Performance analysis of Mobile Cloud Computing Architectures for mHealth app

2020 ◽  
Vol 2020 (3) ◽  
pp. 335-1-335-7
Author(s):  
D. Inupakutika ◽  
D. Akopian ◽  
P. Chalela ◽  
A. G. Ramirez

Mobile Health (mHealth) applications (apps) are being widely used to monitor health of patients with chronic medical conditions with the proliferation and the increasing use of smartphones. Mobile devices have limited computation power and energy supply which may lead to either delayed alarms, shorter battery life or excessive memory usage limiting their ability to execute resource-intensive functionality and inhibit proper medical monitoring. These limitations can be overcome by the integration of mobile and cloud computing (Mobile Cloud Computing (MCC)) that expands mobile devices' capabilities. With the advent of different MCC architectures such as implementation of mobile user-side tools or network-side architectures it is hence important to decide a suitable architecture for mHealth apps. We survey MCC architectures and present a comparative analysis of performance against a resource demanding representative testing scenario in a prototype mHealth app. This work will compare numerically the mobile cloud architectures for a case study mHealth app for Endocrine Hormonal Therapy (EHT) adherence. Experimental results are reported and conclusions are drawn concerning the design of the prototype mHealth app system using the MCC architectures.

Mobile Cloud Computing is a combination of general Cloud Computing and Mobile Computing in which we have to access resources from the remote cloud data center with the help of mobile electronics and peripherals like mobile smartphones, laptops, gadgets, etc. via Cellular Technology or Wireless Communication. Mobile devices have lots of resource constraints like storage capacity, processing speed, and battery life. Hence through simple mobile computing software and programming, we cannot manipulate on mobile devices of cloud data center information. Because of such kinds of difficulty, we have to process information or data through external mobile devices. Accessing and processing of data with the help of Trusted Third Party Agency (TPA) outside the cloud data center and mobile devices have lots of security challenges. To make cloud data secure over outside resources, lots of terminologies and theory are put forward by various researchers. In this paper, we will analyze their theory and its limitations and offer our security algorithm proposal. In this thesis article, we analyze the security framework for storing data on Cloud Server by Mobile and limitation of this process. Also, we review the theory of how data can be secure our data on cloud administrators


2018 ◽  
Vol 19 (4) ◽  
pp. 309-337 ◽  
Author(s):  
Rama Subbareddy Somula ◽  
Sasikala R

In recent years, the mobile devices become popular for communication and running advanced real time applications such as face reorganization and online games. Although, mobile devices advanced for providing significant benefits for mobile users. But still, these devices suffers with limited recourses such as computation power, battery and storage space due to the portable size. However, The Cloud Technology overcome the limitations of mobile computing with better performance and recourses. The cloud technology provides enough computing recourses to run mobile applications as storage computing power on cloud platform. Therefore, the novel technology called mobile cloud computing (MCC) is introduced by integrating two technologies (Mobile Computing, Cloud Computing) in order to overcome the limitations(such as Battery life, Storage capacity, Processing capacity) of Mobile Devices by offloading application to recourse rich Remote server. This paper presents an overview of MCC, the advantages of MCC, the related concepts and the technology beyond various offloading frameworks, the architecture of the MCC, Cloudlet technology, security and privacy issues and limitations of mobile cloud computing. Finally, we conclude with feature research directions in MCC.


2016 ◽  
Vol 78 (12-2) ◽  
Author(s):  
Nur Syahela Hussien ◽  
Sarina Sulaiman ◽  
Siti Mariyam Shamsuddin

The current challenge of mobile devices is the storage capacity that has led service providers to develop new value-added mobile services. To address these limitations, mobile cloud computing, which offers on-demand is developed. Mobile Cloud Computing (MCC) is developed to augment device capabilities, facilitating to mobile users store, access to a big dataset on the cloud. Even so, given the limitations of bandwidth, latencies, and device battery life, new responses are required to extend the use of mobile devices. This paper presents a novel design and implementation of developing process on intelligent mobile cloud storage management system, also called as Intelligent Mobile Cloud Computing (IMCC) for android based users. IMCC is important for cloud storage user to make their data effectively and efficiently for saving the user time. IMCC provided convenience for user to use multiple cloud storage using one application and easy for users to store their data to any cloud storage. The result shows using IMCC it only took 8 seconds to access the data, which is faster compared with traditional MCC, it took 23.33 seconds. IMCC reduce 65.71% of latency occur using the MCC in managing a user data. The developed IMCC prototype is accessible through the Google Play Store.


Author(s):  
Rashid Alakbarov

In the paper, the problem of using cloudlet-based mobile cloud computing to solve the issues (resource deficiency and limited energy) that require large computing and memory resources on mobile devices has been studied. Energy-saving of mobile devices, resource limitations in mobile devices, and elimination of network delays are analyzed. It is shown that the solution of mobile users' tasks in the cloud leads to the increased battery life of mobile devices and reduces network delays, which is shown by mathematical calculations. The article considers the balanced distribution of the tasks in the cloudlet network. The paper also deals with the selection of cloudlets according to user requirements. The cases for which a cloud application can be loaded by the user were evaluated and a model was proposed using the possible values that determine the importance of cloudlets (user proximity, high reliability, etc.).


2018 ◽  
Vol 7 (2) ◽  
pp. 80-85
Author(s):  
Lakshna Arun ◽  
T. N. Ravi

Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security). These challenges have a significant effect on the improvement of service qualities. In this paper, a literature survey on the MCC and security issues in MCC has presented.


2020 ◽  
Vol 10 (51) ◽  
pp. 212-222
Author(s):  
Boubakeur Annane ◽  
Adel Alti ◽  
Osman Ghazali

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.


Author(s):  
N. Divya

Cloud computing is a variety of service provider through the internet mobile cloud computing is a simplicity cloud computing in which same mobile devices included among them. As the mobile devices increasing in large number day by day. In existing system Mobile cloud computing used to overcome the limitations of smart phones such as battery life time, limited computational power, size of memory and uncertain network connectivity . To overcome this limitations in offloading technique novel frame work will be used in this files from user are transmitted to cloud in single path. This is more time consuming and takes more time in transmitting files. Proposed system we use this technique in edge cloud computing server to reduce latency and also to reduce energy consumption and perform task with efficiency. In addition parallelization is used for the execution of the method in cloud server to reduce energy and execution time.


Author(s):  
Boubakeur Annane ◽  
Osman Ghazali

The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of the security expert’s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 161
Author(s):  
Sk Sk Mahaboob Sharif ◽  
K V.V Satyanarayana ◽  
M Harsha vardhan ◽  
V Harika

Cloud Computing is an on demand service where resources like online office software and on-line storage are made available as per the users requirement. The word cloud in cloud computing is used as a symbol for internet since it offers various computing services as well as resources  like storage, servers, platforms  and applications are provided to devices over the internet. Mobile cloud computing joins the cloud computing with mobile computing and giving the shopper with limitless pool of useful resource from cloud without hampering mobility of consumer. The mobile cloud computing generation is developing rapidly many of the customers and at the equal time it introduces the early protection threats inside. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting consumer privateers and integrity. So information saved on the cloud have to be encrypted, disallowing unauthorized user to access saved records. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any set of rules or technique used for securing mobile users statistics have to don't forget above constraints for powerful makes use of cloud for portable clients. Most of the mobile devices have nearly equal functionalities, so mobile devices will face some problems associated with security and third parties, by this paper we have given a review of different techniques for secure storage of mobile user’s data in the cloud, their merits and demerits for mobile environment.  


Sign in / Sign up

Export Citation Format

Share Document