Sie sind auf Seite 1von 4

ISSN 2321-8665

Vol.04,Issue.06,
WWW.IJITECH.ORG June-2016,
Pages:0979-0982

Cloud Computing for Emerging Mobile Cloud Apps


B. KALPANA1, SHYAM2
1
PG Scholar, Dept of CSE, Talla Padmavathi College of Engineering, JNTUH, T.S, India.
2
Associate Professor, Dept of CSE, Talla Padmavathi College of Engineering, JNTUH, T.S, India.

Abstract: Cloud computing as an aspect of the app industry B. Network Related Issues
to deal with new mobile app design, network apps, app All processing in MCC is performed on the network. So
designing tools, and the motivation for migrating apps to there are some issues related to the network like Bandwidth,
cloud computing systems. The tutorial will review facts, latency, availability and heterogeneity.
goals and common architectures of mobile cloud computing
systems, as well as introduce general mobile cloud services
for app developers and marketers. This tutorial will highlight
some of the major challenges and costs, and the role of
mobile cloud computing architecture in the field of app
design, as well as how the app-design industry has an
opportunity to migrate to cloud computing systems with low
investment. The tutorial will review privacy and security
issues. It will describe major mobile cloud vendor services to
illustrate how mobile cloud vendors can improve mobile app
businesses. We will consider major cloud vendors, such as
Microsoft Windows Azure, Amazon AWS and Google
Cloud Platform. Finally, the tutorial will survey some of the
cutting-edge practices in the field, and present some
opportunities for future development.

Keywords: Mobile App Design, Mobile Cloud Computing,


Cloud Architecture, Mobile Security, Mobile Privacy
.
I. INTRODUCTION
What is cloud computing?
Cloud computing is the use of computing resources Fig.1. Structure of cloud computing
(hardware and software) that are delivered as a service over
a network (typically the Internet). The name comes from the C. Security
Most of mobile devices have almost same functionalities
common use of a cloud-shaped symbol as an abstraction for
like a desktop computer. So mobile devices also have to face
the complex infrastructure it contains in system diagrams.
a number of problems related to security and privacy. To
Cloud computing entrusts remote services with a user's data,
overcome this problem threat detection services are now
software and computation. Cloud computing consists of
performed at clouds but this also has to face a lot of
hardware and software resources made available on the
challenges. Some security issues are like device security,
Internet as managed third-party services. These services
privacy of mobile user and securing data on cloud etc. There
typically provide access to advanced software applications
are so many security threats like viruses, hacking, Trojan
and high-end networks of server computers.
horses in mobile devices also. The use of global positioning
system (GPS) in mobile devices gives birth to the privacy
II. PROBLEM DESCRIPTION
issues.
A. Limited Resources
Having limited resources in mobile device make use of III. PROPOSED MECHANISM
Extending battery lifetime: Battery is one of the main
cloud computing in mobile devices difficult. Basic
concerns for mobile devices. Several solutions have been
limitations related to limited resources are limited computing
proposed to enhance the CPU performance and to manage
power, limited battery and low quality display.
the disk and screen in an intelligent manner to reduce power
consumption. However, these solutions require changes in

Copyright @ 2016 IJIT. All rights reserved.


B. KALPANA, SHYAM
the structure of mobile devices, or they require a new networks. Mobile users may not be able to connect to the
hardware that results in an increase of cost and may not be cloud to obtain service due to traffic congestion, network
feasible for all mobile devices. Computation offloading failures, and the out-of-signal.
technique is proposed with the objective to migrate the large
computations and complex processing from resource-limited IV. SYSTEM DESIGN
devices (i.e., mobile devices) to resourceful machines (i.e.,
servers in clouds). This avoids taking a long application
execution time on mobile devices which results in large
amount of power consumption. Evaluate the effectiveness of
offloading techniques through several experiments. The
results demonstrate that the remote application execution can
save energy significantly. Especially, [8] evaluates large-
scale numerical computations and shows that up to 45% of
energy consumption can be reduced for large matrix
calculation. In addition, many mobile applications take
advantages from task migration and remote processing. For
example, offloading a compiler optimization for image
processing [10] can reduce 41% for energy consumption of a
mobile device. Also, using memory arithmetic unit and
interface (MAUI) to migrate mobile game components [11]
to servers in the cloud can save 27% of energy consumption
for computer games and 45% for the chess game.

Low Bandwidth: Bandwidth is one of the big issues in


MCC since the radio resource for wireless networks is much
scarce as compared with the traditional wired networks. A
solution to share the limited bandwidth among mobile users Fig.2. System Architecture.
who are located in the same area (e.g., a workplace, a
station, and a stadium) and involved in the same content
(e.g., a video file). The authors model the interaction among
the users as a coalitional game. For example, the users form
a coalition where each member is responsible for a part of
video files (e.g., sounds, images, and captions) and
transmits/exchanges it to other coalition members. This
results in the improvement of the video quality. However,
the proposed solution is only applied in the case when the
users in a certain area are interested in the same contents.
Also, it does not consider a distribution policy (e.g., who
receives how much and which part of contents) which leads
to a lack of fairness about each user’s contribution to a
coalition. Considers the data distribution policy which
determines when and how much portions of available
bandwidth are shared among users from which networks
(e.g., WiFi and WiMAX). It collects user profiles (e.g.,
calling profile, signal strength profile, and power profile)
periodically and creates decision tables by using Markov
Decision Process (MDP) algorithm. Based on the tables, the
users decide whether or not to help other users download
some contents that they cannot receive by themselves due to
the bandwidth limitation, and how much it should help (e.g.,
10% of contents). The authors build a framework, named
RACE(Resource-Aware Collaborative Execution), on the
cloud to take advantages of the computing resources for Fig.3. Block Diagram.
maintaining the user profiles. This approach is suitable for
users who share the limited bandwidth, to balance the trade- A. Input Design
off between benefits of the assistance and energy costs. The input design is the link between the information
Availability: Service availability becomes more important system and the user. It comprises the developing
issue in MCC than that in the cloud computing with wired specification and procedures for data preparation and those

International Journal of Innovative Technologies


Volume.04, Issue No.06, June-2016, Pages: 0979-0982
Cloud Computing for Emerging Mobile Cloud Apps
steps are necessary to put transaction data in to a usable form The output form of an information system should
for processing can be achieved by inspecting the computer to accomplish one or more of the following objectives.
read data from a written or printed document or it can occur  Convey information about past activities, current status
by having people keying the data directly into the system. or projections of the
The design of input focuses on controlling the amount of  Future.
input required, controlling the errors, avoiding delay,  Signal important events, opportunities, problems, or
avoiding extra steps and keeping the process simple. The warnings.
input is designed in such a way so that it provides security  Trigger an action.
and ease of use with retaining the privacy. Input Design  Confirm an action.
considered the following things:
 What data should be given as input? V. MODULES DESCRIPTION
 How the data should be arranged or coded? A. User Module
 The dialog to guide the operating personnel in In this module the user can interact with the server i.e.
providing input. Cloud Server by using the communication network device to
 Methods for preparing input validations and steps to compute the resources of mobile devices application like
follow when error occur. Apps as service, services as the service etc.
B. Admin Module
V. OBJECTIVES In this Admin module the administrator of this Cloud
1. Input Design is the process of converting a user-oriented Computing for Emerging for Mobile Cloud Apps can upload
description of the input into a computer-based system. the resources of mobile devices in cloud server.
This design is important to avoid errors in the data input
process and show the correct direction to the C. Cloud Server Provider
management for getting correct information from the There are a number of things to think about when you
computerized system. evaluate cloud providers. The cost will usually be based on a
2. It is achieved by creating user-friendly screens for the per-use utility model but there are a number of variations to
data entry to handle large volume of data. The goal of consider. The physical location of the servers may also be a
designing input is to make data entry easier and to be factor for sensitive data. Reliability is crucial if your data
free from errors. The data entry screen is designed in must be accessible. A typical cloud storage service-level
such a way that all the data manipulates can be agreement (SLA), for example, specifies precise levels of
performed. It also provides record viewing facilities. service – such as, for example, 99.9% uptime – and the
3. When the data is entered it will check for its validity. recourse or compensation that the user is entitled to should
Data can be entered with the help of screens. the provider fail to provide the service as described.
Appropriate messages are provided as when needed so However, it’s important to understand the fine print in that
that the user will not be in maize of instant. Thus the agreement because some providers discount outages of less
objective of input design is to create an input layout that than ten minutes, which may be too long for some
is easy to follow. businesses. Security is another important consideration.
Organizations such as the Cloud Security Alliance (CSA)
A. Output Design offer certification to cloud providers that meet their criteria.
A quality output is one, which meets the requirements of The CSA's Trusted Cloud Initiative program was created to
the end user and presents the information clearly. In any help cloud service providers develop industry-recommended,
system results of processing are communicated to the users secure and interoperable identity, access and compliance
and to other system through outputs. In output design it is management configurations and practices. A cloud
determined how the information is to be displaced for provider is a company that offers some component of cloud
immediate need and also the hard copy output. It is the most computing – typically Infrastructure as a Service (IaaS),
important and direct source information to the user. Efficient Software as a Service (SaaS) or Platform as a Service (PaaS)
and intelligent output design improves the system’s – to other businesses or individuals. Cloud providers are
relationship to help user decision-making. sometimes referred to as cloud service providers or CSPs.
1. Designing computer output should proceed in an
organized, well thought out manner; the right output D. Mobile Simulation
must be developed while ensuring that each output A mobile simulation is a software application for
element is designed so that people will find the system a personal computer which creates a virtual machine version
can use easily and effectively. When analysis design of a mobile device,[1] such as a mobile phone, iphone, other
computer output, they should Identify the specific Smartphone, or calculator, on the computer. This may
output that is needed to meet the requirements. sometimes also be termed an emulator. The mobile simulator
2. Select methods for presenting information. allows the user to use features and run applications on the
3. Create document, report, or other formats that contain virtual mobile on their computer as though it was the actual
information produced by the system. mobile device.[1] A mobile simulator lets you test a website

International Journal of Innovative Technologies


Volume.04, Issue No.06, June-2016, Pages: 0979-0982
B. KALPANA, SHYAM
and determine how well it performs on various types of
mobile devices. A good simulator tests mobile content
quickly on multiple browsers and emulates several device
profiles simultaneously. This allows analysis of mobile
content in real-time, locate errors in code, view rendering in
an environment that simulates the mobile browser, and
optimize the site for performance. Mobile simulators may be
developed using programming languages such as Java and
.NET.
VI. CONCLUSION
As mobile devices have become our primary data
processing devices nowadays, mobile cloud computing has
emerged as a great extension to cloud computing field. In
this paper, we present an in-depth survey of research work
done in mobile cloud computing. Open issues have also been
covered, with some primary issues being discussed along
with the research done around them. Section III contains the
detailed survey around the key categories of mobile cloud
computing which points out at some of the approaches
focusing on collaborative working of mobile devices,
migrating the execution from mobile devices to resource rich
platforms and artitioning of applications for offloading them
to the cloud. We have also concluded that for a number of
applications local resources are not sufficient to execute on
mobile device.
VII. REFERENCES
[1]M. Satyanarayan, “Fundamental Challenges in Mobile
Cloud Computing,” roceedings ACM Symposium Principles
of distributed Computing, ACM Press, 1996.
[2]N. Tolia, M. Kaminsky, D. G. Andersen and S. Patil. An
Architecture for Internet Data Transfer. In NSDI, 2006.
[3]A. Weiss. Computing in the Clouds. NetWorker, 11(4):16
25,Dec 2007.
[4]A. Zahariev, “Google App engine,” Helsinki University
of Technology, 2009.
[5]Gonzalo Huerta – Canepa , Dongman Lee, “A Virtual
CloudComputing Provider for Mobile Devices”,ACM
Workshop on Mobile Cloud Computing & Services: Social
Networks and Beyond. MCS’10, 2010
[6]J. Kangasharju, J. Ott, and O. Karkulahti, "Floating
Content: Information vailability in Urban Environments,"
Proceedings of the 8th Annual IEEE International
Conference on Pervasive Computing and Communications
(PerCom) (WiP) , Mannheim, Germany: 2010.
[7]A.Berl, H.Meer, H.Hlavacs, and T. Treutner,
"Virtualization in energy -efficient future home
environments," IEEE Communications Magazine , vol. 47,
2009, pp. 62 - 67. December 2009.
[8]Niroshinie Fernando, Seng W. Loke ,WennyRahayu ,
“Dynamic Mobile Cloud Computing: Ad Hoc and
Opportunistic Job Sharing ”, Fourth IEEE International
Conference on Utility and Cloud Computing , Victoria,
NSW: December 2011.
[9]M. Satyanarayanan. “Fundamental challenges in mobile
computing. "In Proceedings of the fifteenth annual ACM
symposium on Principles of distributed computing , PODC
’96, pages 1 – 7, New York, NY, USA, 1996.

International Journal of Innovative Technologies


Volume.04, Issue No.06, June-2016, Pages: 0979-0982

Das könnte Ihnen auch gefallen