An Approach to Improve Security on Clone of Mobile Device during Augmented Execution
نویسندگان
چکیده
-The goal of cloud computing is usage of cloud resource form anywhere i.e. mobility. Mobile cloud computing, new technology in the field of cloud computing enables cloud users to access cloud from their mobile devices (e.g. Laptops, PDA, Smartphone’s). Computation power and battery life is one of the major issues of these mobile devices. Now a day’s resource starved applications like online HD graphics games, multimedia, etc. needs more bandwidth and computation power that mobile device might not have. So to overcome this problem clones of mobile devices are created on cloud servers. This clone uses resources of the cloud servers. Using augmented execution all complex applications run in this clone and response is sent back to mobile device. This can save battery life for low configured mobile devices. This paper shows how to improve the synchronization between mobile device and clone to communicate more reliably in terms of improving security.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملHigh Fuzzy Utility Based Frequent Patterns Mining Approach for Mobile Web Services Sequences
Nowadays high fuzzy utility based pattern mining is an emerging topic in data mining. It refers to discover all patterns having a high utility meeting a user-specified minimum high utility threshold. It comprises extracting patterns which are highly accessed in mobile web service sequences. Different from the traditional fuzzy approach, high fuzzy utility mining considers not only counts of mob...
متن کاملارائه یک رویکرد همانند سازی شده عامل محور در اجرای یک الگوی کد متحرک مطمئن
Abstract Using mobile agents, it is possible to bring the code close to the resources, which is not foreseen by the traditional client/server paradigm. Compared to the client/server computing paradigm, the greater flexibility of the mobile agent paradigm comes at additional costs as well as the additional complexity of developing and managing mobile agent-based applications. Such complexity ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملRuntime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the informati...
متن کامل