloud controllerspresent in the cloud, providesthe request to the mobile users with the corresponding cloud services. These services originated based on the concepts of utility computing, virtualization and service-oriented architecture. The major use of a cloud computing system is storing data in the cloud and using technology on the client to use that data. Various business models rapidly evolved to harnessthis technology by providing software applications, programming platforms, data-storage, computing infrastructure and hardware as services. [3] Fig:3 Mobile Cloud Computing Architecture 4. SECURITY ISSUES Many sources have presented classifications of security issues in communication networks. There are five central goals of security of information system.  Confidentiality: preventingunauthorizedusersfrom gaining admission to critical information of any particular user.  Integrity: Ensuresunauthorizedchange,destruction or creation of information cannot take space.  Availability: Ensuring authorized users getting the access they need.  Legitimate: Ensuring that only authorized users receive access to services.  Accountability: Ensuring that the users are held responsible for their security related activities by arranging the user and his/her body processes linked if and when necessary. The way these goals achieved depends on the security policy adoptedby the service providers.[4] 5. SECURITY COUNTERMEASURES Secure mobile computing is critical in evolution any application of wireless networks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897 5.1 Security Requirements Similar to traditional networks, the goalsof securing mobile computing can delimited by the following attributes: availability, confidentiality, integrity, authenticity and non- repudiation.  Availability: ensures that the intended network services are available when the intended parties required.  Confidentiality: ensuresthat the intended receivers can use the data and is never revealed to unauthorized entities.  Authenticity: allowsa user to find out identityofthe entity it is communicating with. Without certification, an adversary can masquerade a legitimate user, thusgaining unauthorizedaccessto resources and sensitive information andinterfering with operation of users.  Integrity: guarantees that data is never corrupted during transmission. But the authorized partiescan change it.  Non-repudiation: ensures that an entity can prove the transmission or reception of information from another entity, i.e., a sender/receiver cannot falsely deny having received or sent certain data. [4] 6. OPEN ISSUES IN MOBILE CLOUD COMPUTING There are some issues occurred while implementing the cloud computing for mobile. These topics can related to networking, related to limited resources, related to security of mobile users and clouds. Some subjects explained as follows:  LIMITED RESOURCES: having limited resources in mobile devices makes use of cloud computing in mobile devices difficult. Basic limitations related to limited computing power, limitedresources,limited battery, and low of quality display.  NETWORK RELATED ISSUES: All processinginMCC performed along the network. Thus there are some issues related to the network like bandwidth, latency, availability and heterogeneity.  SECURITY: Mobile devices also have to face a number of troubles related to security and privacy. To master this problem threat detection services is now performed at the clouds, but this also has to face many challenges. There are so many security threats like, hacking, viruses, Trojan horses in mobile devices also. The role of global positioning system (GPS) in mobile devices gives birth to the privacy issues.  LOW BANDWIDTH: Bandwidth is one of the big events at MCC since the radio resource for wireless networks is much scarce as compared with the traditional wired networks.  AVAILABILITY: In MCC service availabilitybecomes more important issue than that in the cloud computing with wired networks. Mobile phone users may not able to link up to the cloud to get service due to network failures, traffic congestion and the out-of-signal. [5] 7. CONCLUSION Mobile Cloud Computing is one of the technology trends in the fourth coming processas it unitesthe advantagesofboth cloud computing and mobile computing, and hence providing optimal services. MCC offers more possibilitiesfor access services in a convenient way. It is anticipated that after some more years the number of mobile users will be using cloud computing on their mobile devices. This report has provided an overview of mobile cloud computing in which itsdefinitions, architecture, existingworkapplication, advantages and challenges have presented. [5] REFERENCES [1] Nitesh Kaushik, Gaurav, Jitender Kumar ,” A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions” International Journal Of Engineering And Computer ScienceISSN:2319-7242Volume 3 Issue 5 may, 2014 Page No. 6165-6172 [2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile Cloud Computing” Volume 4, No. 10, September-October 2013, ISSN No. 0976-5697 , International Journal of Advanced Research in Computer Science [3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile Cloud Computing Architecture, ApplicationsandChallenges” International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 [4] T.Balasubramanian” MobileComputing–AnIntroduction With Issues In Mobile Security” International Journal of Review and Research in Applied Sciences and Engineering, Vol.7 No.1 2015, ISSN: 2231-0061 [5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile Cloud Computing for Smart Phones” International Journalof Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798