• Tidak ada hasil yang ditemukan

View of STUDY OF MOBILE CLOUD COMPUTING

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of STUDY OF MOBILE CLOUD COMPUTING"

Copied!
7
0
0

Teks penuh

(1)

STUDY OF MOBILE CLOUD COMPUTING Prof. Ranjana Dalwani Arora Assistant Professor, IMI College

Abstract:- A new digital technology that is expected to transform the various sector is Cloud computing. Cloud computing has many advantages like simple sharing, fast deployment, reduced cost and convenient processing. Now days the market of mobile phone is growing at a very high speed. Everyone has a mobile, tablet, fablet (tablet with calling facility). Mobile user will reach 469.3 million by the end of 2021, 448.2 Million by the end of 2020.Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) discussed in mobile computing. This project gives a information about mobile cloud computing security issues. The issues, existing solutions and approaches are presented.

Most of mobile devices have almost same functionalities like a desktop computer. So mobile devices also have to face a number of problem’s related to security and privacy. To overcome this problem threat detection services are now performed at clouds.

Keywords: Mobile cloud computing, data storage, mobile user, security.

1. INTRODUCTION

Mobile devices (e.g., Smartphone, tablet, fablet etc) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc), which run on the devices and/or on remote servers via wireless networks.

The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce and industry fields. However, the mobile devices are facing many challenges in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., mobility and security). The limited resources significantly impede the improvement of service qualities. Cloud computing (CC) has been widely recognized as the next generation’s computing infrastructure. CC offers some advantages by allowing users to use infrastructure (e.g. servers, networks, and storage), platforms (e.g., middleware services and operating systems), and software’s (e.g., application programs).

1.1. What is Mobile Cloud Computing?

The Mobile Cloud Computing Forum defines MCC as follows:

“Mobile Cloud Computing at its simplest, refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and mobile computing to not just Smartphone users but a much broader range of mobile subscribers”.

(2)

Mobile Cloud Computing 1.2 Background

Mobile computing is the culmination of a number of technological advances that have occurred in parallel. Key aspects that have led to the current explosion of mobile computing include general computing, user interface, display, communications, storage, battery, and culture.

Mobile computing is used when there is a need for computing power away from a desk or office environment. Initially this became evident in military and advanced transportation scenarios; for example when calculating ballistics in ships and submarines or to help carry out checklists on spacecraft. These days with mobile computing being ubiquitous everyone can use the power of mobile computers to assist with business and personal tasks.

Between the abacus and the pocket calculator there weren't a lot of leaps directly in mobile computing. However the complementary technologies where falling into place to support the current mobile computing that we enjoy today.

Also I find interesting that throughout the year’s inspiration in the form of science fiction predicted or prompted advances in technology. For example Star Trek is credited as inspiration for the development of the mobile phone.

Famously, the film 2001: A Space Odyssey 2 was referenced in law suits in relation to the development of the tablet computer. Now with growing power and sophistication mobile computing is often discussed in terms of being the new desktop or the new internet.

For more thoughts on this and other topics please refer to my blog on the future of mobile computing.The cloud model as defined by NIST promotes availability and is composed of five essential characteristics, three service models and four deployment models.

2. BRIEF LITERATURE SURVEY

The era of instant on, always available broadband connectivity is altering the media landscape in profound ways. Over the last 2-3 years, the consumption of digital media has evolved significantly. As content is becoming digital and as devices are becoming more powerful and able, the mobile device is playing a central role in how digital media is consumed around the world. The digital rush has helped make mobile a $1.2 trillion industry. As the demand for the mobile content consumption is increasing exponentially, service providers are rushing to enhance their infrastructure to keep up.

The younger generation is growing with the expectation that they can get access to any content from any device anywhere. The constraints and friction that doesn’t allow them to do that are just not acceptable. As such, the mobile industry is scrambling to provide

(3)

tools and technologies that help the digerati access content at will. All this has to be designed and developed against the current network, content, and device constraints and device/network evolution paths. Whether it is the access to the music or the movies for a 15 year old or availability of the entire corporate knowledgebase for a field worker, information will need to be available at a touch of a button or wave of a finger. Companies are investing in the infrastructure and software tools to make this happen.

Consumers are becoming reliant on multiple devices for their media consumption needs and this trend will continue to accelerate. The diversity of devices and the ever- changing consumption behaviours creates a media management problem. Recent research indicates that US Millennia’s (people between the ages of 18-29) have on an average 1159 songs, 51 videos and 1188 pictures stored on their digital devices. Same trends are echoed in China, Japan, Korea and elsewhere.

From the consumer’s point of view, the need for cloud computing is glaringly obvious. As all the electronics around us becomes connected, the manageability of content on these devices will become tedious, as each device will have its own interface and configuration to upload and download media, thus putting the onus on the consumer to manage and maintain. And it is not only the 1:1 computing relationship with the individual that matters but these electronic devices also need to talk to many other entities thus making it a complex many-to-many networking mesh (Figure 1).

2.1 Problem Domain

Why data storage security is needed

The data of owner is stored on the cloud server; once the data is stored the owner does not have that data on his own device. Thus, there is risk related to data security and confidentiality of the data. It is not accepted by the owner that his data/file is disclosed to someone who is not an authorized person. Before discussing why data security is needed there is a need to discuss the security threats to the data stored on the cloud. There are

(4)

following security risk related to data stored on the cloud server. These attacks affect the data stored on the cloud. For owner the integrity of the data is very important. If any unauthorized person performs changes in data of other person then it can harm the integrity of the data. Any person after finding confidential information of other person can harm that person. So, data confidentiality is also a concern of data owner. Authentication of user is also important to verify who the originator of the file is.

2.2 Solution Domain

For the last few years Mobile Cloud Computing has been an active research field, as mobile cloud computing is in initial stage, limited surveys are available in various domain of MCC.

In this paper our main focus is on securing the data storage in mobile cloud computing.

Significant efforts have been devoted in research organizations to build secure mobile cloud computing. This paper explores the various methodologies for data security in Mobile Cloud Computing. Proposed an Energy efficient framework for integrity verification of storage services using incremental cryptography and trusted computing. In this paper the authors provided a framework for mobile devices to provide data integrity for data stored in cloud server. Incremental cryptography has a property that when this algorithm is applied to a document, it is possible to quickly update the result of the algorithm for a modified document, rather than to re-compute it from scratch. In this system design three main entities are involved:

Mobile user (MU): Mobile user/client is a person who utilizes the storage services provided by Cloud service provider (CSP).

Cloud service provider (CSP): CSP provides storage services to client. CSP is also responsible for operating, managing and allocating cloud resources efficiently.

Trusted third party (TTP): TTP installs co processors on remote cloud; who is associated with a number of registered mobile user/client. Co processor provides secret key (SEK) to mobile user and is also responsible for generating message authentication code for mobile client.

3. MOTIVATION & PROBLEM FORMULATION

The primary constraints for mobile cloud computing are limited energy and wireless bandwidth. So the motivation behind this paper is to test weather cloud applications good solution to improving battery lifetime of mobile device.

The last decade brought with it several advancements in the way we perceive computing and mobility. Computing will be the 5th utility (after water, electricity, gas and telephony) and will provide the basic level of computing service that is considered essential to meet everyday needs of the general community. Cloud Computing is the latest paradigm proposed to deliver this vision. It has proved to be a promising solution for mobile computing for many reasons (e.g. mobility, communication and portability).

3.1 Resource Poverty

As processors are getting faster, screens are getting sharper and devices are equipped with more sensors, a Smartphone’s ability to consume energy far outstrips the battery’s ability to provide it. Thus, battery life of mobile devices remains a key limiting factor in the design of mobile applications. The two main contributors are a) limited battery capacity and b) an increasing demand from users for energy-hungry applications. User demand is increasing by the day for resource intensive applications, like video games, streaming video and sensors equipped on mobile devices that produce continuous streams of data about the user’s environment. Several solutions have been proposed to enhance the CPU performance and to manage the resources available optimally in order to reduce power consumption.

These solutions, however, require changes in the structure of mobile devices or require new hardware resulting in additional engineering necessary and thus have cost premium over standard devices. Computation offloading techniques migrate the large computations and complex processing from resource limited devices to resourceful devices, thus avoiding mobile devices to take a large execution time. Several experiments have been done that evaluate the effectiveness of offloading techniques. Alenxey Rudenko et al. have demonstrated in that remote execution of large tasks can reduce their power consumption by up to 50%. Eduardo Cuervo et al. have shown in that using MAUI (Memory Arithmetic

(5)

Unit and interface) to migrate mobile components to servers in the cloud can save 27% of energy consumption for computer games and 45% for the chess game.

3.2 Data Storage Capacity and Processing Power

Storage is also a major concern for mobile devices. MCC is developed to enable mobile users to store and access large amounts of data on the cloud. Amazon Simple Storage Service (S3) is one such example. It provides a simple web services interface that can be used to store and retrieve any amount of data, at anytime from anywhere on the web. Flicker is almost certainly the best photo sharing application based on MCC. It allows users to uploadand share photos through mobile devices and web. Facebook is the most successful social network application today and is also a typical example of using cloud in sharing images.

MCC also helps reduce the running cost for compute-intensive applications. Cloud computing efficiently supports various tasks for data-warehousing, managing and synchronizing multiple documents online. Thus, mobile devices are no more constrained by storage capacity because their data is now stored on the cloud. Microsoft will develop new office software to embrace cloud computing to fully integrate with all types of mobile devices. It will enable users to save, publish and share their work with other users as well as their desktop computers and mobile devices.

3.3 Objectives & Scope

Mobile Phone application are exploding in popularity and demanding more computing resources to perform compute intensive tasks. Despite the rapid development of heterogeneous set of mobiles devices, they are intrinsically limited by storage, processing power and battery lifetime. Hence, there is an increasing need for abundant resources offered by cloud for the benefit of mobile phones, thus rendering a new research area called the mobile cloud computing. The three major cloud services such as Saas, Paas and Iaas can be rendered to mobile users by means of MCC. Hence, the objective of this paper is to highlight the key issues with respect to bridging the mobile and cloud environment.

4. METHODOLOGY/RESEARCH PLAN

We believe there are still lots to be done form Cloud programming model. The key is to hide the complexity from the developers, and support legacy applications with minimal or no change. We believe the key challenge is to support mobile perception applications. These applications often require cognition and recognition from user input data. These tasks are computational intensive even when operated on user input data alone. In addition, these tasks often involve computation on “big data”. For example, speech recognition or language translation benefits from matching user input data with these big data. Many perception applications make use of the Open CV library to process images or videos. Instead of letting every such application to program in the Odessa model, we propose to provide system support for offloading tasks of Open CV. Our system, m Cloud CV will determine in run time whether a Opens task should run local or offload to the cloud. We believe there is a need for reliability. For example, suppose an application offloads a bank transaction to the cloud using RPC. If the transaction succeeds, but RPC fails to return to the client. The client may perform the same transaction directly. This may end up with executing the transaction two times, e.g. debit 2X dollars instead of X dollars. Orleans provide reliability.

However, it does not support existing applications. The question is, can we provide reliability without changing existing applications?

Our vision and research agenda Our vision of a Cloud architecture is the seamless integration of cloudlet and public cloud, and infrastructure specialization for mobile applications. We believe the dominant architecture will be the regional data centers of public cloud providers. Cloudlet is necessary to reduce the delay of latency sensitive perception applications. There are two convincing deployment settings. One is for wireless providers to deploy cloudlet like nodes within their wireless access networks as a premium service for its subscribers. The other is for cloud providers to co-locate cloud resources in wireless access networks through co-location agreement with wireless providers. For optimal performance, we believe the middle tier needs to be integrated with the region data centers of public cloud seamlessly. Seamless integration requires the following:

(6)

The network needs to support high bandwidth and low latency connection to the regional data centers of public cloud. This can be achieved through various VPN technologies such as BGP/MPLS VPN. This support is crucial for fast migration of computation and data from Cloud let to the public cloud due to local resource overload.

Cloud let and public cloud needs to support high performance VM migration. When Cloud let faces resource limitation, this support makes it easy for the Cloud let to seamlessly migrate the VM to the public cloud. Support for RPC, thread migration can also be very helpful.

Cloud let and public cloud should have a common computing platform, and the cloud should support “automatic resource augmentation”. For example, a computing job at Cloudlet may have access to a few V Ms. When the job is migrated to and executed in the cloud, the cloud should automatically expand the job to use many more VMS, e.g.

hundreds according to application needs or service agreements. Map Reduce is such a common computing platform which makes automatic resource augmentation easier.

Cloudlet should store a copy of persistent data to the public cloud, and should keep this loosely synchronized. As the Cloud example shows, public cloud infrastructure needs to be specialized for mobile applications. We believe server, file system, networking, and me cache technologies should all be specialized for mobile applications. In our future research, we will pursue these open research topics.

4.1 Expected Outcome

Today’s mobile applications are demanding compute intensive capabilities such as speech recognition, natural language processing, computer vision and graphics, machine learning, augmented reality, planning and decision making. These demands will not be met solely by making more powerful mobile devices. Mobile computing is poised to demand fundamental changes to cloud computing such as programming models to enable seamless remote execution, a low-latency middle tier, cloud infrastructure optimization for mobile applications, basic mobile cloud services such as presence services, me cache services etc.

In this paper, we envision that these fundamental new capabilities will enable mobile users to seamlessly utilize the cloud to obtain the resource benefits without incurring delays and jitters and without worrying about energy. By thus empowering mobile users, mobile computing will be able to break free of the fundamental constraints that have been keeping us from transform many areas of human activity. We envision the future of mobile computing applications will be built on top of a rich Eco-system of basic mobile cloud services. We are pursuing many of the research topics outlined in this paper.

5. CONCLUSION

Mobile cloud computing is one of mobile technology trends in the future since it combines the advantages of both mobile computing and cloud computing, thereby providing optimal services for mobile users. The requirement of mobility in cloud computing gave birth to Mobile cloud computing. MCC provides more possibilities for access services in convenient manner. It is expected that after some years a number of mobile users will going to use cloud computing on their mobile devices. According to a recent study by ABI Research, a New York-based firm, more than 270 billion business will use cloud services through mobile devices by 2020. The attraction will push the revenue of mobile cloud computing to $5.2 billion. With this importance, this paper has provided an overview of mobile cloud computing in which its definitions, security, issues and advantages have been presented.

Mainly it discussed about security of data stored in cloud and importance of data security.

This paper has explored a number of mechanisms for providing data security so that Mobile Cloud Computing can be widely accepted by a number of users in future. It also proposed a mechanism to provide confidentiality, access control as well as integrity to mobile users.

REFERENCE

1. http://www.idc.com

2. IBSG Cisco, “Mobile Consumers reach for the Cloud”

3. Peter Mell, Tim Grance, “The NIST definition of Cloud Computing”, v15.

4. Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang, Anand Ghalsasi, “Cloud Computing – The business

5. perspective”, Decision Support Systems, Volume 51, Issue 1, Pages 176-189, 2011

(7)

6. Han Qi, Abdullah Gani, “Research on Mobile Cloud Computing: Review,Trend and Perspectives” in Proceedings of the

7. Second International Conference on Digital Information and Communication Technology and its Applications (DICTAP),IEEE, Pages 195-202, 2012

8. Xiaopeng Fan, Jiannong Cao, and Haixia Mao, “A Survey on Mobile Cloud Computing”, ZTE Corporation 9. http://cloudcomputingtopics.com/2011/05/the-mobile-cloud-why-its-so-important/

10. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang, “A survey of Mobile Cloud Computing:

Architecture,

11. Applications and Approaches”, Wireless Communications and Mobile Computing, 2011

Referensi

Dokumen terkait

With the cloud computing technology, users use a variety of devices, including PCs, laptops, smartphones, and PDAs to access programs, storage, and application-development

After the load balancing, the modified dynamic energy-aware cloudlet-based mobile cloud computing model MDECM was shown to reduce the service rate and energy of mobile devices, thereby

RELATED RESEARCH WORKS The security of utilizations manages the assurance of mobile applications or mobile application models, which utilize the Cloud assets to offer better types of

Comparative Analysis of IoT Computing Paradigms Computing Edge Fog Mobile- Cloud / Mobile This Study Nodes Location Close Remote- based Remote- based Close Scope

Internet yang Identik dengan Cloud Tati Ernawati, 2013 3.2.Model Layanan Cloud Computing Layanan pada cloud computing terdapat tiga model layanan dengan perbandingan dari segi

[10] The term "cloud computing" refers to a service delivery model that allows users to access a shared pool of configurable computing resources such as networks, servers, storage,

ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i4.14896  1983 Mobile cloud game in high performance computing