Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.29
Huijun Wu, Dijiang Huang
Mobile Cloud computing has shown its capability to support mobile devices for provisioning computing, storage and communication resources. Many existing research has proposed to offload computation tasks from mobile devices to clouds in order to reduce energy consumption, where the offloading service model is usually one-to-one. Due to the development of mobile sensing and location-based mobile cloud services, the cloud edge has been extended to the mobile devices and sensors. As a result, the one-to-one model is not sufficient to model the dynamic changes of mobile cloud-based services. Thus, a many-to-many (or multi-site) mobile cloud service composition is highly desired. In this research, MoSeC is presented to model the many-to-many mobile cloud service composition, where there are multiple surrogates, such as cloud computing nodes, mobile devices, or sensors, and their services (i.e., computation, storage, sensing, etc.) can be composed to fulfill functions required by a mobile service requestor. MoSeC takes into considerations the surrogates' changes due to their mobility and resource constraints. Moreover, MoSeC takes into considerations several service metrics for service mapping (or allocation) through a mobile cloud service topology reconfiguration process. A set of algorithms are presented to address the Service Topology Reconfiguration Problem (STRP) in several mobile cloud representative application scenarios, i.e., they are modeled as finite horizon scenarios, infinite horizon scenarios, and large state space scenarios to represent ad hoc, long-term, and large-scale mobile cloud service composition scenarios, respectively.
{"title":"MoSeC: Mobile-Cloud Service Composition","authors":"Huijun Wu, Dijiang Huang","doi":"10.1109/MobileCloud.2015.29","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.29","url":null,"abstract":"Mobile Cloud computing has shown its capability to support mobile devices for provisioning computing, storage and communication resources. Many existing research has proposed to offload computation tasks from mobile devices to clouds in order to reduce energy consumption, where the offloading service model is usually one-to-one. Due to the development of mobile sensing and location-based mobile cloud services, the cloud edge has been extended to the mobile devices and sensors. As a result, the one-to-one model is not sufficient to model the dynamic changes of mobile cloud-based services. Thus, a many-to-many (or multi-site) mobile cloud service composition is highly desired. In this research, MoSeC is presented to model the many-to-many mobile cloud service composition, where there are multiple surrogates, such as cloud computing nodes, mobile devices, or sensors, and their services (i.e., computation, storage, sensing, etc.) can be composed to fulfill functions required by a mobile service requestor. MoSeC takes into considerations the surrogates' changes due to their mobility and resource constraints. Moreover, MoSeC takes into considerations several service metrics for service mapping (or allocation) through a mobile cloud service topology reconfiguration process. A set of algorithms are presented to address the Service Topology Reconfiguration Problem (STRP) in several mobile cloud representative application scenarios, i.e., they are modeled as finite horizon scenarios, infinite horizon scenarios, and large state space scenarios to represent ad hoc, long-term, and large-scale mobile cloud service composition scenarios, respectively.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.18
M. Yeh, Huan Yang, Hsing Mei
People spend a third of the lifetime on sleep. Exercise and light exposing have critical influence on sleep quality. Exercise affects sleep efficiency, and the light exposing affect sleep circadian rhythm. This paper investigates the impact of sleep rhythm and efficiency with a HTML5-based behavior recording and analytic service -- Healthy Sleep Space (HSS). HSS takes advantages of important features from HTML5, such as consistent user experience across multiple mobile device, offline processing etc. With HSS, users can record their sleep and behavioral information, then analyze collected information in the cloud, regardless of internet condition or type of mobile devices. We propose a simple Sleep Quotient (SQ) index to evaluate the quality of sleep. Based on the SQ values, HSS provides appropriate exercise and light exposure prescriptions to modify user's daytime behavior, and eventually to improve sleep quality.
{"title":"A HTML5-Based Innovative Sleep Prescription Service","authors":"M. Yeh, Huan Yang, Hsing Mei","doi":"10.1109/MobileCloud.2015.18","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.18","url":null,"abstract":"People spend a third of the lifetime on sleep. Exercise and light exposing have critical influence on sleep quality. Exercise affects sleep efficiency, and the light exposing affect sleep circadian rhythm. This paper investigates the impact of sleep rhythm and efficiency with a HTML5-based behavior recording and analytic service -- Healthy Sleep Space (HSS). HSS takes advantages of important features from HTML5, such as consistent user experience across multiple mobile device, offline processing etc. With HSS, users can record their sleep and behavioral information, then analyze collected information in the cloud, regardless of internet condition or type of mobile devices. We propose a simple Sleep Quotient (SQ) index to evaluate the quality of sleep. Based on the SQ values, HSS provides appropriate exercise and light exposure prescriptions to modify user's daytime behavior, and eventually to improve sleep quality.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.23
N. Takahashi, Hiroyuki Tanaka, R. Kawamura
This paper discusses "multi-tier mobile cloud computing" architecture, where small IT servers in users' proximity are utilized to execute a part of application processing. The way of partitioning changes distribution of processing loads and traffic, and affects processing delay or battery usage. The problem is that it is unclear what partition brings a better result. This paper studies an abstract model of application execution in multi-tier mobile cloud, discusses performance metrics, and examines trade-offs among them. A prototype named Edge Accelerated Web Browsing is presented, too.
{"title":"Analysis of Process Assignment in Multi-tier mobile Cloud Computing and Application to Edge Accelerated Web Browsing","authors":"N. Takahashi, Hiroyuki Tanaka, R. Kawamura","doi":"10.1109/MobileCloud.2015.23","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.23","url":null,"abstract":"This paper discusses \"multi-tier mobile cloud computing\" architecture, where small IT servers in users' proximity are utilized to execute a part of application processing. The way of partitioning changes distribution of processing loads and traffic, and affects processing delay or battery usage. The problem is that it is unclear what partition brings a better result. This paper studies an abstract model of application execution in multi-tier mobile cloud, discusses performance metrics, and examines trade-offs among them. A prototype named Edge Accelerated Web Browsing is presented, too.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129886103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.28
S. Abolfazli, A. Gani, Min Chen
Hybrid Mobile Cloud Computing (HMCC) refers to a Mobile Computation Outsourcing (MCO) model that exploits hybrid granular cloud-based resources composed of coarse-, medium-, and fine-grained resources interconnected by wireless and wired networks to augment mobile devices. Leveraging single type of granules for augmentation (i.e., vertically heterogeneous) has its own deficiencies of low proximity or/and scalability that leads to communication or/and computation latency. Therefore, responsiveness and energy efficiency of cloud-connected Compute-intensive Mobile Applications (CiMA) are degraded. In this paper, we aim to enhance energy-time efficiency of executing CiMA using HMCC. Performance evaluation results show significant gains, 80%-96% round-trip time and 83%-96% energy saving when executing CiMA using HMCC.
混合移动云计算(Hybrid Mobile Cloud Computing, HMCC)是一种移动计算外包(Mobile Computation Outsourcing, MCO)模型,它利用基于云的混合颗粒资源,通过无线和有线网络互联粗、中、细粒度资源,增强移动设备。利用单一类型的颗粒进行增强(即垂直异构)有其自身的不足,即低接近性或/和可伸缩性,从而导致通信或/和计算延迟。因此,云连接的计算密集型移动应用程序(CiMA)的响应能力和能源效率会降低。本文旨在利用HMCC提高执行CiMA的能量-时间效率。性能评估结果表明,当使用HMCC执行CiMA时,效果显著,往返时间达到80%-96%,节能83%-96%。
{"title":"HMCC: A Hybrid Mobile Cloud Computing Framework Exploiting Heterogeneous Resources","authors":"S. Abolfazli, A. Gani, Min Chen","doi":"10.1109/MobileCloud.2015.28","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.28","url":null,"abstract":"Hybrid Mobile Cloud Computing (HMCC) refers to a Mobile Computation Outsourcing (MCO) model that exploits hybrid granular cloud-based resources composed of coarse-, medium-, and fine-grained resources interconnected by wireless and wired networks to augment mobile devices. Leveraging single type of granules for augmentation (i.e., vertically heterogeneous) has its own deficiencies of low proximity or/and scalability that leads to communication or/and computation latency. Therefore, responsiveness and energy efficiency of cloud-connected Compute-intensive Mobile Applications (CiMA) are degraded. In this paper, we aim to enhance energy-time efficiency of executing CiMA using HMCC. Performance evaluation results show significant gains, 80%-96% round-trip time and 83%-96% energy saving when executing CiMA using HMCC.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127996888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.17
Sungjin Park, Jaewoo Yoon, Cheoloh Kang, K. Kim, Taisook Han
In cloud computing, geographic location of data is one of major security concerns of cloud users. To resolve this problem, most of previous work has been done on trusted relocation service in cloud service providers. For example, users are allowed to determine the physical location of their cloud servers and ensured about their requirements of relocation-based restrictions. However, it is also essential to handle trusted relocation service at cloud users' devices in mobile cloud computing. As mobile cloud tenants use cloud services everywhere, trusted relocation of cloud users arises a new security issue. Thus, in this paper, we present a novel trusted relocation system named Devisor for cloud user devices. The key mechanism of Devisor is providing a trusted channel between the relocation server and the GPS module in each mobile client device. We leverage Trusted Platform Module (TPM) and tiny hyper visor in order to securely perform the attestation of the relocation of client devices. To prove the practicality of Devisor, we design and implement a cloud word processor with trusted relocation service based on Ether pad. We also evaluate the performance of Devisor in cloud devices and show that it causes only 8.3% overhead in JavaScript benchmark, which indicates the feasibility of TGVisor.
{"title":"TGVisor: A Tiny Hypervisor-Based Trusted Geolocation Framework for Mobile Cloud Clients","authors":"Sungjin Park, Jaewoo Yoon, Cheoloh Kang, K. Kim, Taisook Han","doi":"10.1109/MobileCloud.2015.17","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.17","url":null,"abstract":"In cloud computing, geographic location of data is one of major security concerns of cloud users. To resolve this problem, most of previous work has been done on trusted relocation service in cloud service providers. For example, users are allowed to determine the physical location of their cloud servers and ensured about their requirements of relocation-based restrictions. However, it is also essential to handle trusted relocation service at cloud users' devices in mobile cloud computing. As mobile cloud tenants use cloud services everywhere, trusted relocation of cloud users arises a new security issue. Thus, in this paper, we present a novel trusted relocation system named Devisor for cloud user devices. The key mechanism of Devisor is providing a trusted channel between the relocation server and the GPS module in each mobile client device. We leverage Trusted Platform Module (TPM) and tiny hyper visor in order to securely perform the attestation of the relocation of client devices. To prove the practicality of Devisor, we design and implement a cloud word processor with trusted relocation service based on Ether pad. We also evaluate the performance of Devisor in cloud devices and show that it causes only 8.3% overhead in JavaScript benchmark, which indicates the feasibility of TGVisor.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.35
Yogendra Shah, V. Choyi, L. Subramanian
An architecture for providing multi-factor authentication as a service is proposed, resting on the principle of a loose coupling and separation of duties between network entities and end user devices. The multi-factor authentication architecture leverages Identity Federation and Single-Sign-On technologies, such as the OpenID framework, in order to provide for a modular integration of various factors of authentication. The architecture is robust and scalable enabling service providers to define risk-based authentication policies by way of assurance level requirements, which map to concrete authentication factor capabilities on user devices.
{"title":"Multi-factor Authentication as a Service","authors":"Yogendra Shah, V. Choyi, L. Subramanian","doi":"10.1109/MobileCloud.2015.35","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.35","url":null,"abstract":"An architecture for providing multi-factor authentication as a service is proposed, resting on the principle of a loose coupling and separation of duties between network entities and end user devices. The multi-factor authentication architecture leverages Identity Federation and Single-Sign-On technologies, such as the OpenID framework, in order to provide for a modular integration of various factors of authentication. The architecture is robust and scalable enabling service providers to define risk-based authentication policies by way of assurance level requirements, which map to concrete authentication factor capabilities on user devices.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128872148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MOBILECLOUD.2015.32
Shams Zawoad, Ragib Hasan
Though mobile cloud computing has become popular to mitigate the problem of low computing and storage resources of mobile devices, this has also brought new security challenges especially in the case of digital forensics. In this paper, we systematically analyze the mobile cloud forensics problem and explore the challenges and issues of this new branch of digital forensics. We also identify the requirements and propose a model to support reliable forensic investigations in the mobile cloud.
{"title":"Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics","authors":"Shams Zawoad, Ragib Hasan","doi":"10.1109/MOBILECLOUD.2015.32","DOIUrl":"https://doi.org/10.1109/MOBILECLOUD.2015.32","url":null,"abstract":"Though mobile cloud computing has become popular to mitigate the problem of low computing and storage resources of mobile devices, this has also brought new security challenges especially in the case of digital forensics. In this paper, we systematically analyze the mobile cloud forensics problem and explore the challenges and issues of this new branch of digital forensics. We also identify the requirements and propose a model to support reliable forensic investigations in the mobile cloud.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.12
Andreas Reiter, Thomas Zefferer
Despite their steadily increasing capabilities, mobile end-user devices such as smart phones often suffer from reduced processing and storage resources. Cloud-based mobile augmentation (CMA) has recently emerged as a potential solution to this problem. CMA combines concepts of cloud computing and surrogate computing in order to offload resource-intensive tasks to external resources. During the past years, different CMA frameworks have been introduced that enable the development and usage of CMA-based applications. Unfortunately, these frameworks have usually not been designed with security in mind but instead mainly focus on efficient offloading and reintegration mechanisms. Hence, reliance on CMA concepts in security-critical fields of application is currently not advisable. To address this problem, this paper surveys currently available CMA frameworks and assesses their suitability and applicability in security-critical fields of application. For this purpose, relevant security requirements are identified and mapped to the surveyed CMA frameworks. Results obtained from this assessment show that none of the surveyed CMA framework is currently able to meet all relevant security requirements. By identifying security limitations of currently available CMA frameworks, this paper represents a first important step towards development of a secure CMA framework and hence paves the way for a use of CMA-based applications in security-critical fields of application.
{"title":"Paving the Way for Security in Cloud-Based Mobile Augmentation Systems","authors":"Andreas Reiter, Thomas Zefferer","doi":"10.1109/MobileCloud.2015.12","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.12","url":null,"abstract":"Despite their steadily increasing capabilities, mobile end-user devices such as smart phones often suffer from reduced processing and storage resources. Cloud-based mobile augmentation (CMA) has recently emerged as a potential solution to this problem. CMA combines concepts of cloud computing and surrogate computing in order to offload resource-intensive tasks to external resources. During the past years, different CMA frameworks have been introduced that enable the development and usage of CMA-based applications. Unfortunately, these frameworks have usually not been designed with security in mind but instead mainly focus on efficient offloading and reintegration mechanisms. Hence, reliance on CMA concepts in security-critical fields of application is currently not advisable. To address this problem, this paper surveys currently available CMA frameworks and assesses their suitability and applicability in security-critical fields of application. For this purpose, relevant security requirements are identified and mapped to the surveyed CMA frameworks. Results obtained from this assessment show that none of the surveyed CMA framework is currently able to meet all relevant security requirements. By identifying security limitations of currently available CMA frameworks, this paper represents a first important step towards development of a secure CMA framework and hence paves the way for a use of CMA-based applications in security-critical fields of application.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.24
Yuuki Wakisaka, H. Ichikawa, Yuusuke Kawakita
Rich participatory sensing applications by smart phones are demonstrating the possibility of useful applications with numerous stationary sensors as well as with smart phones. Electricity consumption of stationary sensors seriously affects their usability and maintenance cost so that many mutually incompatible wireless devices and protocols have been developed for each those different conditions. It is desirable for devices with any different protocol to share the network infrastructure, preserve sensing data, and jointly utilize the data. We proposed an "Appliance-defined ubiquitous network"' (ADUN) that, based on user demands, can distribute sampled RF data streams over the Internet to software-defined radio receivers in cloud data centers. One of the goals of ADUN is to allow users to be able to seek information regarding the radio space of any bandwidth, frequency, place, time, and date. An RF recorder is necessary to distribute past RF data, and should be able to record as broad an RF data stream for as long as needed. In this paper, we detail the basic concepts of RF recorder for ADUN and the results of a study that applies the Btrfs function in Linux to compress and store RF data to distribute or mine an RF signal through time-shifting. The experimental results indicate that the pipeline parallelism of Linux increases the storage writing throughput of high-bitrate RF data streams with some degree of redundancy, though the loss in computation power for RF data compression slows down the storage writing. The RF data compression rate is calculated by the size of the RF data, the chunk size in chunking, and variance in the radio space information according to the number of signals to be received.
{"title":"File System Level Compression of Radio Space Information Storage System for Sensor Platform","authors":"Yuuki Wakisaka, H. Ichikawa, Yuusuke Kawakita","doi":"10.1109/MobileCloud.2015.24","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.24","url":null,"abstract":"Rich participatory sensing applications by smart phones are demonstrating the possibility of useful applications with numerous stationary sensors as well as with smart phones. Electricity consumption of stationary sensors seriously affects their usability and maintenance cost so that many mutually incompatible wireless devices and protocols have been developed for each those different conditions. It is desirable for devices with any different protocol to share the network infrastructure, preserve sensing data, and jointly utilize the data. We proposed an \"Appliance-defined ubiquitous network\"' (ADUN) that, based on user demands, can distribute sampled RF data streams over the Internet to software-defined radio receivers in cloud data centers. One of the goals of ADUN is to allow users to be able to seek information regarding the radio space of any bandwidth, frequency, place, time, and date. An RF recorder is necessary to distribute past RF data, and should be able to record as broad an RF data stream for as long as needed. In this paper, we detail the basic concepts of RF recorder for ADUN and the results of a study that applies the Btrfs function in Linux to compress and store RF data to distribute or mine an RF signal through time-shifting. The experimental results indicate that the pipeline parallelism of Linux increases the storage writing throughput of high-bitrate RF data streams with some degree of redundancy, though the loss in computation power for RF data compression slows down the storage writing. The RF data compression rate is calculated by the size of the RF data, the chunk size in chunking, and variance in the radio space information according to the number of signals to be received.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122721175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-30DOI: 10.1109/MobileCloud.2015.10
Pengfei Yuan, Yao Guo, Xiangqun Chen
Personal mobile devices (PMDs) have become the most used computing devices for many people. With the introduction of mobile cloud computing, we can augment the storage and computing capabilities of PMDs via cloud support. However, there are many challenges in developing mobile cloud applications (MCAs) that incorporate cloud computing efficiently, especially for developers targeting multiple mobile platforms. This paper presents Uniport, a uniform framework for developing MCAs. We introduce a uniform architecture for MCAs based on the Model-View-Controller (MVC) pattern and a set of programming primitives and runtime libraries. Not only can Uniport support the creation of new MCAs, it can also help transform existing mobile applications to MCAs efficiently. We demonstrate the applicability and flexibility of Uniport in a case study to transform three existing mobile applications on iOS, Android and Windows Phone, to their mobile cloud versions respectively. Evaluation results show that, with very few modifications, we can easily transform mobile applications to MCAs that can exploit the cloud support to improve performance by 3 - 7x and save more than half of their energy consumption.
{"title":"Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing","authors":"Pengfei Yuan, Yao Guo, Xiangqun Chen","doi":"10.1109/MobileCloud.2015.10","DOIUrl":"https://doi.org/10.1109/MobileCloud.2015.10","url":null,"abstract":"Personal mobile devices (PMDs) have become the most used computing devices for many people. With the introduction of mobile cloud computing, we can augment the storage and computing capabilities of PMDs via cloud support. However, there are many challenges in developing mobile cloud applications (MCAs) that incorporate cloud computing efficiently, especially for developers targeting multiple mobile platforms. This paper presents Uniport, a uniform framework for developing MCAs. We introduce a uniform architecture for MCAs based on the Model-View-Controller (MVC) pattern and a set of programming primitives and runtime libraries. Not only can Uniport support the creation of new MCAs, it can also help transform existing mobile applications to MCAs efficiently. We demonstrate the applicability and flexibility of Uniport in a case study to transform three existing mobile applications on iOS, Android and Windows Phone, to their mobile cloud versions respectively. Evaluation results show that, with very few modifications, we can easily transform mobile applications to MCAs that can exploit the cloud support to improve performance by 3 - 7x and save more than half of their energy consumption.","PeriodicalId":373443,"journal":{"name":"2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}