Mobile Cloud Computing â€“ Concepts, Architecture and Challenges
AbstractThe mobilization of the internet and global connectivity along with cloud, Mobile Cloud Computing (MCC) has been introduced as a rising technology for mobile services which integrates cloud computing into mobile environment and enhances the computational power of resource constrained mobile devices. This paper survey technological perspective of MCC, that serves as useful resource for reader to get better clarity in understanding the technology. In addition the issues, existing solutions and approaches are discussed to point out future research directions.
Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang â€ A Survey of Mobile Cloud Computing: Architecture, Applications, and Approachesâ€ Accepted in Wireless Communications and Mobile Computing â€“ Wiley
Sanjay P. Ahuja1 & Alan C. Rolli,"Exploring the Convergence of Mobile Computing with Cloud Computingâ€œ, Network and Communication Technologies, Vol. 1, No. 1,June 2012.
B.-G. Chun and P. Maniatis, â€œAugmented Smartphone Applications Through Clone Cloud Execution,â€ in Proceedings of the 12th Workshop on Hot Topics in Operating Systems (HotOS XII). Monte Verita, switzerland: USENIX, 2009.
X. Zhang, S. Jeong, A. Kunjithapatham, and Simon Gibbs, â€œTowards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms", Proceedings of Third International ICST Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications,USA, 2010.
M. Satyanarayanan, P. Bahl, R. CÂ´aceres, and N. Davies, â€œThe Case for VM-Based Cloudlets in Mobile Computing,â€ IEEE Pervasive Computing,vol. 8, no. 4, pp. 14â€“23, Oct. 2009.
A hlund, K. Mitra, D. Johansson, and A. Zaslavsky, â€œContext-aware Application Mobility Support in Pervasive Computing Environments,â€ in Proceedings of the 6th International Conference on Mobile Technology, Application & Systems (Mobility â€™09). Nice, France: ACM, Sep. 2009, pp. 1â€“4.
T. Koponen, A. Gurtov, and P. Nikander, â€œApplication Mobility with Host Identity Protocol,â€ in Identifier/Locator Split and DHTs: Proceedings of the Research Seminar on Telecommunications Software. Helsinki: Helsinki University of Technology, 2004, p. 50.
D. S. MilojiË‡ciÂ´c, F. Douglis, Y. Paindaveine, R. Wheeler, and S. Zhou, â€œProcess Migration,â€ ACM Computing Surveys (CSUR), vol. 32, no. 3, pp. 241â€“299, Sep. 2000.
M. Satyanarayanan, M. A. Kozuch, C. J. Helfrich, and D. R. O. Hallaron, â€œTowards Seamless Mobility on Pervasive Hardware,â€ Pervasive and Mobile Computing, vol. 1, no. 2, pp. 157â€“189, Jul. 2005.
F. David, B. Donkervoet, J. Carlyle, and EM, â€œSupporting Adaptive Application Mobility,â€ in On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. Vilamoura, Portugal: Springer, Nov. 2007, pp. 896â€“905.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.