Mobile Cloud Computing: Applications Perspective

Mobile Cloud Computing: Applications Perspective

Parkavi R (Thiagarajar College of Engineering, India), Priyanka C (Thiagarajar College of Engineering, India), Sujitha S. (Thiagarajar College of Engineering, India) and Sheik Abdullah A (Thiagarajar College of Engineering, India)
DOI: 10.4018/978-1-5225-4044-1.ch006

Abstract

Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry ring words and a major conversation thread in the IT world with an explosive development of the mobile applications and emerging of cloud computing idea, the MCC has become a possible technology for the mobile service users. The concepts of Cloud computing are naturally meshed with mobile devices to allow on-the-go functionalities and benefits. The mobile cloud computing is emerging as one of the most important branches of cloud computing and it is expected to expand the mobile ecosystems. As more mobile devices enter the market and evolve, certainly security issues will grow as well. Also, enormous growth in the variety of devices connected to the Internet will further drive security needs. MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment.
Chapter Preview
Top

Literature Survey

An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

The increasing unfold of mobile cloud computing paradigm is dynamically the quality mobile communication infrastructure. Mobile cloud introduces new privacy risks, since personal information of the human action users is distributed among several parties (e.g., cellular network operator, cloud provider) throughout this paper, they tend to propose a solution implementing academic degree end-to-end anonymous communication protocol between two users inside the network that leverages properties of social tend to trust academic degree person model, where each party observant a number of the communication most likely colludes with others to uncover the identity of human action users. And they extensively analyze the security of proposed protocol and thus the anonymity preserved against on high adversaries. Most importantly, they tend to assess the performance of proposed solution by comparing it to on a real tested of thirty-six smart phones and relative clones running on Amazon EC2 platform. (Claudio et al., 2014)

Complete Chapter List

Search this Book:
Reset