SlideShare a Scribd company logo
MOBILE CLOUD COMPUTING fundamental and basic
Study of Mobile Cloud Computing
Presented By:
Prof .Ranjana Dalwani Arora
Assistant Professor
IMI College
Content
• Abstract
• Introdcution
• Problem domain
• Solution domain
• Motivation
• Objective and scope
• Methodology Research plan
• Expected outcome
• conclusion
• Mobile Cloud Computing (MCC) is a combination of three main
parts; they are mobile device, cloud computing and mobile internet.
• MCC integrates the cloud computing into the mobile environment
and overcomes obstacles related to the performance (e.g., battery
life, storage, and bandwidth), environment (e.g., heterogeneity,
scalability, and availability), and security (e.g., reliability and
privacy) .
Abstract
Mobile Computing
• It is a technology that allows transmission of data, audio and video
through a smart phone or any other wireless enabled device without
having to be connected to a fixed physical channel
• The mobile computing means to access data through portable devices
like PDA, smart phone, tablet and so on..
Cloud Computing
 Cloud computing is collection of remote servers in network to allow
centralized data storage and online communication to computer services
or resources .
 Internet and not on personal devices to provide on-demand access.
Applications are run on a remote server, all the processing task done on
remote server and then result sent to the user.
Mobile Cloud Computing
 Mobile Cloud Computing refers to an infrastructure where both the data
storage andthe data processingoccuroutside of the mobile device.
 Mobile cloud applications move the data storage away from mobile
phones into the cloud ,bringing applications and mobile computing not
only to smart phone users but also to a much broader range of mobile
subscribers.
Problem Domain
The data of owner is stored on the cloud server;
once the data is stored the owner does not have
that data on his own device. Thus, there is risk
related to data security and confidentiality of the
data.So, data confidentiality is also a concern of
data owner.
Solution Domain
In this system design three main entities are involved:
Mobile User (MU): Mobile user/client is a person who
utilizes the storage services provided by Cloud service
provider (CSP).Cloud Service Provider (CSP): CSP
provides storage services to client. CSP is also
responsible for operating, managing and allocating cloud
resources efficiently. Trusted Third Party (TTP): TTP
installs co processors on remote cloud; who is associated
with a number of registered mobile user/client. Co
processor provides secret key (SEK) to mobile user and
is also responsible for generating message authentication
code for mobile client.
The primary constraints for mobile cloud
computing are limited energy and wireless
bandwidth. So the motivation behind this paper is
to test weather cloud applications good solution to
improving battery lifetime of mobile device.
Motivation
Objective and Scope
Mobile Phone application are exploding in popularity
and demanding more computing resources to perform
compute intensive tasks. Despite the rapid
development of heterogeneous set of mobiles devices,
they are intrinsically limited by storage, processing
power and battery lifetime.Hence,there is an
increasing need for abundant resources offered by
cloud for the benefit of mobile phones, thus rendering
a new research area called the mobile cloud
computing
Methodology / Research plan
Our vision and research agenda of a Cloud architecture is the
seamless integration of cloud let and public cloud, and
infrastructure specialization for mobile applications. We believe
the dominant architecture will be the regional data centers of
public cloud providers. Cloud let is necessary to reduce the delay
of latency sensitive perception applications. There are two
convincing deployment settings. One is for wireless providers to
deploy cloudlet like nodes within their wireless access networks as
a premium service for its subscribers. The other is for cloud
providers to co-locate cloud resources in wireless access networks
through co-location agreement with wireless providers. For
optimal performance, we believe the middle tier needs to be
integrated with the region data centers of public cloud seamlessly.
Expected Outcome
In this paper, we envision that these fundamental new
capabilities will enable mobile users to seamlessly
utilize the cloud to obtain the resource benefits without
incurring delays and jitters and without worrying about
energy. By thus empowering mobile users, mobile
computing will be able to break free of the fundamental
constraints that have been keeping us from transform
many areas of human activity. We envision the future of
mobile computing applications will be built on top of a
rich Eco-system of basic mobile cloud services.
Conclusion
Paper has provided an overview of mobile cloud
computing in which its definitions, security, issues
and advantages have been presented. Mainly it
discussed about security of data stored in cloud and
importance of data security. This paper has explored
a number of mechanisms for providing data security
so that Mobile Cloud Computing can be widely
accepted by a number of users in future. It also
proposed a mechanism to provide confidentiality,
access control as well as integrity to mobile users.
MOBILE CLOUD COMPUTING fundamental and basic
Ad

More Related Content

Similar to MOBILE CLOUD COMPUTING fundamental and basic (20)

Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
402chandan
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
Yash771676
 
What is a mobile cloud computing? cloud-computing2.ppt
What is a mobile cloud computing? cloud-computing2.pptWhat is a mobile cloud computing? cloud-computing2.ppt
What is a mobile cloud computing? cloud-computing2.ppt
slavigyulev1
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
csandit
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Mobile computing.pptx
Mobile computing.pptxMobile computing.pptx
Mobile computing.pptx
ssuser6063b0
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
402chandan
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
Yash771676
 
What is a mobile cloud computing? cloud-computing2.ppt
What is a mobile cloud computing? cloud-computing2.pptWhat is a mobile cloud computing? cloud-computing2.ppt
What is a mobile cloud computing? cloud-computing2.ppt
slavigyulev1
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
IOSR Journals
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
csandit
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
 
Mobile computing.pptx
Mobile computing.pptxMobile computing.pptx
Mobile computing.pptx
ssuser6063b0
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
 

More from ranjana dalwani (8)

Unit 1 of artificial intelligence and its introduction
Unit 1  of artificial intelligence and its introductionUnit 1  of artificial intelligence and its introduction
Unit 1 of artificial intelligence and its introduction
ranjana dalwani
 
Error detection and correction of computer network
Error detection and correction of computer networkError detection and correction of computer network
Error detection and correction of computer network
ranjana dalwani
 
computer network and technology basic description
computer network and technology  basic descriptioncomputer network and technology  basic description
computer network and technology basic description
ranjana dalwani
 
DBMS introduction and functionality of of dbms
DBMS introduction and functionality of  of dbmsDBMS introduction and functionality of  of dbms
DBMS introduction and functionality of of dbms
ranjana dalwani
 
Delegates and Events in Dot net technology
Delegates and Events  in Dot net technologyDelegates and Events  in Dot net technology
Delegates and Events in Dot net technology
ranjana dalwani
 
communication-devices-and its working on machine
communication-devices-and its working on machinecommunication-devices-and its working on machine
communication-devices-and its working on machine
ranjana dalwani
 
4.9 --Digital Marketing concept and technology
4.9 --Digital Marketing concept and technology4.9 --Digital Marketing concept and technology
4.9 --Digital Marketing concept and technology
ranjana dalwani
 
digital marketing CONCEPT AND CALCULATION
digital marketing CONCEPT AND CALCULATIONdigital marketing CONCEPT AND CALCULATION
digital marketing CONCEPT AND CALCULATION
ranjana dalwani
 
Unit 1 of artificial intelligence and its introduction
Unit 1  of artificial intelligence and its introductionUnit 1  of artificial intelligence and its introduction
Unit 1 of artificial intelligence and its introduction
ranjana dalwani
 
Error detection and correction of computer network
Error detection and correction of computer networkError detection and correction of computer network
Error detection and correction of computer network
ranjana dalwani
 
computer network and technology basic description
computer network and technology  basic descriptioncomputer network and technology  basic description
computer network and technology basic description
ranjana dalwani
 
DBMS introduction and functionality of of dbms
DBMS introduction and functionality of  of dbmsDBMS introduction and functionality of  of dbms
DBMS introduction and functionality of of dbms
ranjana dalwani
 
Delegates and Events in Dot net technology
Delegates and Events  in Dot net technologyDelegates and Events  in Dot net technology
Delegates and Events in Dot net technology
ranjana dalwani
 
communication-devices-and its working on machine
communication-devices-and its working on machinecommunication-devices-and its working on machine
communication-devices-and its working on machine
ranjana dalwani
 
4.9 --Digital Marketing concept and technology
4.9 --Digital Marketing concept and technology4.9 --Digital Marketing concept and technology
4.9 --Digital Marketing concept and technology
ranjana dalwani
 
digital marketing CONCEPT AND CALCULATION
digital marketing CONCEPT AND CALCULATIONdigital marketing CONCEPT AND CALCULATION
digital marketing CONCEPT AND CALCULATION
ranjana dalwani
 
Ad

Recently uploaded (20)

AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
Construction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.pptConstruction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.ppt
ssuser2ffcbc
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Journal of Soft Computing in Civil Engineering
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
Construction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.pptConstruction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.ppt
ssuser2ffcbc
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Ad

MOBILE CLOUD COMPUTING fundamental and basic

  • 2. Study of Mobile Cloud Computing Presented By: Prof .Ranjana Dalwani Arora Assistant Professor IMI College
  • 3. Content • Abstract • Introdcution • Problem domain • Solution domain • Motivation • Objective and scope • Methodology Research plan • Expected outcome • conclusion
  • 4. • Mobile Cloud Computing (MCC) is a combination of three main parts; they are mobile device, cloud computing and mobile internet. • MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) . Abstract
  • 5. Mobile Computing • It is a technology that allows transmission of data, audio and video through a smart phone or any other wireless enabled device without having to be connected to a fixed physical channel • The mobile computing means to access data through portable devices like PDA, smart phone, tablet and so on..
  • 6. Cloud Computing  Cloud computing is collection of remote servers in network to allow centralized data storage and online communication to computer services or resources .  Internet and not on personal devices to provide on-demand access. Applications are run on a remote server, all the processing task done on remote server and then result sent to the user.
  • 7. Mobile Cloud Computing  Mobile Cloud Computing refers to an infrastructure where both the data storage andthe data processingoccuroutside of the mobile device.  Mobile cloud applications move the data storage away from mobile phones into the cloud ,bringing applications and mobile computing not only to smart phone users but also to a much broader range of mobile subscribers.
  • 8. Problem Domain The data of owner is stored on the cloud server; once the data is stored the owner does not have that data on his own device. Thus, there is risk related to data security and confidentiality of the data.So, data confidentiality is also a concern of data owner.
  • 9. Solution Domain In this system design three main entities are involved: Mobile User (MU): Mobile user/client is a person who utilizes the storage services provided by Cloud service provider (CSP).Cloud Service Provider (CSP): CSP provides storage services to client. CSP is also responsible for operating, managing and allocating cloud resources efficiently. Trusted Third Party (TTP): TTP installs co processors on remote cloud; who is associated with a number of registered mobile user/client. Co processor provides secret key (SEK) to mobile user and is also responsible for generating message authentication code for mobile client.
  • 10. The primary constraints for mobile cloud computing are limited energy and wireless bandwidth. So the motivation behind this paper is to test weather cloud applications good solution to improving battery lifetime of mobile device. Motivation
  • 11. Objective and Scope Mobile Phone application are exploding in popularity and demanding more computing resources to perform compute intensive tasks. Despite the rapid development of heterogeneous set of mobiles devices, they are intrinsically limited by storage, processing power and battery lifetime.Hence,there is an increasing need for abundant resources offered by cloud for the benefit of mobile phones, thus rendering a new research area called the mobile cloud computing
  • 12. Methodology / Research plan Our vision and research agenda of a Cloud architecture is the seamless integration of cloud let and public cloud, and infrastructure specialization for mobile applications. We believe the dominant architecture will be the regional data centers of public cloud providers. Cloud let is necessary to reduce the delay of latency sensitive perception applications. There are two convincing deployment settings. One is for wireless providers to deploy cloudlet like nodes within their wireless access networks as a premium service for its subscribers. The other is for cloud providers to co-locate cloud resources in wireless access networks through co-location agreement with wireless providers. For optimal performance, we believe the middle tier needs to be integrated with the region data centers of public cloud seamlessly.
  • 13. Expected Outcome In this paper, we envision that these fundamental new capabilities will enable mobile users to seamlessly utilize the cloud to obtain the resource benefits without incurring delays and jitters and without worrying about energy. By thus empowering mobile users, mobile computing will be able to break free of the fundamental constraints that have been keeping us from transform many areas of human activity. We envision the future of mobile computing applications will be built on top of a rich Eco-system of basic mobile cloud services.
  • 14. Conclusion Paper has provided an overview of mobile cloud computing in which its definitions, security, issues and advantages have been presented. Mainly it discussed about security of data stored in cloud and importance of data security. This paper has explored a number of mechanisms for providing data security so that Mobile Cloud Computing can be widely accepted by a number of users in future. It also proposed a mechanism to provide confidentiality, access control as well as integrity to mobile users.
  翻译: