• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

A lightweight secure cyber foraging infrastructure for resource-constrained devices. In: (2004)

by S Goyal, J Carter
Venue:Proc. of WMCSA,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 45
Next 10 →

Slingshot: Deploying Stateful Services in Wireless Hotspots

by Ya-yunn Su, Jason Flinn - In Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services , 2005
"... Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At first glance, the increasingly ubiquitous deployment of wireless hotspots seems to offer the connectivity needed for rem ..."
Abstract - Cited by 40 (7 self) - Add to MetaCart
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At first glance, the increasingly ubiquitous deployment of wireless hotspots seems to offer the connectivity needed for remote execution. However, we show that the backhaul connection from the hotspot to the Internet can be a prohibitive bottleneck for interactive applications. To eliminate this bottleneck, we propose a new architecture, called Slingshot, that replicates remote application state on surrogate computers co-located with wireless access points. The first-class replica of each application executes on a remote server owned by the handheld user; this offers a safe haven for application state in the event of surrogate failure. Slingshot deploys secondclass replicas on nearby surrogates to improve application response time. A proxy on the handheld broadcasts each application request to all replicas and returns the first response it receives. We have modified a speech recognizer and a remote desktop to use Slingshot. Our results show that these applications execute 2.6 times faster with Slingshot than with remote execution. 1
(Show Context)

Citation Context

...ioning to use given dynamic resource constraints. In contrast, Slingshot takes this selection as a given and provides a mechanism for utilizing surrogate resources. More recently, Balan [2] and Goyal =-=[16]-=- have also proposed cyber foraging infrastructure. Compared to these systems, the major capability added by Slingshot is the ability to execute stateful services on surrogate computers. Data staging [...

Mobile computing: the next decade

by Mahadev Satyanarayanan - In Proc of MCS , 2010
"... “Information at your fingertips anywhere, anytime” has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology, ..."
Abstract - Cited by 34 (2 self) - Add to MetaCart
“Information at your fingertips anywhere, anytime” has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology,
(Show Context)

Citation Context

...ceintensive application execution to compute servers. This approach, called cyber foraging, was proposed almost a decade ago [2, 25]. Since then, many aspects of cyber foraging have been investigated =-=[3, 5, 6, 7, 8, 9, 10, 12, 16, 19, 21, 33]-=-. Today, there is substantial consensus in the research community that offloading resource-intensive application execution is a core technique in mobile computing. However, what has not been investiga...

Securing elastic applications on mobile devices for cloud computing

by Xinwen Zhang, Joshua Schiffman, Anugeetha Kunjithapatham, Sangoh Jeong - In Proc. of ACM Cloud Computing Security Workshop , 2009
"... Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim ..."
Abstract - Cited by 29 (2 self) - Add to MetaCart
Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.
(Show Context)

Citation Context

...everaged in our elastic framework to enhance the trustworthiness of weblet containers running on the cloud. Goayl and Carter propose a secure cyber foraging mechanism for resource-constrained devices =-=[10]-=-. However, this mechanism is based on public-key infrastructure, where each VM, device and user should have a public/private key pair. In our approach, we use a simple secret-key based authentication ...

R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges

by Saeid Abolfazli, Zohreh Sanaei, Ejaz Ahmed, Senior Member, Rajkumar Buyya, Senior Member - In: IEEE Communication Surveys & Tutorials. IEEE Communications Society Press, USA
"... approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augm ..."
Abstract - Cited by 17 (3 self) - Add to MetaCart
approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA
(Show Context)

Citation Context

...pare to the surrogates that advocate the latest paradigm shift in mobile augmentation. Software augmentation techniques are classified as remote execution (offloading or cyber foraging) [5]–[8], [10]–=-=[13]-=-, [16]–[18], [25], [29], [30], [33]–[35], [41], [43], [44], [97], remote storage [98], Multi-tier programming [36], [45], [46], live cloud-streaming [99], resource-aware computing [100], [101], and fi...

A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing

by Muhammad Shiraz, Abdullah Gani, Senior Member, Rashid Hafeez Khokhar, Rajkumar Buyya, Senior Member - IEEE Communication Surveys & Tutorials , 2012
"... Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all th ..."
Abstract - Cited by 17 (9 self) - Add to MetaCart
Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potential computing devices, which are constrained by CPU potentials, memory capacity and battery life time. Mobile Cloud Computing (MCC) is the latest practical solution for alleviating this incapacitation by extending the services and resources of computational clouds to SMDs on demand basis. In MCC, application offloading is ascertained as a software level solution for augmenting application processing capabilities of SMDs. The current offloading algorithms offload computational intensive applications to remote servers by employing different cloud models. A challenging
(Show Context)

Citation Context

...ile devices by exploiting available stationary computers in the local environment. The mechanism of outsourcing computational load to remote surrogates in the close proximity is called cyber foraging =-=[30]-=-. ResearchersThis article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 4 IEEE COMMUNICATIONS SURVEYS & TUTORIALS...

Identify Multimedia Cyber Foraging from a Smartphone",

by R Kemp, N Palmer, T Kielmann, F Seinstra, N Drost, J Maassen, H Bal - 11th IEEE International Symposium page(s): 392 - , 2009
"... ..."
Abstract - Cited by 17 (4 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

... deploy itself to any accessable resource that has a Java version installed. The design and implementation of a non Java cyber foraging system based on virtualization on the surrogates is describe by =-=[23]-=-. Using this cyber foraging system they made a smartphone application for speech recognition. Performance evaluation for this application shows increase in responsiveness of 200 times and a reduction ...

Transient Customization of Mobile Computing Infrastructure

by Adam Wolbach, Jan Harkes, M. Satyanarayanan - In Proc. of the MobiVirt 2008 Workshop on Virtualization in Mobile Computing , 2008
"... Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance challenges of running VMs on resource-poor mobile devices. VM execution only occurs in the infrastructure and never on the m ..."
Abstract - Cited by 12 (4 self) - Add to MetaCart
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance challenges of running VMs on resource-poor mobile devices. VM execution only occurs in the infrastructure and never on the mobile device; however, the device may transport and interpret parts of VM state. Kimberley decomposes VM state into a widely-available base VM and a much smaller private VM overlay. The base is downloaded in advance; the overlay is delivered on demand from the mobile device or under its control from a public web site. We have built a prototype of Kimberley, and our experiments confirm the feasibility of this approach. This research was supported by the National Science Foundation (NSF) under grant numbers CNS-0614679 and CNS-0509004. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF or Carnegie Mellon University. Keywords: virtual machine, VM, VirtualBox, cyber foraging, composable computing, Open-Usability often suffers when a mobile device is optimized for size, weight and energy efficiency. On a hand-held device with a small screen, tiny keyboard and limited compute power, it is a
(Show Context)

Citation Context

... possible solution to this problem is to leverage fixed infrastructure to augment the capabilities of a mobile device, using techniques such as dynamically composable computing [11] or cyber foraging =-=[1, 5, 2]-=-. For this approach to work, the infrastructure must be provisioned with exactly the right software needed by the user. This is unlikely to be the case everywhere, especially at global scale. This pap...

Roure: “A Grid service infrastructure for mobile devices

by Tao Guan, David De Roure - First International Conference on Semantics, Knowledge and Grid , 2005
"... Abstract. One of the visions of Grid computing is to access computational resources automatically on demand to deliver the services required with appropriate quality. Because mobile devices are now increasingly common, an infrastructure is required to allow mobile devices to use Grid services, and t ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract. One of the visions of Grid computing is to access computational resources automatically on demand to deliver the services required with appropriate quality. Because mobile devices are now increasingly common, an infrastructure is required to allow mobile devices to use Grid services, and thus enable the execution of complex resource-intensive applications on the resource-constrained devices. We present a system infrastructure that allows local mobile devices to interact with the Grid. Central to this infrastructure is a proxy with the ability of dual connectivity to transfer the request from the mobile device to the Grid. This system infrastructure combines the mobility of mobile devices with the processing power of the Grid. 1
(Show Context)

Citation Context

...omputing capability dynamically on demand by exploiting various nearby high-performance computing infrastructures through ubiquitous networking [2]. A lightweight secure cyber foraging infrastructure =-=[3]-=- for resource-constrained devices has been proposed based on virtual machine technology. Although it does not mention the notion of Grid services, wide-area deployment of such a cyber foraging infrast...

A reference architecture for mobile code offload in hostile environments

by Soumya Simanta, Grace A. Lewis, Kiryong Ha, Mahadev Satyanarayanan - in: Mobile Computing, Applications, and Services , 2013
"... Abstract — Handheld mobile technology can help disaster relief workers and soldiers in the field with tasks such as speech and image recognition, natural language processing, decision-making, and mission planning. However, these applications are computation-intensive, take a heavy toll on battery po ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
Abstract — Handheld mobile technology can help disaster relief workers and soldiers in the field with tasks such as speech and image recognition, natural language processing, decision-making, and mission planning. However, these applications are computation-intensive, take a heavy toll on battery power, and often rely on good connectivity to networks, limiting their practical usefulness in a crisis. This paper presents a reference architecture for mobile devices that overcomes these limitations by exploiting cloudlets — VM-based code offload elements that are in single-hop proximity to mobile devices. Keywords- reference architecture; mobile architecture; mobile systems; code offload; virtual machines; cloud computing I.
(Show Context)

Citation Context

...4].sCyber-foraging addresses the challenges of conservingsbattery power and limited computing power, but does notsaddress the challenges of unreliable networks and dynamicsenvironments [5][6][7][8][9]=-=[10]-=-[11][12][13]. However,smany cyber-foraging strategies rely on the conventionalsInternet or on environments that tightly couple handheldsapplications and servers on which code is offloaded. Thisspaper ...

An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks

by Hongbin Liang, Student Member, Lin X. Cai, Dijiang Huang, Senior Member, Xuemin (sherman Shen, Daiyuan Peng , 2011
"... Abstract—Mobile cloud computing is a promising technique that shifts the data and computing service modules from individual devices to a geographically distributed cloud service architecture. A general mobile cloud computing system is comprised of multiple cloud domains, and each domain manages a po ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract—Mobile cloud computing is a promising technique that shifts the data and computing service modules from individual devices to a geographically distributed cloud service architecture. A general mobile cloud computing system is comprised of multiple cloud domains, and each domain manages a portion of the cloud system resources, such as the Central Processing Unit, memory and storage, etc. How to efficiently manage the cloud resources across multiple cloud domains is critical for providing continuous mobile cloud services. In this paper, we propose a service decision making system for interdomain service transfer to balance the computation loads among multiple cloud domains. Our system focuses on maximizing the rewards for both the cloud system and the users by minimizing the number of service rejections that degrade the user satisfaction level significantly. To this end, we formulate the service request decision making process as a semi-Markov decision process. The optimal service transfer decisions are obtained by jointly considering the system incomes and expenses. Extensive simulation results show that the proposed decision making system can significantly improve the system rewards and decrease service disruptions compared with the greedy approach. Index Terms—Blocking probability, mobile cloud computing service domain, semi-Markov decision process (SMDP), system rewards. I.
(Show Context)

Citation Context

...e et al. [13] presented a framework that outsources the antivirus services from mobile devices to a cloud. Goyal and Carter proposed a secure cyber foraging mechanism for resource-constrained devices =-=[14]-=-. In [2], Huang et al. presented a mobile cloud computing model that allows the mobile device related operations residing either on mobile devices or dedicated VMs in the cloud. The problem of ensurin...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University