To see the other types of publications on this topic, follow the link: Mobile cloud computing.

Journal articles on the topic 'Mobile cloud computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile cloud computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

R, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (January 19, 2024): 1–7. http://dx.doi.org/10.23880/art-16000111.

Full text
Abstract:
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems. It recognizes, yet, the security risks associated with transferring data and computing. Using various cloud types for secure information searches and security-critical activities, the research proposal proposes a secure exporting architecture to basic clouds. It shows the significance of cryptography, confidentiality security measures, and data security methods in solving these security issues with cloud computing and mobile cloud computing (MCC). From the perspective of the specific challenges of mobile environments, that abstract's argument indicates the need for further research to enhance mobile cloud-based applications and improve these security technologies.
APA, Harvard, Vancouver, ISO, and other styles
2

Gururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.

Full text
Abstract:
The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scalability, and heterogeneity. Security threats have become obstacles in the rapid adaptability of the mobile cloud computing paradigm, and there is a significant risk associated with migrating storage and data processing from mobiles to clouds. User privacy and the integrity of data and applications are key concerns that most cloud providers prioritize. This paper reviews the concept of mobile cloud computing and the security issues inherent within the context of mobile applications and cloud computing. It analyzes and compares various possible approaches proposed by researchers to address security and privacy issues in MCC. Despite widespread adoption, challenges like interoperability and standardization persist. Ongoing efforts focus on establishing common protocols, while research explores integrating technologies like edge computing and AI to enhance mobile cloud capabilities. This paper examines the dynamic landscape of MCC, addressing security concerns and exploring advancements and challenges, contributing to ongoing discussions on optimization, security, and the future of mobile cloud computing. As the field continues to evolve, researchers are actively working on developing comprehensive frameworks that not only address current security challenges but also anticipate and mitigate emerging threats in the ever-changing landscape of mobile cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
3

Sumit, Sumit, Ms Kirti Bhatia, and Ms Shalini Bhadola. "Cloud Computing using Mobile Phone." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 995–1000. http://dx.doi.org/10.31142/ijtsrd23145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

R. Nuiaa, Riyadh. "Mobile cloud is the infrastructure that facilitates the offloading of storage and computing resources of mobile devices pertaining mobile applications to cloud computing. Mobile devices can run expensive applications using mobile cloud as they can outsour." Journal of Education College Wasit University 1, no. 22 (January 18, 2018): 759–72. http://dx.doi.org/10.31185/eduj.vol1.iss22.234.

Full text
Abstract:
Mobile cloud is the infrastructure that facilitates the offloading of storage and computing resources of mobile devices pertaining mobile applications to cloud computing. Mobile devices can run expensive applications using mobile cloud as they can outsource services to cloud while providing interface for mobile users. Emerging mobile applications that are expensive can overcome the inherent problems of hand held devices through the concept of mobile cloud computing. The offloading process provide mobiles a rich platform for pervasive computing with on-demand services linked to cloud computing through mobile cloud infrastructure. Thus the mobile cloud computing is an inevitable phenomenon which bring about plethora of pros besides the mobility. The mobile cloud users can perform their resource intensive operations on the fly without time and geographical restrictions. In spite of the advantages it bestows mobile cloud computing has its own security issues. This paper throws light into the security issues and solutions in terms of secure channels transmission in mobile cloud computing. In this paper, we present state-of-the-art of mobile cloud computing besides its security aspects that are to be taken care of for successful mobile cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Tian, Yucheng Lu, Zhihan Cao, Lei Shu, Xi Zheng, Anfeng Liu, and Mande Xie. "When Sensor-Cloud Meets Mobile Edge Computing." Sensors 19, no. 23 (December 3, 2019): 5324. http://dx.doi.org/10.3390/s19235324.

Full text
Abstract:
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. The emergence of sensor-clouds has greatly enhanced the computing power and storage capacity of traditional WSNs via exploiting the advantages of cloud computing in resource utilization. However, there are still many problems to be solved in sensor-clouds, such as the limitations of WSNs in terms of communication and energy, the high latency, and the security and privacy issues due to applying a cloud platform as the data processing and control center. In recent years, mobile edge computing has received increasing attention from industry and academia. The core of mobile edge computing is to migrate some or all of the computing tasks of the original cloud computing center to the vicinity of the data source, which gives mobile edge computing great potential in solving the shortcomings of sensor-clouds. In this paper, the latest research status of sensor-clouds is briefly analyzed and the characteristics of the existing sensor-clouds are summarized. After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems in sensor-clouds. Finally, we discuss research challenges and future research directions in leveraging mobile edge computing for sensor-clouds.
APA, Harvard, Vancouver, ISO, and other styles
6

Hussein, Karim Qassim. "Multimedia Information Time Balance Management in Mobile Cloud Environment Supported By Case Study." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 19 (October 19, 2022): 118–32. http://dx.doi.org/10.3991/ijim.v16i19.33615.

Full text
Abstract:
Mobile cloud computing is used to define and determine computing services with a structure model. The data and resource of any service will be retrieved from cloud computing through internet service, some tools, and user interface (web-based or application). Mobile Cloud Computing (MCC) is a hybrid of cloud computing and mobile computing. Multimedia Information is the core of Mobile Cloud information because of the sizable information of multimedia particularly video streaming. Mobile Cloud mostly handles and processes that information. MCC is one of the business expressions with the real environment in the IT world. The concept of the MCC is still in the beginner stage of advancement. So, the handle of the innovation in a careful way especially in the bearing of future research should be provide. In this paper, an algorithm is throttled load balancing for mobile clouds has been presented within an example of Multimedia information. The results has shown that the load balancing of cloud computing environment. In this scenario, load balancing techniques in mobile cloud computing can be employed and can successfully manage time through the cloud.
APA, Harvard, Vancouver, ISO, and other styles
7

Akherfi, Khadija, Hamid Harroud, and Michael Gerndt. "A Mobile Cloud Middleware to Support Mobility and Cloud Interoperability." International Journal of Adaptive, Resilient and Autonomic Systems 7, no. 1 (January 2016): 41–58. http://dx.doi.org/10.4018/ijaras.2016010103.

Full text
Abstract:
With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a middleware that will contribute to providing mobile users data storage and processing services based on their mobile devices capabilities, availability, and usage. A prototype of the middleware is developed and three scenarios are described to demonstrate how the middleware performs in adapting the provision of cloud web services by transforming SOAP messages to REST and XML format to JSON, in optimizing the results by extracting relevant information, and in improving the availability by caching. Initial analysis shows that the mobile cloud middleware improves the quality of service for mobiles, and provides lightweight responses for mobile cloud services.
APA, Harvard, Vancouver, ISO, and other styles
8

Somula, Rama Subbareddy, and Sasikala R. "A Survey on Mobile Cloud Computing: Mobile Computing + Cloud Computing (MCC = MC + CC)." Scalable Computing: Practice and Experience 19, no. 4 (December 29, 2018): 309–37. http://dx.doi.org/10.12694/scpe.v19i4.1411.

Full text
Abstract:
In recent years, the mobile devices become popular for communication and running advanced real time applications such as face reorganization and online games. Although, mobile devices advanced for providing significant benefits for mobile users. But still, these devices suffers with limited recourses such as computation power, battery and storage space due to the portable size. However, The Cloud Technology overcome the limitations of mobile computing with better performance and recourses. The cloud technology provides enough computing recourses to run mobile applications as storage computing power on cloud platform. Therefore, the novel technology called mobile cloud computing (MCC) is introduced by integrating two technologies (Mobile Computing, Cloud Computing) in order to overcome the limitations(such as Battery life, Storage capacity, Processing capacity) of Mobile Devices by offloading application to recourse rich Remote server. This paper presents an overview of MCC, the advantages of MCC, the related concepts and the technology beyond various offloading frameworks, the architecture of the MCC, Cloudlet technology, security and privacy issues and limitations of mobile cloud computing. Finally, we conclude with feature research directions in MCC.
APA, Harvard, Vancouver, ISO, and other styles
9

Arun, Lakshna, and T. N. Ravi. "Mobile Cloud Computing: A Literature Survey." Asian Journal of Engineering and Applied Technology 7, no. 2 (November 5, 2018): 80–85. http://dx.doi.org/10.51983/ajeat-2018.7.2.1003.

Full text
Abstract:
Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Mohammad, Alshamaileh, and Li Chunlin. "Cloud- Based Mobile Augmentation in Mobile Cloud Computing." International Journal of Future Generation Communication and Networking 9, no. 8 (August 31, 2016): 65–76. http://dx.doi.org/10.14257/ijfgcn.2016.9.8.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

M, DuraiPandian. "SURVEY ON VIRTUAL LOAD BALANCING ARCHITECTURES IN MOBILE CLOUD." IRO Journal on Sustainable Wireless Systems 01, no. 03 (September 8, 2019): 161–75. http://dx.doi.org/10.36548/jsws.2019.3.003.

Full text
Abstract:
The mobile cloud computing, that enables the mobile device application to be hosted, equipped and constructed by the cloud-computing has become more prominent among wide range of application and the concerns that range either in the small-scale or the large-scale. This lead to the overcrowded accessing of the mobile clouds which lead to insufficiency of resources and the latency in the service provisioning. The possible researches emerged with the solutions of load balancing, but the in capabilities in the traditional load balancing developed were in compatible with the mobile cloud computing. So the paper details the survey on the virtual load balancing techniques available and their employment in the mobile cloud computing to improve the balancing of the influx traffic that are addressed towards the mobile cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
12

K., Arul Jothy, Sivakumar K., and Delsey M.J. "Distributed System Framework for Mobile Cloud Computing." Bonfring International Journal of Research in Communication Engineering 8, no. 1 (February 28, 2018): 05–09. http://dx.doi.org/10.9756/bijrce.8357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bansal, Himani. "Mobile Cloud Computing Research: Issues and Challenges." International Journal of Science and Research (IJSR) 12, no. 5 (May 5, 2023): 2033–36. http://dx.doi.org/10.21275/mr23523120157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Alakbarov, R. G. "Model of Optimal Placement of Cloudlets in a Wireless Metropolitan Area Network." Informacionnye Tehnologii 29, no. 4 (April 18, 2023): 182–88. http://dx.doi.org/10.17587/it.29.182-188.

Full text
Abstract:
Cloud computing has recently emerged as a new paradigm for processing and storing large amounts of data. The rapid increase in the number of mobile phones and IoT devices benefitingfrom cloud computing services reduces the Internet bandwidth, resulting in delays in delivering data processed on remote cloud servers to the user. Mobile devices use edge computing systems (cloudlet, fog computing, etc.) to overcome resource shortages, power consumption and delays in communication channels. Edge computing systems place processing devices (cloudlets) close to users. The closer the cloudlets to mobile devices, the lower the processing time and energy consumption of the mobile device, and the higher the bandwidth of communication channels. Thus, cloudlet-based mobile computing clouds are widely used to reduce the latency in the Internet communication channels and energy consumption on mobile devices. This article identifies the most popular places for cloud servers in metropolitan mobile networks and discusses the optimal placement of a limited number of cloudlets in those places.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Rui Xiang, Yu Hong Zhang, and Yan Tang. "A Mobile-Terminal-Oriented and Mobile-Cloud-Computing-Based Localized Scheduling Algorithm." Advanced Materials Research 989-994 (July 2014): 2111–14. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2111.

Full text
Abstract:
Mobile Cloud Computing utilizes cloud computing in the mobile internet. It takes the advantage of portability of mobile devices, and uses cloud computing to make up mobile devices' shortcomings, i.e., the capabilities of computation and storage. With the advent of cloud computing, more and more IT companies establish their own cloud computing platforms by using Hadoop, which gradually makes Hadoop a distributed cloud computing platform. By considering important attributes of mobile devices, e.g., low computation workload, high concurrency, and high real-time demand, we propose in this paper a local scheduling algorithm which is based on Hadoop mobile cloud computing, and we analyze the influence of response time and throughput on the system utility.
APA, Harvard, Vancouver, ISO, and other styles
16

Ahuja, Sanjay P., and Jesus Zambrano. "Mobile Cloud Computing: Offloading Mobile Processing to the Cloud." Computer and Information Science 9, no. 1 (January 31, 2016): 90. http://dx.doi.org/10.5539/cis.v9n1p90.

Full text
Abstract:
<p class="zhengwen">The current proliferation of mobile systems, such as smart phones and tablets, has let to their adoption as the primary computing platforms for many users. This trend suggests that designers will continue to aim towards the convergence of functionality on a single mobile device (such as phone + mp3 player + camera + Web browser + GPS + mobile apps + sensors). However, this conjunction penalizes the mobile system both with respect to computational resources such as processor speed, memory consumption, disk capacity, and in weight, size, ergonomics and the component most important to users, battery life. Therefore, energy consumption and response time are major concerns when executing complex algorithms on mobile devices because they require significant resources to solve intricate problems.</p><p>Offloading mobile processing is an excellent solution to augment mobile capabilities by migrating computation to powerful infrastructures. Current cloud computing environments for performing complex and data intensive computation remotely are likely to be an excellent solution for offloading computation and data processing from mobile devices restricted by reduced resources. This research uses cloud computing as processing platform for intensive-computation workloads while measuring energy consumption and response times on a Samsung Galaxy S5 Android mobile phone running Android 4.1OS.</p>
APA, Harvard, Vancouver, ISO, and other styles
17

M, Anitha, and Senbagavalli M. "Dynamic Mobile Cloud Eco System Security - A Review." International Journal of Data Informatics and Intelligent Computing 2, no. 1 (March 24, 2023): 62–69. http://dx.doi.org/10.59461/ijdiic.v2i1.44.

Full text
Abstract:
Mobile cloud computing is the technique of using cloud technology and various rich mobile applications are intended to be able to run on a variety of mobile devices using the technique called mobile cloud computing. In recent years, huge amounts of data are stored by the clients which are much more easily to the integration of cloud platforms into mobile systems. The ways of security used in portable device settings are one of the key challenges in this respect as the number of people using smartphones continues to rise. None of the models that have been developed with confidence and privacy for precaution of data in mobile cloud systems are impervious to destructive attacks, despite countless attempts. While mobile cloud computing has great potential, security, privacy, viability, and accessibility concerns must still be considered by both consumers and businesses. Additionally, it emphasizes the use of Canny Card Web Services (CCWS) competition to enhance mobile cloud computing security with IOT. This paper has been presented with more than one user application: a smart house and a smart parking in an educational institution, in the inclusion of IOT with cloud computing for demonstrating various admittance control and endorsement requirement. A review regarding this paper concentrated on a little model that is intended the security and privacy ensureability of data in mobile clouds. Additionally, to manage mobile cloud security difficulties and challenges, it is important to look at the current situation with regard to cloud security breaches, the weaknesses of mobile cloud devices, and the best ways to address these issues in the near future with regard to mobile device management and mobile data protection.
APA, Harvard, Vancouver, ISO, and other styles
18

Bibi, Asma, Muhammad Faran Majeed, Sikandar Ali, Irshad Ahmed Abbasi, Ali Samad, and Samad Baseer. "Secured Optimized Resource Allocation in Mobile Edge Computing." Mobile Information Systems 2022 (August 21, 2022): 1–14. http://dx.doi.org/10.1155/2022/9952993.

Full text
Abstract:
Mobile edge computing (MEC) uses multiple mobiles to compute several complex tasks that are unable to compute on a single device. Taking advantage of all abundant mobile resources and making a mobile cloud from them will be useful. This study aims to propose and implement a novel framework to cover challenges raised by application execution on resource-constrained devices. The purpose is to overcome the waste of resources in MEC and provide time efficiency to the data packets that are sent and received between offloaded and offloading devices. The main task of MEC is to offload tasks by first selecting resources and then allocating tasks to selected resources. A multiple linear regression algorithm is used for the selection of compatible devices. Particle swarm optimization techniques are used as a benchmark technique to design an algorithm for optimized resource allocation. Multiple mobile devices acted as a major component for making edge clouds. The study finds that response time of processing tasks is reduced, ineffectual resources become beneficial, increase in demand for mobile devices, and usage of mobile resources as a replacement for mobile edge cloud servers. Abundant resource usage of two or more edge clouds, that is, interedge resource usage is the originality of this research, while others are using intraedge resources only.
APA, Harvard, Vancouver, ISO, and other styles
19

Francis, T. "A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4646. http://dx.doi.org/10.11591/ijece.v8i6.pp4646-4653.

Full text
Abstract:
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
APA, Harvard, Vancouver, ISO, and other styles
20

Peñalvo, Francisco José García, Akash Sharma, Anureet Chhabra, Sunil K. Singh, Sudhakar Kumar, Varsha Arya, and Akshat Gaurav. "Mobile Cloud Computing and Sustainable Development." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–20. http://dx.doi.org/10.4018/ijcac.312583.

Full text
Abstract:
The number of smartphone users has increased from 3.6 billion in 2016 to 6.25 billion by 2021, which shows that mobile phone usage has increased dramatically over the past few years. This is due to the development of mobile computing applications like commerce, healthcare, e-learning, etc. The use of mobile devices has resulted in an exponential rise in the amount of data generated and as a result the amount of energy consumed has increased. This is where cloud computing plays a major role. Cloud computing has transformed traditional mobile computing. The new mobile cloud not only provides on-demand services but also data storage and increased energy efficiency. Through mobile computing based on cloud computing, mobile device functions can be virtualized, reducing power consumption. In this paper, the authors survey application and potential of mobile cloud computing and present the energy-efficient ways. Also, the paper discusses development opportunities of mobile cloud computing. The research also mentions some of the major challenges in current mobile computing technology.
APA, Harvard, Vancouver, ISO, and other styles
21

Woon Choong, Chen, and Leelavathi Rajamanickam. "Mobile Cloud Computing - Protection Issues." Journal of Engineering & Technological Advances 1, no. 1 (2016): 83–88. http://dx.doi.org/10.35934/segi.v1i1.83.

Full text
Abstract:
Mobile cloud computing can improve user experiences by executing applications or resource providers and exchange data on mobile devices. Mobile cloud computing (MCC) is a revolutionary application in the mobile computing world. This paper presents the concept of mobile computing besides recommending a new term called M-cloud that is yet to be further explored. The various modules of this paper consist of MCC applications, major concerns and security concerns with related preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
22

Sarode, Neeta P., and Dr J. W. Bakal. "Mobile Cloud Computing as Competence Intensifier." International Journal of Engineering and Computer Science 8, no. 06 (June 14, 2019): 24693–97. http://dx.doi.org/10.18535/ijecs/v8i06.4330.

Full text
Abstract:
Since the arrival of mobile devices, such as Personal Digital Assistants (PDA’s), smartphones, tablets etc., and their amalgamation with cloud computing is bringing up and transforming ubiquitous computing into actual existence. This concept of ubiquitous computing straightens out the way to unusual and experimental applications, in which the mobile devices are integrated and provide assistance to the users. This paper discusses about the concept of mobile cloud computing, identify advantages and disadvantages of collaborating mobile applications with cloud and identify benefits of leveraging mobile learning services on cloud. Mobile cloud computing induces innumerable benefits and overcomes the technical limitations of mobile learning.
APA, Harvard, Vancouver, ISO, and other styles
23

Shahzad, Abid, and Mureed Hussain. "Security Issues and Challenges of Mobile Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (December 31, 2013): 37–50. http://dx.doi.org/10.14257/ijgdc.2013.6.6.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Manigandaa, C. S., V. Anush Kumar, Challapalli Manikantaa, and Asiya Mariyam. "Navigating Mobile Cloud Computing: Challenges and Protective Strategies." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 2852–58. http://dx.doi.org/10.55248/gengpi.4.823.51855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pallavi, L., A. Jagan, and B. Thirumala Rao. "ERMO2 algorithm: an energy efficient mobility management in mobile cloud computing system for 5G heterogeneous networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1957. http://dx.doi.org/10.11591/ijece.v9i3.pp1957-1967.

Full text
Abstract:
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
APA, Harvard, Vancouver, ISO, and other styles
26

Khalifa, Iraky, Hala El-Sayed, and Islam Abd El-Gaber. "Enhanced Mobile Cloud Computing Platform." International Journal of Computer Applications 63, no. 7 (February 15, 2013): 12–18. http://dx.doi.org/10.5120/10477-5209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gaochao Xu, Yan Ding, Liang Hu, Xiaodong Fu, Jia Zhao, Hao Yan, and Jianfeng Chu. "Research on Mobile Cloud Computing." Journal of Convergence Information Technology 8, no. 8 (April 30, 2013): 341–48. http://dx.doi.org/10.4156/jcit.vol8.issue8.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Arun, C., and K. Prabu. "Overview on Mobile Cloud Computing." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (May 30, 2017): 396–98. http://dx.doi.org/10.23956/ijarcsse/sv7i5/0147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

S. Desai, Nilam. "Mobile Cloud Computing in Business." International Journal of Information Sciences and Techniques 6, no. 1/2 (March 31, 2016): 197–202. http://dx.doi.org/10.5121/ijist.2016.6221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 19, 2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.
APA, Harvard, Vancouver, ISO, and other styles
31

BALTOI, Ion-Costel-Marius. "Mobile Cloud Computing and Payments." Informatica Economica 26, no. 1/2022 (March 30, 2022): 39–45. http://dx.doi.org/10.24818/issn14531305/26.1.2022.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shaikha, Hawkar, and Amira Sallow. "Mobile Cloud Computing: A Review." Academic Journal of Nawroz University 6, no. 3 (2017): 129–34. http://dx.doi.org/10.25007/ajnu.v6n3a96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Ritesh Kumar. "Mobile Cloud Computing: An Overview." RIET-IJSET: International Journal of Science, Engineering and Technology 3, no. 1 (2016): 9. http://dx.doi.org/10.5958/2395-3381.2016.00002.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Leung, Victor, Yonggang Wen, Min Chen, and Chunming Rong. "Mobile cloud computing [Guest Editorial]." IEEE Wireless Communications 20, no. 3 (June 2013): 12–13. http://dx.doi.org/10.1109/mwc.2013.6549278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Fu, Xiaoming, Stefano Secci, Dijiang Huang, and Rittwik Jana. "Mobile cloud computing [Guest Edotorial]." IEEE Communications Magazine 53, no. 3 (March 2015): 61–62. http://dx.doi.org/10.1109/mcom.2015.7060483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. "Mobile cloud computing: A survey." Future Generation Computer Systems 29, no. 1 (January 2013): 84–106. http://dx.doi.org/10.1016/j.future.2012.05.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Min, Yulei Wu, and Athanasios V. Vasilakos. "Advances in Mobile Cloud Computing." Mobile Networks and Applications 19, no. 2 (March 21, 2014): 131–32. http://dx.doi.org/10.1007/s11036-014-0503-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Jeong, Hwa-Young, Omer F. Rana, Ching-Hsien Hsu, and Young-Sik Jeong. "Cloud computing for mobile environments." Concurrency and Computation: Practice and Experience 28, no. 10 (March 24, 2016): 2753–55. http://dx.doi.org/10.1002/cpe.3785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Thanapal, P., and M. A. Saleem Durai. "A Survey of Mobile Cloud Computing for Extending Energy of Mobile Devices." Applied Mechanics and Materials 573 (June 2014): 549–55. http://dx.doi.org/10.4028/www.scientific.net/amm.573.549.

Full text
Abstract:
Mobile cloud computing will wear down gaining quality among users, the researchers predicts these troubles by execution of mobile applications on application suppliers external to the mobile device. During this paper, we have a tendency to gift a wide survey of mobile cloud computing, whereas prominence the particular considerations in mobile cloud computing square measure as follows. (a) Highlights the present state in Application of cloud computing usage in real time world. (b) Identifies the problems in testing bandwidth and (c) provides a optimizing of the offloading that saves energy
APA, Harvard, Vancouver, ISO, and other styles
40

Liang, Tyng-Yeu, and You-Jie Li. "A Mobile Cloud Computing System for Mathematical Computation." International Journal of Grid and High Performance Computing 7, no. 3 (July 2015): 36–53. http://dx.doi.org/10.4018/ijghpc.2015070103.

Full text
Abstract:
This paper is aimed at proposing a mobile cloud computing system called M2C (Mobile Math Cloud). This system provides users with an APP to accelerate the execution of MATLAB instructions and scripts on their Android-based mobile devices by taking advantage of diverse processors including CPUs and GPUs available in clouds. On the other hand, it supports time-sharing license management to reduce the user time of waiting system services and increase the resource utilization of clouds. Moreover, it supports parallel computing and optimal resource configurations for maximizing the performance of user applications, and faulty tolerance for recovering the contexts of user programs from system faults. With these supports, M2C provides a reliable and efficient service for mobile users to perform massive mathematical computation anytime anywhere.
APA, Harvard, Vancouver, ISO, and other styles
41

El-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (January 29, 2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.

Full text
Abstract:
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile computing apps, since in the first model the devices run cloud based web applications not as mobile computing native apps. Services of Mobile-based systems via cloud are accessing and sharing through internet connection thus they are open for attacker to attack on its security. Distributed Denial of Service (DDoS) attacks can cause a big problem in mobile cloud computing security. The main objective of DDoS attacks is to infect wireless devises resources (e.g., software applications, wireless network, etc.) and make them unavailable to the authorized user. In DDoS, the attacker tries to overload the Mobile-based service with traffic. The main objective of this research paper is to introduce novel model for securing Mobile-based systems against DDoS attacks. Efficiency and performance analysis evaluations of the proposed model are presented. The feedbacks of the experimental results were highly promising, for protecting mobile-based cloud computing systems against DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
42

Hsu, Ching-Hsien, and Emmanuel Udoh. "Mobile and Wireless Computing towards Sustainable and Ubiquitous Clouds Services." International Journal of Grid and High Performance Computing 5, no. 3 (July 2013): 1–5. http://dx.doi.org/10.4018/jghpc.2013070101.

Full text
Abstract:
The ever-growing cloud computing and services provide dynamic intelligence and play an increasingly critical role in all aspects of our lives. By taking advantage of virtualized resources, cloud computing services presents an attractive means to address the challenges while realizing the potential of Mobile and Wireless Computing (MWC). The MWC paradigm can be generalized to include mobile devices, which not only incorporate sophisticated methods for users to interact with the online world through numerous applications in their devices, but are endowed with multiple sensors that enable them to contribute data as nodes in the IoT. In this context, mobile cloud services that enable widespread data collection through mobile devices and collaborative use of mobile devices to enhance existing and realize new applications are very much of interest. As such, the MWC has come to the picture seeking solutions for computing and IT infrastructures to be energy efficient and environmentally friendly. This special issue is in response to the increasing convergence between MWC and cloud services, while different approaches exist, challenges and opportunities are numerous in this context. The research papers selected for this special issue represent recent progresses in the field, including works on services computing and modeling, mobile cloud, U-Care cloud, vehicle networks, energy-aware architectures, and wireless sensor network technologies and applications. This special issue includes four extended version of the selected paper originally presented at the 17th Mobile Computing Workshop (MC 2012) and the 8th Workshop on Wireless, Ad Hoc and Sensor Networks (WASN 2012), held at Taipei, Taiwan; one extended version of the selected paper originally presented at the 4th IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2012), held at Taipei, Taiwan; and one regular submission with 20% average acceptance rate for 2012 submissions in IJGHPC. The papers selected for this issue not only contribute valuable insights and results but also have particular relevance to the mobile, wireless and cloud computing community. All of them present high quality results for tackling problems arising from the ever-growing mobile and cloud services. We believe that this special issue provides novel ideas and state-of-the-art techniques in the field, and stimulates future research in the mobile and wireless services in clouds.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Seung-Hyun, and Jin Ki Kim. "Determinants of the adoption of mobile cloud computing services." Information Development 34, no. 1 (October 12, 2016): 44–63. http://dx.doi.org/10.1177/0266666916673216.

Full text
Abstract:
The quantity and popularity of mobile cloud computing services have increased significantly. From the principal-agent perspective, this study proposes a model to determine the adoption of mobile cloud computing services. In the model, three uncertainty antecedents of mobile cloud computing utilization are included: fears of service provider opportunism, perceived information asymmetry, and information privacy and security concerns. Likewise, three motivators are included: trust, convenience, and social presence. Based on 263 observations of mobile cloud computing users, the study identifies that trust and convenience are motivators and perceived uncertainty is a mitigator for adopting mobile cloud computing services.
APA, Harvard, Vancouver, ISO, and other styles
44

Ali, Abid, Muhammad Munawar Iqbal, Harun Jamil, Habib Akbar, Ammar Muthanna, Meryem Ammi, and Maha M. Althobaiti. "Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing." Sensors 22, no. 1 (December 24, 2021): 108. http://dx.doi.org/10.3390/s22010108.

Full text
Abstract:
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the trustable tasks needed to offload towards the mobile cloud computing. Then, an efficient and dynamic scheduler is added to enhance the task scheduling after trust computation using social and environmental trust computation techniques. To improve the time and energy efficiency of IoT and mobile devices using the proposed technique, the energy computation and time request computation are compared with the existing methods from literature, which identified improvements in the results. Our proposed approach is centralized to tackle constant SyncUPs of incoming devices’ trust values with mobile cloud computing. With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach.
APA, Harvard, Vancouver, ISO, and other styles
45

Kaur, Taranpreet. "An Experimental Examination of Mobile Cloud Computing and IOT: Application, Techniques and Issues." International Journal of Engineering and Advanced Technology 8, no. 6s (September 6, 2019): 1101–3. http://dx.doi.org/10.35940/ijeat.f1215.0886s19.

Full text
Abstract:
A technology in which voice, video and data can transfer through a computer or any wireless device is known as mobile computing. There is no need to connect to a fix physical link in mobile computing. By using the cloud computing mobile computing the powerful mobile applications can build. The approach of mobile cloud computing allows the developers to design the applications especially for mobile users. And the applications are not bounded with the memory capacity, computing process and operating system of Smartphone. From a remote web server through mobile browser the mobile cloud computing centered simply accesses. On the recipient Smartphone it is not necessary to install the client application.
APA, Harvard, Vancouver, ISO, and other styles
46

Dr. G. Srinivasa Rao, Prasanthi Gottumukkala,. "THE STUDY OF MOBILE CLOUD COMPUTING:DESIGN, USES, AND METHODS." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 10, 2021): 673–79. http://dx.doi.org/10.17762/itii.v9i1.186.

Full text
Abstract:
Mobile cloud computing is potential skill for mobile devices and also grownup the demand for operational availability and openness. Few years back mobile devices are used only for voice calls and text messages purposes, after value added services possible to enabled anytime and anywhere. Mobile cloud computing incorporates the mixture of both mobile also cloud computing, and solve the performance linked problems. Could Computing (CC) is integrates with usually the mobile environment moreover overcomes problems connected to the presentation (forexample: Storagespace, Bandwidth and life time of the Battery), and Environment(Accessibility, Scalability and Heterogeneity), Security. The businesses and information technology organizations and additional consumers can take the necessary facilities & properties after cloud rapidly, effortlessly and also reasonable charges.Discussed this paper on survey Mobile cloud computing which helps forresearcher’s mccdesign, methods and also uses. Problems occurred in mcc and present resolutions and methodologies used to resolve problems. For further extension of this is giving instructions to mobile cloud computing research.
APA, Harvard, Vancouver, ISO, and other styles
47

Dr. G. Srinivasa Rao, Prasanthi Gottumukkala,. "THE STUDY OF MOBILE CLOUD COMPUTING:DESIGN, USES, AND METHODS." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (February 28, 2021): 149–58. http://dx.doi.org/10.17762/itii.v9i1.114.

Full text
Abstract:
Mobile cloud computing is potential skill for mobile devices and also grownup the demand for operational availability and openness. Few years back mobile devices are used only for voice calls and text messages purposes, after value added services possible to enabled anytime and anywhere. Mobile cloud computing incorporates the mixture of both mobile also cloud computing, and solve the performance linked problems. Could Computing (CC) is integrates with usually the mobile environment moreover overcomes problems connected to the presentation (forexample: Storagespace, Bandwidth and life time of the Battery), and Environment(Accessibility, Scalability and Heterogeneity), Security. The businesses and information technology organizations and additional consumers can take the necessary facilities & properties after cloud rapidly, effortlessly and also reasonable charges.Discussed this paper on survey Mobile cloud computing which helps forresearcher’s mccdesign, methods and also uses. Problems occurred in mcc and present resolutions and methodologies used to resolve problems. For further extension of this is giving instructions to mobile cloud computing research.
APA, Harvard, Vancouver, ISO, and other styles
48

Pang, Beibei, Fei Hao, Doo-Soon Park, and Carmen De Maio. "A Multi-Criteria Multi-Cloud Service Composition in Mobile Edge Computing." Sustainability 12, no. 18 (September 16, 2020): 7661. http://dx.doi.org/10.3390/su12187661.

Full text
Abstract:
The development of mobile edge computing (MEC) is accelerating the popularity of 5G applications. In the 5G era, aiming to reduce energy consumption and latency, most applications or services are conducted on both edge cloud servers and cloud servers. However, the existing multi-cloud composition recommendation approaches are studied in the context of resources provided by a single cloud or multiple clouds. Hence, these approaches cannot cope with services requested by the composition of multiple clouds and edge clouds jointly in MEC. To this end, this paper firstly expands the structure of the multi-cloud service system and further constructs a multi-cloud multi-edge cloud (MCMEC) environment. Technically, we model this problem with formal concept analysis (FCA) by building the service–provider lattice and provider–cloud lattice, and select the candidate cloud composition that satisfies the user’s requirements. In order to obtain an optimized cloud combination that can efficiently reduce the energy consumption, money cost, and network latency, the skyline query mechanism is utilized for extracting the optimized cloud composition. We evaluate our approach by comparing the proposed algorithm to the random-based service composition approach. A case study is also conducted for demonstrating the effectiveness and superiority of our proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
49

Ghudayyer, Mohammad Bin, Yasir Javed, and Mamdouh Alenezi. "A Security Perspective on Adoption and Migration to Mobile Cloud Technology." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 143. http://dx.doi.org/10.30630/joiv.1.4.54.

Full text
Abstract:
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.
APA, Harvard, Vancouver, ISO, and other styles
50

Sk Mahaboob Sharif, Sk, K. V.V Satyanarayana, M. Harsha vardhan, and V. Harika. "Central Controller Framework for Mobile Cloud Computing and Security Issues." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 161. http://dx.doi.org/10.14419/ijet.v7i2.32.15394.

Full text
Abstract:
Cloud Computing is an on demand service where resources like online office software and on-line storage are made available as per the users requirement. The word cloud in cloud computing is used as a symbol for internet since it offers various computing services as well as resources like storage, servers, platforms and applications are provided to devices over the internet. Mobile cloud computing joins the cloud computing with mobile computing and giving the shopper with limitless pool of useful resource from cloud without hampering mobility of consumer. The mobile cloud computing generation is developing rapidly many of the customers and at the equal time it introduces the early protection threats inside. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting consumer privateers and integrity. So information saved on the cloud have to be encrypted, disallowing unauthorized user to access saved records. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any set of rules or technique used for securing mobile users statistics have to don't forget above constraints for powerful makes use of cloud for portable clients. Most of the mobile devices have nearly equal functionalities, so mobile devices will face some problems associated with security and third parties, by this paper we have given a review of different techniques for secure storage of mobile user’s data in the cloud, their merits and demerits for mobile environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography