Mobile Cloud Computing Service Models: A User-Centric Approach

Dijiang Huang, Tianyi Xing, and Huijun Wu, Arizona State University Abstract
Mobile devices are rapidly becoming the major service participants nowadays. However, traditional client-server based mobile service models are not able to meet the increasing demands from mobile users in terms of services diversity, user experience, security and privacy, and so on. Cloud computing enables mobile devices to offload complex operations of mobile applications, which are infeasible on mobile devices alone. In this article, we provide a comprehensive study to lay out existing mobile cloud computing service models and key achievements, and present a new user-centric mobile cloud computing service model to advance existing mobile cloud computing research.


oday, the Internet web service is the main way we access information from fixed or mobile terminals. Some of the information is stored in Internet clouds, where computing, communication, and storage are common services provided for Internet users. In the non-distant future, many of our queries will be beyond the current Internet scope and will be about the people, physical environments that surround us, and virtual environments with which we will be involved. With the Internet environment improving, mobile phones are overtaking PCs as the most common web access entities worldwide by 2013 as predicted by Gartner [1]. Current mobile devices have many advanced features such as mobility, communication, and sensing capabilities, and can serve as the personal information gateway for mobile users. However, when running complex data mining and storing operations, the computation, energy, and storage limitations of mobile devices demand an integrated solution relying on cloud-based computation and storage support. As a result, a new research field, called mobile cloud computing (MCC), is emerging. In MCC, a mobile entity can be considered as either a physical mobile device or a mobile computing/storage software agent within a virtualized cloud resource provisioning system. In the latter view of the cloud system, a software agent’s main functionality is the mobility associated with software codes. In other words, mobile cloud applications may migrate or compose software codes in the distributed MCC resource provisioning environment. Mobile cloud services will account for delay, energy consumption, real-time entity presence, information caching capabilities, networking and communication connectivity, data protection and sharing requirements, and so on. By achieving these features, we are actually able to create a new world composed of both physically networked systems and virtualized entities that are mapped to the physical systems, preserving and in some cases extending their functions and capabilities. MCC distinguishes its research focuses on tight interaction between, and construction and integration of, the cyber physical system (CPS) and cyber virtual system (CVS), in which the CPS is immensely composed by computational and physical smart and mobile entities, and the CVS is mainly formed by

cloud-based virtualized resources and services. Recent developments in augmented reality (AR) have demonstrated some of the application capabilities of MCC. This article first focuses on a comprehensive study of existing MCC service models, and then a user-centric MCC service framework is presented. The rest of this article is arranged as follows. We summarize current mobile cloud service models based on the role of mobile devices. We illustrate the current representatives according to the different service models previously defined. We state the transformation from the traditional Internet cloud to the mobile cloud and highlight features of MCC. The future research directions of MCC are proposed, focusing on a new user-centric service model and corresponding application scenarios. Finally, we conclude this article.

Current Mobile Cloud Service Models
Current Internet clouds have been broadly classified in three service models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). They are classified according to the layers of virtualization. However, due to the involvement of both CPS and CVS, MCC’s service models are more appropriately classified according to the roles of computational entities within its service framework, where the classification of MCC service models can use the roles and relations between mobile entities and their invoked cloud-based resource provisioning. Based on this view, existing MCC services can be classified into three major models: mobile as a service consumer (MaaSC), mobile as a service provider (MaaSP), and mobile as a service broker (MaaSB). These MCC service models are illustrated in Fig. 1, in which arrows indicate service processing flows from service providers to service recipients. MaaSC is originated from the traditional client-server model by introducing virtualization, fine-grained access control, and other cloud-based technologies at the initial stage. Mobile devices can outsource their computation and storage functions onto the cloud in order to achieve better performance and more application capabilities. In this architecture, the service is one-way from the cloud to mobile devices and


0890-8044/13/$25.00 © 2013 IEEE

IEEE Network • September/October 2013

We discuss four major MCC service types and Mobile as a service broker (MaaSB) corresponding representatives. an execution runtime environment that allows unmodified Storage mobility has gradually become a current research mobile applications to seamlessly offload parts of the execufocus. and prefthe main research issues of MCC. mobile devices are able to sense data from the devices and their neighboring environment. Moreover. browsing history. 1. This is and allocating them between mobile devices and clouds can the reason why many smartphone operating systems natively be very inefficient during the application runtime considering implant the multimedia data synchronization feature (iCloud various performance metrics such as energy consumption. tions are built on a centralized data center. Each service or application can be categorized into one or multiple service models. MaaSB extends the cloud edges to mobile devices and wireless sensors. which is appropriCloneCloud serves as an application partitioner as well as ate for Internet clouds. and network delay. Thus. need to be kept in a reliable and protected [4] are two pioneer projects in this area. For example. camera. In this case. In contrast to CloneCloud. Box.Service recipient mobile devices are service consumers. It provides a P2P cloud storage solution online method-level offloading. and further provide sensing services to other mobile devices through the cloud. and of a complete smartphone system. The offloading tion for smartphones. MAUI in the near future) along with each device’s location history to allows modifying offloading applications at the coding level to distribute data items between smartphones and the cloud. For example. modems. with onboard sensors (GPS module. ed by the cloud rather than providing services for other users. Google Drive for CPU usage. etc. such as gently offload the computation tasks onto the cloud is one of location traces. for iOS. In Fig. Most existing MCC services fall into this category. Google Drive. such as Dropbox. and removes the restricnetworked storage devices can all contribute as storage within tions on applications/inputs/environmental conditions by using these storage clouds. consumers receive services provided by both the cloud and mobile devices. maximize the energy saving of mobile devices. set-top-boxes. mobile users’ behavior data. iCloud. It uses filtered replication (a filter decision is made by optimizing execution time and energy expressing the set of data items that are likely to be accessed usage for mobile devices. How to efficiently and intelliAndroid. There are many existing storage services for mobile devices. where MaaSB provides networking and data forwarding services for other mobile devices or sensing nodes. one desired feature of mobile cloud storage services is Computation task offloading is a demanding feature for the automatic synchronization between mobile devices and mobile devices relying on Internet clouds to perform resourcethe cloud. MaaSC is the most common MCC service model Figure 1. CloneCloud [3] and MAUI erence settings. clonecloud [3] provides computation task offloading Mobile Cloud Storage service for mobile devices. WhereStore [7] is a location-based data storage solutions from mobile devices onto a cloud server. the proxy mobile device can also provide security and privacy protections to their interfaced sensors.). a mobile device can be configured as a gateway or proxy providing networking services through various communication approaches such as 3/4G. Skydrive for Windows Phone. Moreover. and WiFi. Thinkair [5] STACEE [8] proposes a peer-to-peer (P2P) cloud storage demands dedicated virtual machines (VMs) in clouds as part where mobile phones. Most existing commercial cloud storage solucally offload computing tasks to the cloud. Both can automatistorage space.). tablets. mobile phones can be used to collect users’ physical activities from Nike Fuelband [2]. MaaSB can be considered as an extension of MaaSP. the mobile device is the service consumer since it only benefits from the service providStorage capacity is another constraint of mobile devices. Bluetooth. Cloud resource Service Service Sensor IEEE Network • September/October 2013 7 . gyroscope. and Skydrive Mobile Cloud Computation [6]. Partitioning computation tasks demands a stable and highly available storage solution. MaaSP is different from MaaSC in that the role of a mobile device is shifted from a service consumer to a service provider. The types of services provided by mobile devices are diverse based on their sensing and processing capabilities. Service AP Cloud resource Mobile as a service consumer (MaaSC) Service AP Cloud resource Service recipient Service provider Mobile as a service provider (MaaSP) Service AP Existing Mobile Cloud Applications broker networks recipient We summarize existing MCC services and applications in Table 1. because most existing mobile devices are still restricted by their computation and energy capacities. Multimedia data generated by mobile devices intensive computation tasks. Besides manually uploading the files or data onto the cloud. etc. personal contacts. Current service models of MCC. As an example. MaaSB is desired under some circumstances because mobile devices usually have limited sensing capability compared to sensors that are dedicated for specially designed functionalities and sensing locations.

in which a reliable and secure connection between a mobile device and the cloud is the main challenge for this type of solution. the context awareness module provides context information to the application. mobile devices are usually considered as clients of cloud services. remote attestation. An increasing number of security features can be enabled in the cloud. and analyzing personal behavior data based on data mining and machine learning. CloudAV [9] advocates such a cloud-based security model for malware detection for end hosts by providing antivirus as an in-cloud security service. cross-site scripting (XSS). making an appointment. It provides a comprehensive cloud-based security solution including three main components: ZEN (proxy). and addresses the storage issue for mobile users as a quality of service (QoS)-aware scheduling problem. each mobile device has a dedicated mobile cloud engine (MCE) including three modules: decision module.g. a smart mobile device usually serves as an information gateway for mobile users involving various personalized activities such as checking emails. The NanoLog service enables administrators to access any transaction log in real time. Referral services depend on a secure search engine to validate URLs accessed by a mobile device to prevent mobile users from accessing phishing websites. The security of mobile devices can be enhanced under the help of cloud security mechanism including cloud-based secure proxy. Several issues with existing MCC services are explained. Summary of MCC services and applications. Transitions from Internet Clouds to UserCentric Mobile Clouds Current MCC Issues and Transition Directions From the service point of view. locating some interesting spots.e. providing policy-based secure Internet access for mobile devices. As shown by the examples presented in Table 1. where the cloud is in charge of the application-level security such as credit card transactions and user credential management. computing elements on the board to prevent malicious attacks on mobile devices. The publish subscribe module is responsible for establishing the data flow between the mobile application and the MCE. Zscaler [11] is one of the most well-known commercial cloud-based security companies. Finally. With the increasing capability of mobile 8 IEEE Network • September/October 2013 . Google Wallet [12] was developed on a cloud-mobile dual trust root model. and botnets. mobile devices) are clearly defined. current MCC service providers and their customers (i. Box. publish subscribe module. The service (e. For example. content. and so on. in [13]. the ByteScan service enables each ZEN to scan every byte of the web request. central authority (CA). The PageRisk service relies on the ZEN to compute a PageRisk index for every page loaded and enables the administrator to control content served to their users based on an acceptable risk evaluation. from the cloud to mobile devices. GoogleDrive and Skydrive [6] Mobile cloud storage WhereStore [7] STACEE [8] CloudAV [9] Secure Web Referral Services for Mobile Cloud Computing [10] Security and privacy Zscaler [11] Google Wallet [12] Context awareness An Integrated Cloud-Based Framework for Mobile Phone Sensing [13]   Service models MaaSC          MaaSP MaaSB   Table 1. Secure web referral services [10] enable antivirus and antiphishing services through the cloud.. and the expected transition characteristics are also discussed below. and Nanologs server (log server). remote anti-virus. Security and Privacy Security related services aim to provide data security protections through the cloud. and all related data to block malicious actions and data such as viruses. Symmetric MCC service model: Most current MCC service models are asymmetric. iCloud. computing and storage services) direction is mainly unidirectional. and the Google Wallet enabled mobile device is protected by strong trust MCC Context Awareness Nowadays. responses. For example.. Most existing computing models are similar to the traditional client-server service models. and context awareness module. Various cloud-based security services are built based on these components. surfing the web. The decision module handles and regulates the transactions among the different parts of the MCE.MCC services and applications MCC service types Representative approaches CloneCloud [3] Mobile cloud computation MAUI [4] ThinkAir [5] Dropbox. The state-of-the-art solutions lack a unified approach suitable to support diverse applications while reducing the energy consumption and providing intelligent assistance to mobile users.

context awareness modeling. devices. a PF can be highly mobile. where mobile agents (i. MB. To build future user-centric MCC based on the described concepts and requirements.RC Cloud data fusion function cloud servers VC MC CVRC {PF}C VC CVRA Traffic display and advising functions in vehicle {PF}A Video capture (VC) function RA MA Physical-virtual environment integration (offloading. RX = (MX. content discovery. It is desirable to establish a distributed or decentralized trust management framework within the virtualized cloud system to address the privacy concerns of mobile users. in which a vehicle IEEE Network • September/October 2013 9 . mobile devices can also collaboratively execute the applications’ tasks. there could be multiple networking interfaces and services that are available to a user’s device (a wireless sensor network. Moreover.g. etc. 2a. The resources. b) user-centric MCC application model. CVRC) construct a pairwise resource pool. Cloud resources should be collected and allocated according to mobile applications customized for each individual user. data collected from heterogeneous networks might be unstructured or unclassified. Sometimes. we refer such a customizable ad hoc cloud application running system as user-centric MCC. including mobile users’ computing and storage resources into the mobile cloud infrastructure without requiring (or even allowing) administrative privilege can significantly reduce the privacy concerns of mobile users. more work is expected to construct situation awareness services that can be personalized according to individual users in the virtual environment. CVRX). it can also be used for road traffic management. due to the mobility of mobile users and changes in the application running environment. and corresponding networking. communication. accident/hazard detection.) are called provisioning functions (PFs). data fusion. the MCC application functions are not fixed on their running hosts. MC) and their responding cloud virtual resources (CVRA. both mobile devices and the virtualized cloud are service providers as well as clients at the same time. Storing private data in the cloud environment is a big hurdle for most mobile cloud applications. computing. In this user-centric mobile cloud application running environment. storage resources) Integrated provisioning function group for mobile user. PF: Provisioning function (can be composed/offloaded to form MCC applications) (a) (b) Figure 2. the environment. a mobile device. that form an ad hoc cloud application running environment can be customized for each individual user. moreover. a service-oriented application platform is the natural choice for MCC. etc. vehicular network. The cloud should be able to get data from different source networks and then cluster them together to make the data structural and readable in the future. Thus.g. a single data source is not sufficient to support MCC applications in the cloud. the virtualized resource could be hosted in either public or private clouds that are tailored according to users’ preference. This requirement demands that the current centralized cloud be transferred in a distributed or decentralized fashion.. in the physical world. This virtualization-feedback loop model demands a symmetric MCC service model. or a social network). every mobile node can potentially serve as an MCC service provider. User-Centric Mobile Cloud Computing The next-generation MCC applications demand tight integration of the physical and virtual functions running on the mobile devices and cloud servers. 2b. the VC providers are not fixed and are selected by their location. and networking capabilities. For example. For example. In this example. including mobiles. mobile clouds should be shifted from the traditional Internet cloud by using the following principles: • Principle 1: User-centric: MCC applications should be designed in such a way that a user can control their own data and activities with strong privacy and security protection. In the physical world. display. a VC function may not only be used for an individual vehicle. User-centric trust model : Most current cloud trust models are centralized: all mobile entities need to trust the cloud service provider.). cloud servers. and data collection and dissemination. Personalized situation awareness: In the current complicated mobile cloud environment. including both physical and virtualized resources.e. An illustrative vehicle traffic management example is shown in Fig. migration. Design Principles of User-Centric Mobile Cloud Computing Future MCC should be reconsidered as a new service model. storage. and composition) {PF}C CVRB RB MB MCC CVR: Cloud virtual resource (e. social network. and composed and used by multiple applications at the same time. An example of mobile cloud applications: a) MCC application scenario. The user-centric mobile cloud application running environment can be further illustrated in Fig. respectively.. where mobiles (MA.. the virtualized environment should provide intelligent feedback to physical devices to adjust their behaviors or actions in order to provide better virtualized services. both physical and virtual entities) and related resources collectively operate as mobile clouds that enable computing. that is. data sources could be diverse (e. The basic functions used to form this MCC application (VC. CVRB. personal and body area network. Moreover. Moreover. • Principle 2: Service-oriented application platform: Due to the symmetric service model. RX represents user X constructing MCC applications formed by a set of PFs {PF}X running on local or remote resource pools. thus. may request video capture (VC) functions from other vehicles directly (the dashed line) or through a centralized video fusion function to get a holistic view of the entire road intersection. and so on.

Mobile as a representor (MaaR). where Alice has the administrative privilege on the VM to decide which data can be shared and protected (by encryption). The mobility of MCC should be confined through a set of mobile cloud application constraints to maximize efficiency using a set of system performance evaluation metrics such as availability. the CVS has three main types of provisioning resources: computing resource. mobile device). the CVS can provide feedback and control functions in the CPS. Besides physical data being virtualized to a virtual environment. due to the popular Java-based OSGi framework. An Application Scenario Based on the User-Centric MaaR Model To better understand the proposed future MaaR model. Data mining and machine learning algorithms can be used to analyze a mobile user’s situation and perform actions proactively.e. and networking resource. In this way. and their spacial-temporal boundaries. offloading. which also allows for establishing multiple personalized MCC clouds due to different application purposes.e. When user Alice is driving. while the social network collects and generates the social relationship data. we can consider those PFs as the fundamental application components in the MaaR model. while it is possible to allow the CVS to further control the CPS functions in a highly adaptive and dynamic fashion based on the MaaR model. The user’s virtual entity is represented by maintaining seamless communication between the CPS and the CVS. An MCC application is able to control integration of CPS and CVS through a well defined application programming interface (API) and MCC tools. like people in the user’s friend list). Mobile as a Representer: A User-Centric Approach The future mobile cloud service model should be delivered based on the principles illustrated. POEM can greatly improve the adoption of the SoA-based code reuse and composition for MCC. and all these networks can be virtualized at the CVS by performing operations including presenting. which is the essence of MaaR in that the virtual representer represents the real situation of the physical user. MaaR is able to accomplish some tasks that are impossible to realize in current MCC architecture. Users’ behaviors and attributes can be collected from the real world (people. and accessible virtual representation for each user. In MaaR. MaaSC. they may not even know what applications and who may call their provisioned functions beforehand. the mobile devices and clouds are highly interactive. among mobile devices and the cloud) compared to onedirectional (i. each user can be represented by a virtualized entity in the cloud through his/her physical entity (i. MaaR can be regarded as the next-generation MCC service model in that both physical systems and virtual systems are seamlessly integrated through virtualization technologies to provide services. The architecture of MaaR can be found in Fig.e. The traditional Internet cloud is one-way operational as users can only submit data from the CPS to the CVS. Among all these three types of information. For example. The information can be collected and virtualized into the CVS to construct a virtual representation of the mobile device in the cloud for Alice.e. we revisit the vehicular video sensing and collaboration example presented in Fig. correlation information is essential in that it helps to fuse different types of data together into a well formatted one so that the CVS can further perform context awareness. the sensor network carries sensed data. the service flow can be presented as bidirectional arrows. 2a. Moreover. and as a result.Physical representor Service AP Virtual representor Cloud resource Mobile as a service representor (MaaR) Figure 3. In MaaR. which can be composed by mobile cloud service requesters in runtime. 2b. We assume that MaaR service modules are already equipped on many users’ smartphones. The dedicat- 10 IEEE Network • September/October 2013 . A conceptual architecture of MaaR is presented in Fig. computing power.e. the representer is implemented through a set of software agents (i. The correlation information helps the CVS to generate sensing data with social attributes (e. reliable. where both CPS and CVS are integrated as a whole system. driving speed. and so on. It treats the offloading as part of service composition. or mobile devices) in real time and sent to their corresponding virtual entities in the cloud to perform further analysis and processing. caching. personal data that Real user is only accessible from a specific social group. 3. In addition to helping mobile entities execute tasks more efficiently. heterogeneous networks coexist. 4. abstracting. storage. and image/video captured on the road. the mobile application design should not be application-oriented. and correlation information from the CPS will be submitted to the CVS. MaaR provides a personal on-demand execution environment for MCC (POEM) framework [14] to achieve the user-centric MCC service running platform highlighted in Fig. To enable the service-oriented application running environment. In MaaR. • Principle 4: Virtual representation: MCC maintains a trusted. and security protection tasks.. OSGi bundles) on a dedicated VM allocated for Alice. and MaaSB). Besides previously presented service models (i. The virtualized representation can be considered as an assistant for mobile users and performs actions such as sensing a user’s daily activity to build the user’s behavior and activity profiles. POEM is a mobile cloud application execution platform that enables mobile devices to easily discover and compose cloud resources for their applications.. the codes (or computation tasks) are considered as services provided by mobile devices and the cloud. user-centric proactive.. In this way. All data with the spatial. To achieve these features. we present a new user-centric MCC service model called mobile as a representer (MaaR). environment. from a mobile device to the cloud) in previous solutions.g. POEM takes a comprehensive approach by incorporating the OSGi-based [15] service-oriented architecture into MCC. For mobile resource providers. her smartphone uses onboard sensors like a camera or GPS to detect her location.. and delegate the user’s activities in the virtual environment.. MaaR model is presented to support the next-generation user-centric MCC services and applications. • Principle 3: Mobility efficiency: MCC resources should be dynamically allocated and managed according to the need of mobile cloud applications. offloading and migration operations can be multidirectional (i. storage resource. instead. and as a result. it should be functionality-oriented (or serviceoriented). temporal. In the CPS. Practically.. MaaSP. migration.

Covert. [15] OSGi Alliance. In addition to the presented video capturing usage of the application.” Proc. [13] R.D. We first provide a classification and representative achievements of current MCC service models.. http://www. Biographies DIJIANG HUANG (dijiang@asu. Summary This article focuses on the introduction of MCC concepts and is tutorial in nature so that readers are able to have a holistic view of the current development of and vision for user-centric mobile cloud computing..S. iCloud.. http://www. This research is a result of his ONR Young Investigator Program Award. Tsai. http://www. “Clonecloud: Elastic Execution between Mobile Device and Cloud.wu@asu. . 301–14. [7] P. GPS. and mobile cloud Terry. [3] B. He is currently an associate professor in the School of Computing Informatics and Decision System Engineering (CIDSE)at Arizona State University. Symp. Nagarajan.” Proc. student in CIDSE at Arizona State University. TIANYI XING (tianyi. and Services. video/camera). 2012. “Maui: Making Smartphones Last Longer with Code” IEEE Int’l. “Secure Web Referral Services for Mobile Cloud Computing. Computing. received his B. respectively. 2011. in telecommunications engineering from Xidian University and an M. Cuervo et al. Acknowledgment The presented work is sponsored by the ONR Young Investigator Program (YIP) award and NSF grant CPS1239396.. [4] E. Conf.” Proc. is currently a Ph. July 2008. in electronics and information engineering from Huazhong University of Science & Technology in 2007 and 2009. Neumann et al. http://www. 6th Conf. His current research interests are computer networking. [5] S.-T. respectively. [9] J.xing@asu. in electronic engineering from Beijing University of Posts & Telecommunications in 2007 and 2010. degrees from the University of Missouri Kansas City in 2001 and 2004. References [1] M. His research has been sponsored by NSF. Coordination and integration Cyber physical system: complex heterogeneous network systems *Situation-aware *Human-centric Control *Proactive *Security and privacy protection Cyber virtual system: abstracted network systems Correlation Mobile cloud resource provisioning Time Cellular and data networks Physical life Social networks Mobile ad hoc networks Virtual-life Vehicular networks Personal and body networks Mission critical networks *Presentation *Offloading *Abstraction *Caching Virtualization *Migration *Data ce Spa Computing resource Storage resource Networking resource Figure 4. “Gartner: Mobile to Outpace Desktop Web by 2013. which are searchable by Bob so that Bob’s display function can call those functions in real time through either direct P2P connections or a centralized traffic monitoring function provided by a third party. 2013. “CloudAV: N-Version Antivirus in the Network Cloud.” Proc.mobicloud. IEEE Network • September/October 2013 11 . Autonomic Computing in Economics. I. Jahanian. Dropbox and More Compared: What’s the Best Cloud Option?” Technical Review. He has served as an organizer for many international conferences and workshops. V. [14] H. 17th USENIX Security Symp. Chun et al. and computer network security. 1st ACM Wksp. Walshy.” Proc. Then we discuss the transformation from the traditional Internet cloud to the user-centric mobile cloud by listing the issues for current MCC and presenting user-centric MCC and its design principles.E. Finally. “Wherestore: Location-based Data Storage for Mobile Devices Interacting with the and F. Wu and D.E.S. 2012. San Jose. 2010.osgi. MaaR services and applications can also maintain social diagrams for each user. and D. He received his M. “ThinkAir: Dynamic Resource Alloation and Parallel Execution in Cloud for Mobile Code” He worked in Alcatel-Lucent Shanghai Bell as a SIT engineer from July 2009 to July 2011. Huang. 2012. Computer Systems. 2010. degree from Beijing University of Posts and Telecommunications. “Personal On-Demand Execution Environment for Mobile Cloud Computing.D. pp. [8] D.g. His research interests are future Internet. and W. “An Integrated Cloud-Based Framework for Mobile Phone Sensing.Mobile cloud application scenarios APIs and tools .” http://poem. He received a B. Users with MaaR services running on their mobile devices near the bridge can provide sensing functions (e. is currently a Ph.. “Google Drive. and intelligent situation-aware decision making that are personalized for Alice’s use. For example. and Service Engineering. Applications. “Stacee: Enhancing Storage Clouds Using Edge Devices. data mining. Mobile Sys. Other suggestions may relate to Bob’s daily activities and job functions according to his current location. Fakoor et al. the MaaR service representer of Bob can prepare for suggestions such as good nearby restaurants with high rates by Bob’s trusted friends. Stued. and M. and provide resources promptly when Bob needs them. student in CIDSE at Arizona State University.E. the VM can be hosted in a public or private cloud as Alice chooses. E. In this model.. Cooke. He received his B.zscaler. [12] Google Inc. Hewlett Packard. [6] A. H. ARO. in 1995.” Proc. ed VM is the application holder for Alice to incorporate various data processing models and functions for security. when Bob is driving in the area during lunchtime. and Consortium of Embedded Systems (CES). 2013. an MaaR service model with an illustrative example is presented for achieving the user-centric MCC. security. 2010.” Online Media Daily. NATO. 1st ACM/IEEE Wksp. ACM SIGCOMM MCC Wksp. mobile cloud service framework. These personalized suggestions are based on correlating the location and various sensed data by the MaaR service Int’l... respectively. ONR. and Ph. IEEE INFOCOM. User Bob may want to know the current traffic status around the bridge five miles ahead where Alice is driving.. . Mohomed. Le Xu.. and cloud computing. He worked in Microsoft Research Asia as a research intern from July to December 2009..E. [2] Nike Inc.asu.. HUIJUN WU (huijun. Kosta et al. . MaaR conceptual architecture. His research interests are mobile cloud [11] Zscaler Inc. Mobile Cloud. CA. mobile cloud computing. Mobile Cloud Computing & Services: Social Networks and Beyond. He is an Associate Editor of the Journal of Network and System Management and an Editor of IEEE Communications Surveys and Tutorials. China. [10] D.

Sign up to vote on this title
UsefulNot useful