Mobile Cloud Computing Service Models: A User-Centric Approach

Dijiang Huang, Tianyi Xing, and Huijun Wu, Arizona State University Abstract
Mobile devices are rapidly becoming the major service participants nowadays. However, traditional client-server based mobile service models are not able to meet the increasing demands from mobile users in terms of services diversity, user experience, security and privacy, and so on. Cloud computing enables mobile devices to offload complex operations of mobile applications, which are infeasible on mobile devices alone. In this article, we provide a comprehensive study to lay out existing mobile cloud computing service models and key achievements, and present a new user-centric mobile cloud computing service model to advance existing mobile cloud computing research.

T

oday, the Internet web service is the main way we access information from fixed or mobile terminals. Some of the information is stored in Internet clouds, where computing, communication, and storage are common services provided for Internet users. In the non-distant future, many of our queries will be beyond the current Internet scope and will be about the people, physical environments that surround us, and virtual environments with which we will be involved. With the Internet environment improving, mobile phones are overtaking PCs as the most common web access entities worldwide by 2013 as predicted by Gartner [1]. Current mobile devices have many advanced features such as mobility, communication, and sensing capabilities, and can serve as the personal information gateway for mobile users. However, when running complex data mining and storing operations, the computation, energy, and storage limitations of mobile devices demand an integrated solution relying on cloud-based computation and storage support. As a result, a new research field, called mobile cloud computing (MCC), is emerging. In MCC, a mobile entity can be considered as either a physical mobile device or a mobile computing/storage software agent within a virtualized cloud resource provisioning system. In the latter view of the cloud system, a software agent’s main functionality is the mobility associated with software codes. In other words, mobile cloud applications may migrate or compose software codes in the distributed MCC resource provisioning environment. Mobile cloud services will account for delay, energy consumption, real-time entity presence, information caching capabilities, networking and communication connectivity, data protection and sharing requirements, and so on. By achieving these features, we are actually able to create a new world composed of both physically networked systems and virtualized entities that are mapped to the physical systems, preserving and in some cases extending their functions and capabilities. MCC distinguishes its research focuses on tight interaction between, and construction and integration of, the cyber physical system (CPS) and cyber virtual system (CVS), in which the CPS is immensely composed by computational and physical smart and mobile entities, and the CVS is mainly formed by

cloud-based virtualized resources and services. Recent developments in augmented reality (AR) have demonstrated some of the application capabilities of MCC. This article first focuses on a comprehensive study of existing MCC service models, and then a user-centric MCC service framework is presented. The rest of this article is arranged as follows. We summarize current mobile cloud service models based on the role of mobile devices. We illustrate the current representatives according to the different service models previously defined. We state the transformation from the traditional Internet cloud to the mobile cloud and highlight features of MCC. The future research directions of MCC are proposed, focusing on a new user-centric service model and corresponding application scenarios. Finally, we conclude this article.

Current Mobile Cloud Service Models
Current Internet clouds have been broadly classified in three service models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). They are classified according to the layers of virtualization. However, due to the involvement of both CPS and CVS, MCC’s service models are more appropriately classified according to the roles of computational entities within its service framework, where the classification of MCC service models can use the roles and relations between mobile entities and their invoked cloud-based resource provisioning. Based on this view, existing MCC services can be classified into three major models: mobile as a service consumer (MaaSC), mobile as a service provider (MaaSP), and mobile as a service broker (MaaSB). These MCC service models are illustrated in Fig. 1, in which arrows indicate service processing flows from service providers to service recipients. MaaSC is originated from the traditional client-server model by introducing virtualization, fine-grained access control, and other cloud-based technologies at the initial stage. Mobile devices can outsource their computation and storage functions onto the cloud in order to achieve better performance and more application capabilities. In this architecture, the service is one-way from the cloud to mobile devices and

6

0890-8044/13/$25.00 © 2013 IEEE

IEEE Network • September/October 2013

Google Drive. Moreover. Bluetooth. and prefthe main research issues of MCC. The offloading tion for smartphones. Besides manually uploading the files or data onto the cloud. maximize the energy saving of mobile devices. such as Dropbox. personal contacts. Thinkair [5] STACEE [8] proposes a peer-to-peer (P2P) cloud storage demands dedicated virtual machines (VMs) in clouds as part where mobile phones. MaaSB is desired under some circumstances because mobile devices usually have limited sensing capability compared to sensors that are dedicated for specially designed functionalities and sensing locations. tablets. Both can automatistorage space. This is and allocating them between mobile devices and clouds can the reason why many smartphone operating systems natively be very inefficient during the application runtime considering implant the multimedia data synchronization feature (iCloud various performance metrics such as energy consumption. MaaSC is the most common MCC service model Figure 1. which is appropriCloneCloud serves as an application partitioner as well as ate for Internet clouds. clonecloud [3] provides computation task offloading Mobile Cloud Storage service for mobile devices. For example. How to efficiently and intelliAndroid. In this case. etc.Service recipient mobile devices are service consumers. The types of services provided by mobile devices are diverse based on their sensing and processing capabilities. Most existing MCC services fall into this category. mobile phones can be used to collect users’ physical activities from Nike Fuelband [2].). 1. an execution runtime environment that allows unmodified Storage mobility has gradually become a current research mobile applications to seamlessly offload parts of the execufocus. browsing history. As an example. For example. Service AP Cloud resource Mobile as a service consumer (MaaSC) Service AP Cloud resource Service recipient Service provider Mobile as a service provider (MaaSP) Service AP Existing Mobile Cloud Applications broker networks recipient We summarize existing MCC services and applications in Table 1. and removes the restricnetworked storage devices can all contribute as storage within tions on applications/inputs/environmental conditions by using these storage clouds. Google Drive for CPU usage. a mobile device can be configured as a gateway or proxy providing networking services through various communication approaches such as 3/4G. We discuss four major MCC service types and Mobile as a service broker (MaaSB) corresponding representatives. tions are built on a centralized data center. CloneCloud [3] and MAUI erence settings. and network delay. iCloud. Moreover. Box. Most existing commercial cloud storage solucally offload computing tasks to the cloud. the mobile device is the service consumer since it only benefits from the service providStorage capacity is another constraint of mobile devices. Partitioning computation tasks demands a stable and highly available storage solution. etc. ed by the cloud rather than providing services for other users. set-top-boxes. Current service models of MCC. MAUI in the near future) along with each device’s location history to allows modifying offloading applications at the coding level to distribute data items between smartphones and the cloud. and further provide sensing services to other mobile devices through the cloud. Thus. and Skydrive Mobile Cloud Computation [6]. It provides a P2P cloud storage solution online method-level offloading. consumers receive services provided by both the cloud and mobile devices. It uses filtered replication (a filter decision is made by optimizing execution time and energy expressing the set of data items that are likely to be accessed usage for mobile devices. one desired feature of mobile cloud storage services is Computation task offloading is a demanding feature for the automatic synchronization between mobile devices and mobile devices relying on Internet clouds to perform resourcethe cloud. and WiFi. where MaaSB provides networking and data forwarding services for other mobile devices or sensing nodes. gyroscope. mobile users’ behavior data. with onboard sensors (GPS module. There are many existing storage services for mobile devices. MaaSB extends the cloud edges to mobile devices and wireless sensors. because most existing mobile devices are still restricted by their computation and energy capacities. MaaSB can be considered as an extension of MaaSP.). In Fig. such as gently offload the computation tasks onto the cloud is one of location traces. camera. need to be kept in a reliable and protected [4] are two pioneer projects in this area. for iOS. WhereStore [7] is a location-based data storage solutions from mobile devices onto a cloud server. In contrast to CloneCloud. Each service or application can be categorized into one or multiple service models. and of a complete smartphone system. Skydrive for Windows Phone. modems. Cloud resource Service Service Sensor IEEE Network • September/October 2013 7 . mobile devices are able to sense data from the devices and their neighboring environment. the proxy mobile device can also provide security and privacy protections to their interfaced sensors. MaaSP is different from MaaSC in that the role of a mobile device is shifted from a service consumer to a service provider. Multimedia data generated by mobile devices intensive computation tasks.

The decision module handles and regulates the transactions among the different parts of the MCE. computing and storage services) direction is mainly unidirectional. For example. surfing the web. Most existing computing models are similar to the traditional client-server service models. locating some interesting spots. Various cloud-based security services are built based on these components. and analyzing personal behavior data based on data mining and machine learning. Symmetric MCC service model: Most current MCC service models are asymmetric. where the cloud is in charge of the application-level security such as credit card transactions and user credential management.MCC services and applications MCC service types Representative approaches CloneCloud [3] Mobile cloud computation MAUI [4] ThinkAir [5] Dropbox. With the increasing capability of mobile 8 IEEE Network • September/October 2013 .. It provides a comprehensive cloud-based security solution including three main components: ZEN (proxy). and botnets. the context awareness module provides context information to the application. The PageRisk service relies on the ZEN to compute a PageRisk index for every page loaded and enables the administrator to control content served to their users based on an acceptable risk evaluation. and so on. iCloud. cross-site scripting (XSS). The NanoLog service enables administrators to access any transaction log in real time. remote anti-virus.e. and the expected transition characteristics are also discussed below.g. each mobile device has a dedicated mobile cloud engine (MCE) including three modules: decision module. from the cloud to mobile devices. Finally. Secure web referral services [10] enable antivirus and antiphishing services through the cloud. GoogleDrive and Skydrive [6] Mobile cloud storage WhereStore [7] STACEE [8] CloudAV [9] Secure Web Referral Services for Mobile Cloud Computing [10] Security and privacy Zscaler [11] Google Wallet [12] Context awareness An Integrated Cloud-Based Framework for Mobile Phone Sensing [13]   Service models MaaSC          MaaSP MaaSB   Table 1. and context awareness module. Several issues with existing MCC services are explained. mobile devices are usually considered as clients of cloud services. Box. The service (e. providing policy-based secure Internet access for mobile devices. and the Google Wallet enabled mobile device is protected by strong trust MCC Context Awareness Nowadays. mobile devices) are clearly defined. For example. Referral services depend on a secure search engine to validate URLs accessed by a mobile device to prevent mobile users from accessing phishing websites. in which a reliable and secure connection between a mobile device and the cloud is the main challenge for this type of solution. Zscaler [11] is one of the most well-known commercial cloud-based security companies. responses. remote attestation. making an appointment. Security and Privacy Security related services aim to provide data security protections through the cloud. Summary of MCC services and applications. a smart mobile device usually serves as an information gateway for mobile users involving various personalized activities such as checking emails. Transitions from Internet Clouds to UserCentric Mobile Clouds Current MCC Issues and Transition Directions From the service point of view. CloudAV [9] advocates such a cloud-based security model for malware detection for end hosts by providing antivirus as an in-cloud security service. The publish subscribe module is responsible for establishing the data flow between the mobile application and the MCE. central authority (CA). publish subscribe module. and all related data to block malicious actions and data such as viruses. content. An increasing number of security features can be enabled in the cloud. and Nanologs server (log server). The security of mobile devices can be enhanced under the help of cloud security mechanism including cloud-based secure proxy. computing elements on the board to prevent malicious attacks on mobile devices. The state-of-the-art solutions lack a unified approach suitable to support diverse applications while reducing the energy consumption and providing intelligent assistance to mobile users. the ByteScan service enables each ZEN to scan every byte of the web request.. current MCC service providers and their customers (i. in [13]. and addresses the storage issue for mobile users as a quality of service (QoS)-aware scheduling problem. As shown by the examples presented in Table 1. Google Wallet [12] was developed on a cloud-mobile dual trust root model.

including mobiles. more work is expected to construct situation awareness services that can be personalized according to individual users in the virtual environment.. accident/hazard detection. To build future user-centric MCC based on the described concepts and requirements. User-Centric Mobile Cloud Computing The next-generation MCC applications demand tight integration of the physical and virtual functions running on the mobile devices and cloud servers. Moreover. including both physical and virtualized resources. the MCC application functions are not fixed on their running hosts. and composition) {PF}C CVRB RB MB MCC CVR: Cloud virtual resource (e. CVRB. An illustrative vehicle traffic management example is shown in Fig. Moreover. mobile clouds should be shifted from the traditional Internet cloud by using the following principles: • Principle 1: User-centric: MCC applications should be designed in such a way that a user can control their own data and activities with strong privacy and security protection. both physical and virtual entities) and related resources collectively operate as mobile clouds that enable computing. Cloud resources should be collected and allocated according to mobile applications customized for each individual user. and so on. and corresponding networking. thus. that is. migration.e. including mobile users’ computing and storage resources into the mobile cloud infrastructure without requiring (or even allowing) administrative privilege can significantly reduce the privacy concerns of mobile users. a PF can be highly mobile. The cloud should be able to get data from different source networks and then cluster them together to make the data structural and readable in the future. every mobile node can potentially serve as an MCC service provider. where mobile agents (i. due to the mobility of mobile users and changes in the application running environment. and composed and used by multiple applications at the same time. the environment. This virtualization-feedback loop model demands a symmetric MCC service model. a VC function may not only be used for an individual vehicle. The resources. CVRX). 2a. and networking capabilities. both mobile devices and the virtualized cloud are service providers as well as clients at the same time. there could be multiple networking interfaces and services that are available to a user’s device (a wireless sensor network. moreover. devices. For example. etc. context awareness modeling.. etc. Personalized situation awareness: In the current complicated mobile cloud environment.g. Sometimes. Design Principles of User-Centric Mobile Cloud Computing Future MCC should be reconsidered as a new service model.RC Cloud data fusion function cloud servers VC MC CVRC {PF}C VC CVRA Traffic display and advising functions in vehicle {PF}A Video capture (VC) function RA MA Physical-virtual environment integration (offloading. communication. PF: Provisioning function (can be composed/offloaded to form MCC applications) (a) (b) Figure 2. In this example. content discovery. The user-centric mobile cloud application running environment can be further illustrated in Fig. or a social network). RX = (MX.) are called provisioning functions (PFs). • Principle 2: Service-oriented application platform: Due to the symmetric service model. 2b. User-centric trust model : Most current cloud trust models are centralized: all mobile entities need to trust the cloud service provider. CVRC) construct a pairwise resource pool. data sources could be diverse (e. and data collection and dissemination. Storing private data in the cloud environment is a big hurdle for most mobile cloud applications. b) user-centric MCC application model. This requirement demands that the current centralized cloud be transferred in a distributed or decentralized fashion. the virtualized environment should provide intelligent feedback to physical devices to adjust their behaviors or actions in order to provide better virtualized services. respectively. For example. The basic functions used to form this MCC application (VC. the virtualized resource could be hosted in either public or private clouds that are tailored according to users’ preference.). computing. we refer such a customizable ad hoc cloud application running system as user-centric MCC. the VC providers are not fixed and are selected by their location. in the physical world. In the physical world. display. personal and body area network. vehicular network. In this user-centric mobile cloud application running environment.. MC) and their responding cloud virtual resources (CVRA. cloud servers. data fusion. where mobiles (MA. MB. Thus. social network. a service-oriented application platform is the natural choice for MCC. RX represents user X constructing MCC applications formed by a set of PFs {PF}X running on local or remote resource pools. a mobile device. An example of mobile cloud applications: a) MCC application scenario. data collected from heterogeneous networks might be unstructured or unclassified. a single data source is not sufficient to support MCC applications in the cloud. it can also be used for road traffic management. storage resources) Integrated provisioning function group for mobile user. Moreover. mobile devices can also collaboratively execute the applications’ tasks. that form an ad hoc cloud application running environment can be customized for each individual user. in which a vehicle IEEE Network • September/October 2013 9 . storage. may request video capture (VC) functions from other vehicles directly (the dashed line) or through a centralized video fusion function to get a holistic view of the entire road intersection.g. It is desirable to establish a distributed or decentralized trust management framework within the virtualized cloud system to address the privacy concerns of mobile users.

POEM is a mobile cloud application execution platform that enables mobile devices to easily discover and compose cloud resources for their applications. and so on. the mobile application design should not be application-oriented. and correlation information from the CPS will be submitted to the CVS. and as a result.g. Moreover. and accessible virtual representation for each user. Among all these three types of information.e. environment. we revisit the vehicular video sensing and collaboration example presented in Fig. In this way. • Principle 3: Mobility efficiency: MCC resources should be dynamically allocated and managed according to the need of mobile cloud applications.. which is the essence of MaaR in that the virtual representer represents the real situation of the physical user. and delegate the user’s activities in the virtual environment. For example. where Alice has the administrative privilege on the VM to decide which data can be shared and protected (by encryption). For mobile resource providers. The correlation information helps the CVS to generate sensing data with social attributes (e.e. caching. • Principle 4: Virtual representation: MCC maintains a trusted. like people in the user’s friend list). and networking resource. 4. An Application Scenario Based on the User-Centric MaaR Model To better understand the proposed future MaaR model. MaaSP. The virtualized representation can be considered as an assistant for mobile users and performs actions such as sensing a user’s daily activity to build the user’s behavior and activity profiles. A conceptual architecture of MaaR is presented in Fig. Besides physical data being virtualized to a virtual environment. All data with the spatial. The user’s virtual entity is represented by maintaining seamless communication between the CPS and the CVS. from a mobile device to the cloud) in previous solutions. POEM can greatly improve the adoption of the SoA-based code reuse and composition for MCC. In MaaR. personal data that Real user is only accessible from a specific social group. and image/video captured on the road. and security protection tasks. heterogeneous networks coexist. The mobility of MCC should be confined through a set of mobile cloud application constraints to maximize efficiency using a set of system performance evaluation metrics such as availability. offloading. and as a result. the representer is implemented through a set of software agents (i.e. POEM takes a comprehensive approach by incorporating the OSGi-based [15] service-oriented architecture into MCC.Physical representor Service AP Virtual representor Cloud resource Mobile as a service representor (MaaR) Figure 3. the mobile devices and clouds are highly interactive. abstracting. driving speed. In this way. we can consider those PFs as the fundamental application components in the MaaR model. reliable. Mobile as a representor (MaaR). storage. In MaaR. Practically.e. Besides previously presented service models (i.e. which also allows for establishing multiple personalized MCC clouds due to different application purposes. while it is possible to allow the CVS to further control the CPS functions in a highly adaptive and dynamic fashion based on the MaaR model. offloading and migration operations can be multidirectional (i. we present a new user-centric MCC service model called mobile as a representer (MaaR). Mobile as a Representer: A User-Centric Approach The future mobile cloud service model should be delivered based on the principles illustrated. 2a. Data mining and machine learning algorithms can be used to analyze a mobile user’s situation and perform actions proactively. The traditional Internet cloud is one-way operational as users can only submit data from the CPS to the CVS. We assume that MaaR service modules are already equipped on many users’ smartphones. where both CPS and CVS are integrated as a whole system. among mobile devices and the cloud) compared to onedirectional (i. each user can be represented by a virtualized entity in the cloud through his/her physical entity (i. correlation information is essential in that it helps to fuse different types of data together into a well formatted one so that the CVS can further perform context awareness. The information can be collected and virtualized into the CVS to construct a virtual representation of the mobile device in the cloud for Alice. 2b. MaaSC. mobile device). the CVS has three main types of provisioning resources: computing resource. When user Alice is driving. storage resource. or mobile devices) in real time and sent to their corresponding virtual entities in the cloud to perform further analysis and processing. migration. In MaaR. her smartphone uses onboard sensors like a camera or GPS to detect her location... and all these networks can be virtualized at the CVS by performing operations including presenting. To achieve these features. and their spacial-temporal boundaries. it should be functionality-oriented (or serviceoriented). user-centric proactive. In addition to helping mobile entities execute tasks more efficiently. due to the popular Java-based OSGi framework. An MCC application is able to control integration of CPS and CVS through a well defined application programming interface (API) and MCC tools. they may not even know what applications and who may call their provisioned functions beforehand. The architecture of MaaR can be found in Fig. which can be composed by mobile cloud service requesters in runtime.. the CVS can provide feedback and control functions in the CPS. the codes (or computation tasks) are considered as services provided by mobile devices and the cloud. while the social network collects and generates the social relationship data. MaaR model is presented to support the next-generation user-centric MCC services and applications. MaaR is able to accomplish some tasks that are impossible to realize in current MCC architecture. MaaR can be regarded as the next-generation MCC service model in that both physical systems and virtual systems are seamlessly integrated through virtualization technologies to provide services. In the CPS. The dedicat- 10 IEEE Network • September/October 2013 . instead. MaaR provides a personal on-demand execution environment for MCC (POEM) framework [14] to achieve the user-centric MCC service running platform highlighted in Fig. Users’ behaviors and attributes can be collected from the real world (people. To enable the service-oriented application running environment. and MaaSB). It treats the offloading as part of service composition.. temporal. the sensor network carries sensed data. 3. computing power. OSGi bundles) on a dedicated VM allocated for Alice. the service flow can be presented as bidirectional arrows..

[12] Google Inc.” http://poem.edu.E. MaaR conceptual architecture. [6] A. Cuervo et al. He received his M. and F. ed VM is the application holder for Alice to incorporate various data processing models and functions for security. [15] OSGi Alliance. Coordination and integration Cyber physical system: complex heterogeneous network systems *Situation-aware *Human-centric Control *Proactive *Security and privacy protection Cyber virtual system: abstracted network systems Correlation Mobile cloud resource provisioning Time Cellular and data networks Physical life Social networks Mobile ad hoc networks Virtual-life Vehicular networks Personal and body networks Mission critical networks *Presentation *Offloading *Abstraction *Caching Virtualization *Migration *Data ce Spa Computing resource Storage resource Networking resource Figure 4. He worked in Alcatel-Lucent Shanghai Bell as a SIT engineer from July 2009 to July 2011.. Acknowledgment The presented work is sponsored by the ONR Young Investigator Program (YIP) award and NSF grant CPS1239396. data mining. Tsai. TIANYI XING (tianyi. References [1] M. [3] B. 2012. respectively. and W. He received his B. July 2008.” Proc. and D. Other suggestions may relate to Bob’s daily activities and job functions according to his current location.. 17th USENIX Security Symp.” Proc. 2012. security. and computer network security. He worked in Microsoft Research Asia as a research intern from July to December 2009. In this model. [11] Zscaler Inc. NATO. [7] P. “CloudAV: N-Version Antivirus in the Network Cloud. Symp. . IEEE INFOCOM.mobicloud. Dropbox and More Compared: What’s the Best Cloud Option?” Technical Review. IEEE Network • September/October 2013 11 .. [13] R. His current research interests are computer networking. Oberheide. Applications. degrees from the University of Missouri Kansas City in 2001 and 2004. Wu and D. mobile cloud service framework. “Clonecloud: Elastic Execution between Mobile Device and Cloud. I. Users with MaaR services running on their mobile devices near the bridge can provide sensing functions (e. He has served as an organizer for many international conferences and workshops.. http://www. which are searchable by Bob so that Bob’s display function can call those functions in real time through either direct P2P connections or a centralized traffic monitoring function provided by a third party.com. Stued. and provide resources promptly when Bob needs them. and Ph.” Proc. These personalized suggestions are based on correlating the location and various sensed data by the MaaR service representor. mobile cloud computing. V. Mobile Cloud.D. Biographies DIJIANG HUANG (dijiang@asu. ACM SIGCOMM MCC Wksp. respectively. 2010. “Stacee: Enhancing Storage Clouds Using Edge Devices. He is currently an associate professor in the School of Computing Informatics and Decision System Engineering (CIDSE)at Arizona State University. video/camera). Cooke.com.edu) is currently a Ph. His research interests are mobile cloud application. We first provide a classification and representative achievements of current MCC service models. and cloud computing. 2011. Walshy. Neumann et al.xing@asu. and Consortium of Embedded Systems (CES). and intelligent situation-aware decision making that are personalized for Alice’s use. . 1st ACM/IEEE Wksp. 2010. privacy.google. GPS. Le Xu.” IEEE Int’l. in 1995. http://www. ARO. [2] Nike Inc.g. in electronics and information engineering from Huazhong University of Science & Technology in 2007 and 2009.com/wallet. pp. [9] J.. Mohomed. He is an Associate Editor of the Journal of Network and System Management and an Editor of IEEE Communications Surveys and Tutorials. “An Integrated Cloud-Based Framework for Mobile Phone Sensing. 301–14.D. Computer Systems. Chun et al. Computing.. and M. “Maui: Making Smartphones Last Longer with Code Offload. Summary This article focuses on the introduction of MCC concepts and is tutorial in nature so that readers are able to have a holistic view of the current development of and vision for user-centric mobile cloud computing. [4] E. Then we discuss the transformation from the traditional Internet cloud to the user-centric mobile cloud by listing the issues for current MCC and presenting user-centric MCC and its design principles. student in CIDSE at Arizona State University. China.D.osgi. Fakoor et al...zscaler. For example.” Online Media Daily.. Mobile Sys. the MaaR service representer of Bob can prepare for suggestions such as good nearby restaurants with high rates by Bob’s trusted friends.nike.” Proc. 2012.asu. and Services. San Jose. H. HUIJUN WU (huijun.E..S.org. student in CIDSE at Arizona State University. when Bob is driving in the area during lunchtime. CA. Int’l. “Gartner: Mobile to Outpace Desktop Web by 2013. 1st ACM Wksp. “ThinkAir: Dynamic Resource Alloation and Parallel Execution in Cloud for Mobile Code Offloading. [10] D..wu@asu.” Proc. [5] S. [14] H. Finally.” Proc. ONR. He received a B. “Personal On-Demand Execution Environment for Mobile Cloud Computing. 6th Conf.Mobile cloud application scenarios APIs and tools . Covert.edu) is currently a Ph. His research has been sponsored by NSF. http://www.edu) received his B. [8] D.. in electronic engineering from Beijing University of Posts & Telecommunications in 2007 and 2010. iCloud. Huang.E. “Secure Web Referral Services for Mobile Cloud Computing.” Proc. 2013. Hewlett Packard. an MaaR service model with an illustrative example is presented for achieving the user-centric MCC..-T. “Wherestore: Location-based Data Storage for Mobile Devices Interacting with the Cloud. and Service Engineering. 2010. 2013. MaaR services and applications can also maintain social diagrams for each user. degree from Beijing University of Posts and Telecommunications.E. Jahanian. E. Kosta et al. and mobile cloud computing. In addition to the presented video capturing usage of the application. Mobile Cloud Computing & Services: Social Networks and Beyond. This research is a result of his ONR Young Investigator Program Award. User Bob may want to know the current traffic status around the bridge five miles ahead where Alice is driving. the VM can be hosted in a public or private cloud as Alice chooses. in telecommunications engineering from Xidian University and an M. http://www. Conf. Autonomic Computing in Economics. respectively. “Google Drive. Nagarajan. His research interests are future Internet. .S. Terry. 2010.