An Overture of Mobile Cloud Computing and its Applications

D. R. Robert Joan*
Assistant Professor, Mathematics Education, Christian College of Education, Marthandam, Tamil Nadu, India.
Periodicity:August - October'2014
DOI : https://doi.org/10.26634/jcc.1.4.3190

Abstract

In this article, the author presents some information related to Mobile cloud computing and its applications. Mobile Cloud Computing is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. Mobile cloud computing at its simplest refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. From various studies, the author concludes that mobile cloud computing provides data storage, processing services in clouds at low cost and elastically in an on-demand fashion. It also provides security architecture when mobile devices integrate with cloud. Some of the mobile cloud computing applications are mobile healthcare, mobile commerce, mobile learning, mobile gaming, social networks like twitter and facebook, booking applications for travel and shopping. Cloud services such as guiding their trip, showing maps, recording itinerary, and storing images and video are also in the mobile devices.

Keywords

Mobile Cloud, Mobile Cloud Computing, Mobile Cloud Computing Architecture, Mobile Cloud Computing Applications, Security in Mobile Cloud Computing, Mobile User Security Approaches, Mobile Service Clouds.

How to Cite this Article?

Joan, D. R. R. (2014). An Overture of Mobile Cloud Computing and its Applications. i-manager’s Journal on Cloud Computing, 1(4), 11-18. https://doi.org/10.26634/jcc.1.4.3190

References

[1]. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2013). “Cloud-Based Augmentation for Mobile Devices : Motivation, Taxonomies, and Open Challenges”, IEEE Communications Surveys & Tutorials, pp. 1–32. doi:10.1109/SURV.2013.070813.00285.
[2]. Chen, X., Liu, J., Han, J., & Xu, H. (2010). “Primary Exploration of Mobile Learning Mode under a Cloud Computing Environment ”, Proceedings of the International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT), Vol. 2, pp. 484-487.
[3]. Dai, J. & Zhou, Q. (2010). “A PKI-based mechanism for secure and efficient access to outsourced data”, Proceedings of the 2nd International Conference on Networking and Digital Society, Vol. 1, pp. 640.
[4]. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2010). “A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches”, The School of Computer Engineering, Nanyang Technological University, Singapore. Retrieved from http://onlinelibrar y .wiley.com/doi/10.1002/wcm.1203.
[5]. Donald, A.C., Arul, S. O., & Arockiam, L. (2013). “Mobile Cloud Security Issues and Challenges: A Perspective”, International Journal of Engineering and Innovative Technology, Vol. 3(1), ISSN: 2277-3754, ISO 9001:2008 Certified.
[6]. Kopec, D., Kabir, M. H., Reinharth, D., Rothschild, O., & Castiglione, J. A. (2003). “Human Errors in Medical Practice: Systematic Classification and Reduction with Automated Information Systems”, Journal of Medical Systems, Vol. 27(4), pp. 297 - 313.
[7]. La, H.H., & Kim, S.D. (2010). “A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services”, Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD). pp. 466.
[8]. Li, H., & Hua, S. (2010). “Melog: mobile experience sharing through automatic multimedia blogging”, Proceedings of the 2010 ACM multimedia workshop on Mobile cloud media computing (MCMC), pp. 19-24.
[9]. Li, Z., Wang, C., & Xu, R. (2001). “Computation offloading to save energy on handheld devices: a partition scheme”, Proceedings of the 2001 international conference on Compilers, architecture, and synthesis for embedded systems (CASES). pp. 238 - 246.
[10]. Morshed, M. S., Jahan, M. M., Islam, M. K., Huq, M., Hossain S., & Basher, M. A. (2011). “Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues”, International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 83-88.
[11]. Nasir, A. K., Kiah, M.L., Samee, U. K., & Sajjad, A. M., (2012). “Towards secure mobile cloud computing: A survey”, Future Generation Computer Systems, Vol. 29(5), pp. 1278-1299.
[12]. Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., & Jahanian, F. (2008). “Virtualized incloud security services for mobile devices”, Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31- 35.
[13]. Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H., (2010). “Paranoid Android: versatile protection for smart-phones”, 26th Annual Computer Security Application Conference (ACSAC). pp. 347-356.
[14]. Samimi, F. A., Mckinley, P. K., & Sadjadi S. M. (2006). “Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services”, Proceedings of the 2nd International Workshop on Self-Managed Networks, Systems & Services (SelfMan), pp. 130-141.
[15]. Satyanarayanan, M. (1996). “Fundamental challenges in mobile computing”, Proceedings of the 5th annual ACM symposium on Principles of distributed computing, pp. 1-7.
[16]. Satyanarayanan, M. (2010). “Mobile computing: the next decade”, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS).
[17]. Shahzad, A., & Hussain, M. (2013). “Security Issues and Challenges of Mobile Cloud Computing”, International Journal of Grid and Distributed Computing, Vol.6(6), pp. 37-50, ISSN: 2005-4262, doi:10.14257/ ijgdc.2013.6.6.04.
[18]. Tayade, D. (2014). “Mobile Cloud Computing : Issues, Security,Advantages, Trends”, International Journal of Computer Science and Information Technologies, Vol. 5(5), pp. 6635-6639, ISSN: 0975-9646.
[19]. Yang, X., Pan, T., & Shen, J. (2010). “On 3G Mobile Ecommerce Platform Based on Cloud Computing”, Proceedings of the 3rd IEEE International Conference on Ubi-Media Computing, pp. 198-201.
[20]. Zhangwei, H., & Mingjun, X (2010). “A Distributed Spatial Cloaking Protocol for Location Privacy”, 2nd Intl Conf on Networks Security Wireless Communications and Trusted Computing (NSWCTC). Vol. 2, pp. 468.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.