Towards Pervasive Computing Environments with Cloud Services

نویسنده

  • Ahmed Youssef
چکیده

Pervasive computing aims at creating environments saturated with embedded and portable computing devices surrounding the users and providing them with many interesting services. It has been gradually applied into our everyday life and its applications are becoming more and more extensive day by day. However, exploiting its full potential is difficult due to some inherent problems such as limited scalability of users and devices, limited availability of software applications, resources scarceness in embedded gadgets, and frequent disconnection and finite energy of mobile devices. Consequently, a wide range of applications such as image processing, multimedia, and social networking are difficult to run in pervasive computing environments. Cloud Computing (CC) platforms possess the ability to overcome these discrepancies with their scalable, highly available and resource pooling computing capabilities. In this paper, we examine how interesting characteristics of CC can contribute to solve some inherent problems in pervasive computing environments. We propose an infrastructure and a protocol that incorporate pervasive computing environments with cloud services and show that by embedding the power of CC services into pervasive computing environments we can significantly enhance services provided by these environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A review of methods for resource allocation and operational framework in cloud computing

The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

Today cloud computing platform is de-facto and strategic component of corporate and end user applications usage in pervasive and ubiquitous manner. The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way. However integration of various service layers into cloud stack also invites intrinsic threats, risk and vulnerabilities, ...

متن کامل

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

Today cloud computing platform is de-facto and strategic component of corporate and end user applications usage in pervasive and ubiquitous manner. The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way. However integration of various service layers into cloud stack also invites intrinsic threats, risk and vulnerabilities, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013