Results 1 - 10
of
29
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms
- In Third International ICST Conference on Mobile Wireless Middleware, Operating Systems, and Applications
, 2010
"... Abstract. We propose a new elastic application model that enables the seamless and transparent use of cloud resources to augment the capability of resourceconstrained mobile devices. The salient features of this model include the partition of a single application into multiple components called webl ..."
Abstract
-
Cited by 42 (1 self)
- Add to MetaCart
Abstract. We propose a new elastic application model that enables the seamless and transparent use of cloud resources to augment the capability of resourceconstrained mobile devices. The salient features of this model include the partition of a single application into multiple components called weblets, and a dynamic adaptation of weblet execution configuration. While a weblet can be platform independent (e.g., Java or.Net bytecode or Python script) or platform dependent (native code), its execution location is transparent – it can be run on a mobile device or migrated to the cloud, i.e., run on one or more nodes offered by an IaaS provider. Thus, an elastic application can augment the capabilities of a mobile device including computation power, storage, and network bandwidth, with the light of dynamic execution configuration according to device’s status including CPU load, memory, battery level, network connection quality, and user preferences. This paper presents the motivations, concepts, typical elasticity patterns, and cost consideration of elastic applications. We validate the augmentation capabilities with an implemented reference architecture and example applications. 1
A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing
- IEEE Communication Surveys & Tutorials
, 2012
"... Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all th ..."
Abstract
-
Cited by 17 (9 self)
- Add to MetaCart
(Show Context)
Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potential computing devices, which are constrained by CPU potentials, memory capacity and battery life time. Mobile Cloud Computing (MCC) is the latest practical solution for alleviating this incapacitation by extending the services and resources of computational clouds to SMDs on demand basis. In MCC, application offloading is ascertained as a software level solution for augmenting application processing capabilities of SMDs. The current offloading algorithms offload computational intensive applications to remote servers by employing different cloud models. A challenging
A Survey of Mobile Cloud Computing Application Models
"... Abstract—Smartphones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smartphones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the clou ..."
Abstract
-
Cited by 12 (3 self)
- Add to MetaCart
Abstract—Smartphones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smartphones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic resources for computation, storage, and service provision. Therefore, researchers envision extending cloud computing services to mobile devices to overcome the smartphones constraints. The challenge in doing so is that the traditional smartphone application models do not support the development of applications that can incorporate cloud computing features and requires specialized mobile cloud application models. This article presents mobile cloud architecture, offloading decision affecting entities, application models classification, the latest mobile cloud application models, their critical analysis and future research directions.
Mirroring Smartphones For Good: A Feasibility Study ⋆
"... Abstract. More and more applications and functionalities have been introduced to smartphones, but smartphones have limited resources on computation and battery. To enhance the capacity of smartphones, an interesting idea is to use Cloud Computing and virtualization techniques to shift the workload f ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
(Show Context)
Abstract. More and more applications and functionalities have been introduced to smartphones, but smartphones have limited resources on computation and battery. To enhance the capacity of smartphones, an interesting idea is to use Cloud Computing and virtualization techniques to shift the workload from smartphones to a computational infrastructure. In this paper, we propose a new framework which keeps a mirror for each smartphone on a computing infrastructure in the telecom network. With mirror, we can greatly reduce the workload and virtually expand the resources of smartphones. We show the feasibility of deploying such a framework in telecom networks by protocol design, synchronization study and scalability test. To show the benefit, we introduce two applications where both the computational workload on smartphones and network traffic in telecom networks can be significantly reduced by our techniques. 1
A reference architecture for mobile code offload in hostile environments
- in: Mobile Computing, Applications, and Services
, 2013
"... Abstract — Handheld mobile technology can help disaster relief workers and soldiers in the field with tasks such as speech and image recognition, natural language processing, decision-making, and mission planning. However, these applications are computation-intensive, take a heavy toll on battery po ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
(Show Context)
Abstract — Handheld mobile technology can help disaster relief workers and soldiers in the field with tasks such as speech and image recognition, natural language processing, decision-making, and mission planning. However, these applications are computation-intensive, take a heavy toll on battery power, and often rely on good connectivity to networks, limiting their practical usefulness in a crisis. This paper presents a reference architecture for mobile devices that overcomes these limitations by exploiting cloudlets — VM-based code offload elements that are in single-hop proximity to mobile devices. Keywords- reference architecture; mobile architecture; mobile systems; code offload; virtual machines; cloud computing I.
Towards a Discipline of Mission-Aware Cloud Computing
"... Even as cloud computing gains rapid traction in the commercial marketplace the twin concerns of availability and security remain paramount to potential customers, especially in the enterprise. Concurrently the vision of what cyber security means is itself changing. The US Department of Defense (henc ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
Even as cloud computing gains rapid traction in the commercial marketplace the twin concerns of availability and security remain paramount to potential customers, especially in the enterprise. Concurrently the vision of what cyber security means is itself changing. The US Department of Defense (henceforth DoD) has recently promulgated a new doctrine of mission assurance in contrast to the earlier approach of information assurance. We argue that this concept of mission assurance is equally applicable to the commercial sector, and has high relevance to the availability and security concerns of cloud computing. While the business community may prefer alternate terms such as “business application assurance, ” “business function assurance ” or “mission effectiveness ” we propose to stay with established DoD terminology. Our basic position is that in order to achieve mission assurance in the new paradigm of cloud computing we need to instrument the cloud with hooks and supporting protocols and mechanisms to enable deployment of mission-driven performance, resilience and security policies into the computing and communication infrastructure. The cloud must therefore evolve from its current mission-oblivious state to become mission-aware. This position paper speculates on the research challenges in making this happen.
An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks
, 2011
"... Abstract—Mobile cloud computing is a promising technique that shifts the data and computing service modules from individual devices to a geographically distributed cloud service architecture. A general mobile cloud computing system is comprised of multiple cloud domains, and each domain manages a po ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Mobile cloud computing is a promising technique that shifts the data and computing service modules from individual devices to a geographically distributed cloud service architecture. A general mobile cloud computing system is comprised of multiple cloud domains, and each domain manages a portion of the cloud system resources, such as the Central Processing Unit, memory and storage, etc. How to efficiently manage the cloud resources across multiple cloud domains is critical for providing continuous mobile cloud services. In this paper, we propose a service decision making system for interdomain service transfer to balance the computation loads among multiple cloud domains. Our system focuses on maximizing the rewards for both the cloud system and the users by minimizing the number of service rejections that degrade the user satisfaction level significantly. To this end, we formulate the service request decision making process as a semi-Markov decision process. The optimal service transfer decisions are obtained by jointly considering the system incomes and expenses. Extensive simulation results show that the proposed decision making system can significantly improve the system rewards and decrease service disruptions compared with the greedy approach. Index Terms—Blocking probability, mobile cloud computing service domain, semi-Markov decision process (SMDP), system rewards. I.
An Agent-based Optimization Framework for Mobile-Cloud Computing
"... The proliferation of cloud computing resources in the recent years offers a way for mobile devices with limited resources to achieve computationally intensive tasks in real-time. The mobile-cloud computing paradigm, which involves collaboration between mobile and cloud resources, is expected to beco ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
The proliferation of cloud computing resources in the recent years offers a way for mobile devices with limited resources to achieve computationally intensive tasks in real-time. The mobile-cloud computing paradigm, which involves collaboration between mobile and cloud resources, is expected to become increasingly popular in mobile application development. Dynamic partitioning of ap-plications between mobile and cloud platforms based on resource availability is crucial in achiev-ing the best performance for any computationally intensive mobile application. In this paper, we propose a dynamic performance optimization framework for mobile-cloud computing utilizing mo-bile agent-based application partitions. The proposed framework imposes minimal infrastructural requirements on the cloud servers, therefore exhibiting widespread applicability, as opposed to pre-vious approaches with stricter requirements. Experiments with two real-world mobile applications serve as an initial feasibility study of the proposed framework and demonstrate the superiority of the proposed approach over monolithic execution of resource-intensive applications on mobile devices.
ECOS: Leveraging Software-Defined Networks to Support Mobile Application Offloading
"... Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applicatio ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks to make offloading amenable to adoption by enterprises: (i) ensuring privacy and trustworthiness of offload, (ii) decoupling offloading systems from their reliance on the availability of dedicated resources and (iii) accommodating offload at scale. We present the design and implementation of ECOS, an enterprise-centric offloading framework that leverages Software-Defined Networking to augment prior offloading proposals and address these limitations. ECOS functions as an application running at an enterprise-wide controller to allocate resources to mobile applications based on privacy and performance requirements, to ensure fairness, and to enforce security constraints. Experiments using a prototype based on Android and OpenFlow establish the effectiveness of our approach.
DAuth: Fine-grained Authorization Delegation for Distributed Web Application Consumers
"... Abstract—Web applications are becoming the predominant means by which users interact with online content. However, current authentication approaches use a single authentication credential to manage access permissions, which is too inflexible for distributed programs with unique security and privacy ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Web applications are becoming the predominant means by which users interact with online content. However, current authentication approaches use a single authentication credential to manage access permissions, which is too inflexible for distributed programs with unique security and privacy requirements for each component. In this paper, we introduce DAuth, an authorization mechanism that allows fine-grained and flexible control of access permissions derived from a single authentication credential for distributed consumers of web applications. We implement DAuth as a proxy for a Twitter social networking application within our distributed Elastic Application framework and find it introduces negligible overhead and requires only minor modification of existing applications. Through our evaluation, we demonstrate DAuth improves on existing web authentication mechanisms to support distributed web application consumers and can be implemented as a proxy to web applications that do not wish to develop their own implementation. I.