Skip to main content
Erschienen in: Wireless Personal Communications 4/2015

01.02.2015

A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges

verfasst von: Yating Wang, Ing-Ray Chen, Ding-Chau Wang

Erschienen in: Wireless Personal Communications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges resulting from the marriage of powerful yet affordable mobile devices and cloud computing. In this paper we survey existing mobile cloud computing applications, as well as speculate future generation mobile cloud computing applications. We provide insights for the enabling technologies and challenges that lie ahead for us to move forward from mobile computing to mobile cloud computing for building the next generation mobile cloud applications. For each of the challenges, we provide a survey of existing solutions, identify research gaps, and suggest future research areas.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys and Tutorials, 16(1), 369–392.CrossRef Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys and Tutorials, 16(1), 369–392.CrossRef
2.
Zurück zum Zitat Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), 84–106.CrossRef Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), 84–106.CrossRef
3.
Zurück zum Zitat Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.
4.
Zurück zum Zitat Buyya, R. (2014). Introduction to the IEEE transactions on cloud computing. IEEE Transactions on Cloud Computing, 1(1), 3–9.CrossRef Buyya, R. (2014). Introduction to the IEEE transactions on cloud computing. IEEE Transactions on Cloud Computing, 1(1), 3–9.CrossRef
6.
Zurück zum Zitat D’Angelo, G., Ferretti, S., Ghini, V., & Panzieri, F. (2011). Mobile computing in digital ecosystems: Design issues and challenges. In 7th IEEE wireless communications and mobile computing conference, pp. 2127–2132. D’Angelo, G., Ferretti, S., Ghini, V., & Panzieri, F. (2011). Mobile computing in digital ecosystems: Design issues and challenges. In 7th IEEE wireless communications and mobile computing conference, pp. 2127–2132.
7.
Zurück zum Zitat Li, Y., & Chen, I. R. (2011). Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Transactions on Mobile Computing, 10(3), 349–361.CrossRef Li, Y., & Chen, I. R. (2011). Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Transactions on Mobile Computing, 10(3), 349–361.CrossRef
8.
Zurück zum Zitat Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652–687.CrossRef Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652–687.CrossRef
9.
Zurück zum Zitat Khan, A. U. R., Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys and Tutorials, 16(1), 393–413.CrossRef Khan, A. U. R., Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys and Tutorials, 16(1), 393–413.CrossRef
10.
Zurück zum Zitat Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55.CrossRef Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55.CrossRef
11.
Zurück zum Zitat Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1, 7–18.CrossRef Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1, 7–18.CrossRef
12.
Zurück zum Zitat Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Grid computing environments workshop, November 2008, pp. 1–10. Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Grid computing environments workshop, November 2008, pp. 1–10.
13.
Zurück zum Zitat Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security Privacy, 9(2), 50–57.CrossRef Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security Privacy, 9(2), 50–57.CrossRef
14.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. ACM Communications, 53(4), 50–58.CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. ACM Communications, 53(4), 50–58.CrossRef
15.
Zurück zum Zitat Yang, L., Cao, J., Tang, S., Li, T., & Chan, A. (2012) A framework for partitioning and execution of data stream applications in mobile cloud computing. In IEEE 5th international conference on cloud computing, June 2012, pp. 794–802. Yang, L., Cao, J., Tang, S., Li, T., & Chan, A. (2012) A framework for partitioning and execution of data stream applications in mobile cloud computing. In IEEE 5th international conference on cloud computing, June 2012, pp. 794–802.
16.
Zurück zum Zitat Klein, A., Mannweiler, C., Schneider, J., & Schotten, H. D. (2010). Access schemes for mobile cloud computing. In 2010 Eleventh international conference on mobile data management, May 2010, pp. 387–392. Klein, A., Mannweiler, C., Schneider, J., & Schotten, H. D. (2010). Access schemes for mobile cloud computing. In 2010 Eleventh international conference on mobile data management, May 2010, pp. 387–392.
17.
Zurück zum Zitat Bahl, P., Han, R. Y., Li, L. E., & Satyanarayanan, M. (2012). Advancing the state of mobile cloud computing. In ACM workshop on Mobile cloud computing and services, New York, NY, USA, pp. 21–28. Bahl, P., Han, R. Y., Li, L. E., & Satyanarayanan, M. (2012). Advancing the state of mobile cloud computing. In ACM workshop on Mobile cloud computing and services, New York, NY, USA, pp. 21–28.
18.
Zurück zum Zitat Miluzzo, E., Cáceres, R., & Chen, Y.-F. (2012). Vision: mclouds-computing on clouds of mobile devices. In ACM workshop on mobile cloud computing and services, pp. 9–14. Miluzzo, E., Cáceres, R., & Chen, Y.-F. (2012). Vision: mclouds-computing on clouds of mobile devices. In ACM workshop on mobile cloud computing and services, pp. 9–14.
19.
Zurück zum Zitat Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R., Lu, H., et al. (2008). The rise of people-centric sensing. IEEE Internet Computing, 12(4), 12–21.CrossRef Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R., Lu, H., et al. (2008). The rise of people-centric sensing. IEEE Internet Computing, 12(4), 12–21.CrossRef
20.
Zurück zum Zitat Satyanarayanan, M. (2010). Mobile computing: The next decade. In ACM workshop on mobile cloud computing services: Social networks and beyond, pp. 1–6. Satyanarayanan, M. (2010). Mobile computing: The next decade. In ACM workshop on mobile cloud computing services: Social networks and beyond, pp. 1–6.
21.
Zurück zum Zitat Yang, D., Xue, G., Fang, X., & Tang, J. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In ACM MobiCom. Yang, D., Xue, G., Fang, X., & Tang, J. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In ACM MobiCom.
22.
Zurück zum Zitat Lane, N., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., & Campbell, A. (2010). A survey of mobile phone sensing. IEEE Communications Magazine, 48(9), 140–150.CrossRef Lane, N., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., & Campbell, A. (2010). A survey of mobile phone sensing. IEEE Communications Magazine, 48(9), 140–150.CrossRef
23.
Zurück zum Zitat Cheng, H., Sun, F., Buthpitiya, S., & Griss, M. (2012). Sensorchestra: Collaborative sensing for symbolic location recognition. In Mobile computing, applications, and services, pp. 195–210. Cheng, H., Sun, F., Buthpitiya, S., & Griss, M. (2012). Sensorchestra: Collaborative sensing for symbolic location recognition. In Mobile computing, applications, and services, pp. 195–210.
24.
Zurück zum Zitat Lu, H., Pan, W., Lane, N., Choudhury, T., & Campbell, A. (2009). Soundsense: Scalable sound sensing for people-centric applications on mobile phones. In International conference on mobile systems, applications, and services, pp. 165–178. Lu, H., Pan, W., Lane, N., Choudhury, T., & Campbell, A. (2009). Soundsense: Scalable sound sensing for people-centric applications on mobile phones. In International conference on mobile systems, applications, and services, pp. 165–178.
26.
Zurück zum Zitat Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., et al. (2009). Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones. In ACM conference on embedded networked sensor systems, pp. 85–98. Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., et al. (2009). Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones. In ACM conference on embedded networked sensor systems, pp. 85–98.
27.
Zurück zum Zitat Herring, R., Hofleitner, A., Amin, S., Nasr, T., Khalek, A., Abbeel, P., et al. (2009). Using mobile phones to forecast arterial traffic through statistical learning. In Transportation research board. Herring, R., Hofleitner, A., Amin, S., Nasr, T., Khalek, A., Abbeel, P., et al. (2009). Using mobile phones to forecast arterial traffic through statistical learning. In Transportation research board.
28.
Zurück zum Zitat Hunter, T., Moldovan, T., Zaharia, M., Merzgui, S., Ma, J., Franklin, M., et al. (2011). Scaling the mobile millennium system in the cloud. In ACM symposium on cloud computing, p. 28. Hunter, T., Moldovan, T., Zaharia, M., Merzgui, S., Ma, J., Franklin, M., et al. (2011). Scaling the mobile millennium system in the cloud. In ACM symposium on cloud computing, p. 28.
29.
Zurück zum Zitat Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., et al. (2009). Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In ACM international conference on Mobile systems, applications, and services, pp. 55–68. Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., et al. (2009). Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In ACM international conference on Mobile systems, applications, and services, pp. 55–68.
30.
Zurück zum Zitat Khalid, O., Khan, M., Khan, S., & Zomaya, A. (2014). OmniSuggest: A ubiquitous cloud based context aware recommendation system for mobile social networks. IEEE Transactions on Services Computing. doi:10.1109/TSC.2013.53 Khalid, O., Khan, M., Khan, S., & Zomaya, A. (2014). OmniSuggest: A ubiquitous cloud based context aware recommendation system for mobile social networks. IEEE Transactions on Services Computing. doi:10.​1109/​TSC.​2013.​53
31.
Zurück zum Zitat Wang, Y., Wu, J., & Yang, W. S. (2013). Cloud-based multicasting with feedback in mobile social networks. IEEE Transactions on Wireless Communications, 12(12), 6043–6053.CrossRef Wang, Y., Wu, J., & Yang, W. S. (2013). Cloud-based multicasting with feedback in mobile social networks. IEEE Transactions on Wireless Communications, 12(12), 6043–6053.CrossRef
32.
Zurück zum Zitat Miluzzo, E., Lane, N., Fodor, K., Peterson, R., Lu, H., Musolesi, M., et al. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. In ACM conference on embedded network sensor systems, pp. 337–350. Miluzzo, E., Lane, N., Fodor, K., Peterson, R., Lu, H., Musolesi, M., et al. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. In ACM conference on embedded network sensor systems, pp. 337–350.
33.
Zurück zum Zitat Cimler, R., Matyska, J., & Sobeslav, V. (2014). Cloud based solution for mobile healthcare application. ACM 18th international database engineering and applications symposium, July 2014. Cimler, R., Matyska, J., & Sobeslav, V. (2014). Cloud based solution for mobile healthcare application. ACM 18th international database engineering and applications symposium, July 2014.
34.
Zurück zum Zitat Wu, H., Wang, Q., & Wolter, K. (2013). Mobile healthcare systems with multi-cloud offloading. In IEEE 14th international conference on mobile data management, pp. 188–193. Wu, H., Wang, Q., & Wolter, K. (2013). Mobile healthcare systems with multi-cloud offloading. In IEEE 14th international conference on mobile data management, pp. 188–193.
35.
Zurück zum Zitat Consolvo, S., McDonald, D., Toscos, T., Chen, M., Froehlich, J., Harrison, B., et al. (2008). Activity sensing in the wild: A field trial of ubifit garden. In ACM SIGCHI conference on Human factors in computing systems, pp. 1797–1806. Consolvo, S., McDonald, D., Toscos, T., Chen, M., Froehlich, J., Harrison, B., et al. (2008). Activity sensing in the wild: A field trial of ubifit garden. In ACM SIGCHI conference on Human factors in computing systems, pp. 1797–1806.
36.
Zurück zum Zitat Tamai, K., & Shinagawa, A. (2011). Platform for location-based services. Fujitsu Scientific & Technical Journal, 47(4), 426–433. Tamai, K., & Shinagawa, A. (2011). Platform for location-based services. Fujitsu Scientific & Technical Journal, 47(4), 426–433.
37.
Zurück zum Zitat La H., & Kim, S. (2010). A conceptual framework for provisioning context-aware mobile cloud services. In IEEE 3rd international conference on cloud computing, pp. 466–473. La H., & Kim, S. (2010). A conceptual framework for provisioning context-aware mobile cloud services. In IEEE 3rd international conference on cloud computing, pp. 466–473.
38.
Zurück zum Zitat Kangas K., & Röning, J. (1999). Using code mobility to create ubiquitous and active augmented reality in mobile computing. In ACM/IEEE international conference on mobile computing and networking, pp. 48–58. Kangas K., & Röning, J. (1999). Using code mobility to create ubiquitous and active augmented reality in mobile computing. In ACM/IEEE international conference on mobile computing and networking, pp. 48–58.
39.
Zurück zum Zitat Luo, X. (2009). From augmented reality to augmented computing: A look at cloud-mobile convergence. In International symposium on ubiquitous virtual reality, July 2009, pp. 29–32. Luo, X. (2009). From augmented reality to augmented computing: A look at cloud-mobile convergence. In International symposium on ubiquitous virtual reality, July 2009, pp. 29–32.
40.
Zurück zum Zitat Barbera, M. V., Kosta, S., Mei, A., & Stefa, J. (2013). To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. In IEEE INFOCOM 2013. Turin, Italy. Barbera, M. V., Kosta, S., Mei, A., & Stefa, J. (2013). To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. In IEEE INFOCOM 2013. Turin, Italy.
41.
Zurück zum Zitat Hunt, G., Scott, M., et al. (1998). The coign automatic distributed partitioning system. ACM Operating Systems Review, 33, 187–200. Hunt, G., Scott, M., et al. (1998). The coign automatic distributed partitioning system. ACM Operating Systems Review, 33, 187–200.
42.
Zurück zum Zitat Giurgiu, I., Riva, O., Juric, D., Krivulev, I., & Alonso, G. (2009). Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Middleware 2009, pp. 83–102. Giurgiu, I., Riva, O., Juric, D., Krivulev, I., & Alonso, G. (2009). Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Middleware 2009, pp. 83–102.
43.
Zurück zum Zitat Cooper, E., Lindley, S., Wadler, P., & Yallop, J. (2007). Links: Web programming without tiers. In Formal methods for components and objects (pp. 266–296). Berlin: Springer. Cooper, E., Lindley, S., Wadler, P., & Yallop, J. (2007). Links: Web programming without tiers. In Formal methods for components and objects (pp. 266–296). Berlin: Springer.
44.
Zurück zum Zitat Yang, F., Shanmugasundaram, J., Riedewald, M., & Gehrke, J. (2006). Hilda: A high-level language for data-drivenweb applications. In IEEE international conference on data engineering, pp. 32–32. Yang, F., Shanmugasundaram, J., Riedewald, M., & Gehrke, J. (2006). Hilda: A high-level language for data-drivenweb applications. In IEEE international conference on data engineering, pp. 32–32.
45.
Zurück zum Zitat Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., & Patti, A. (2011). CloneCloud: Elastic execution between mobile device and cloud. In ACM conference on computer systems, pp. 301–314. Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., & Patti, A. (2011). CloneCloud: Elastic execution between mobile device and cloud. In ACM conference on computer systems, pp. 301–314.
46.
Zurück zum Zitat Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). Maui: Making smartphones last longer with ccode offload. In AMC international conference on Mobile systems, applications, and services, New York, NY, USA, pp. 49–62 Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). Maui: Making smartphones last longer with ccode offload. In AMC international conference on Mobile systems, applications, and services, New York, NY, USA, pp. 49–62
47.
Zurück zum Zitat Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In Mobile computing, applications, and services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76, pp. 59–79). Berlin: Springer. Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In Mobile computing, applications, and services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76, pp. 59–79). Berlin: Springer.
48.
Zurück zum Zitat Kosta, S., Aucinas, A., Hui, P., Mortier, R., & Zhang, X. (March 2012). ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In IEEE INFOCOM, pp. 945–953. Kosta, S., Aucinas, A., Hui, P., Mortier, R., & Zhang, X. (March 2012). ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In IEEE INFOCOM, pp. 945–953.
49.
Zurück zum Zitat Rudenko, A., Reiher, P., Popek, G. J., & Kuenning, G. H. (1999). The remote processing framework for portable computer power saving. In ACM symposium on Applied computing, pp. 365–372. Rudenko, A., Reiher, P., Popek, G. J., & Kuenning, G. H. (1999). The remote processing framework for portable computer power saving. In ACM symposium on Applied computing, pp. 365–372.
50.
Zurück zum Zitat Newhouse T., & Pasquale, J. (2004). Resource-controlled remote execution to enhance wireless network applications. In Workshop on applications and services in wireless networks, August 2004, pp. 30–38. Newhouse T., & Pasquale, J. (2004). Resource-controlled remote execution to enhance wireless network applications. In Workshop on applications and services in wireless networks, August 2004, pp. 30–38.
52.
Zurück zum Zitat Guo, T., Yan, Z., & Aberer, K. (2012). An adaptive approach for online segmentation of multi-dimensional mobile data. In ACM international workshop on data engineering for wireless and mobile access, pp. 7–14. Guo, T., Yan, Z., & Aberer, K. (2012). An adaptive approach for online segmentation of multi-dimensional mobile data. In ACM international workshop on data engineering for wireless and mobile access, pp. 7–14.
53.
Zurück zum Zitat Hao, F., Lakshman, T., Mukherjee, S., & Song, H. (2009). Enhancing dynamic cloud-based services using network virtualization. In ACM workshop on Virtualized infrastructure systems and architectures, pp. 37–44. Hao, F., Lakshman, T., Mukherjee, S., & Song, H. (2009). Enhancing dynamic cloud-based services using network virtualization. In ACM workshop on Virtualized infrastructure systems and architectures, pp. 37–44.
54.
Zurück zum Zitat Zhu, W., Luo, C., Wang, J., & Li, S. (2011). Multimedia cloud computing. IEEE Signal Processing Magazine, 28(3), 59–69.CrossRef Zhu, W., Luo, C., Wang, J., & Li, S. (2011). Multimedia cloud computing. IEEE Signal Processing Magazine, 28(3), 59–69.CrossRef
55.
Zurück zum Zitat Ferretti, S., Ghini, V., Panzieri, F., & Turrini, E. (July 2010). Seamless support of multimedia distributed applications through a cloud. In IEEE 3rd international conference on cloud computing, pp. 548–549. Ferretti, S., Ghini, V., Panzieri, F., & Turrini, E. (July 2010). Seamless support of multimedia distributed applications through a cloud. In IEEE 3rd international conference on cloud computing, pp. 548–549.
56.
Zurück zum Zitat Nan, X., He, Y., & Guan, L. (2011). Optimal resource allocation for multimedia cloud based on queuing model. In IEEE 13th international workshop on multimedia signal processing, October 2011, pp. 1–6. Nan, X., He, Y., & Guan, L. (2011). Optimal resource allocation for multimedia cloud based on queuing model. In IEEE 13th international workshop on multimedia signal processing, October 2011, pp. 1–6.
57.
Zurück zum Zitat Altamimi, M., Palit, R., Naik, K., & Nayak, A. (June 2012). Energy-as-a-service (EaaS): On the efficacy of multimedia cloud computing to save smartphone energy. In IEEE 5th international conference on cloud computing, pp. 764–771. Altamimi, M., Palit, R., Naik, K., & Nayak, A. (June 2012). Energy-as-a-service (EaaS): On the efficacy of multimedia cloud computing to save smartphone energy. In IEEE 5th international conference on cloud computing, pp. 764–771.
60.
Zurück zum Zitat Tan, Z., Chu, D., & Zhong, L. (2014). Vision: Cloud and crowd assistance for GPS urban canyons. ACM Mobisys, pp. 23–27. Tan, Z., Chu, D., & Zhong, L. (2014). Vision: Cloud and crowd assistance for GPS urban canyons. ACM Mobisys, pp. 23–27.
61.
Zurück zum Zitat Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks. In ACM SIGKDD international conference on knowledge discovery and data mining, pp. 1082–1090. Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks. In ACM SIGKDD international conference on knowledge discovery and data mining, pp. 1082–1090.
62.
Zurück zum Zitat Stuedi, P., Mohomed, I., & Terry, D. (2010). Wherestore: Location-based data storage for mobile devices interacting with the cloud. In ACM workshop on mobile cloud computing and services: Social networks and beyond, pp. 1–8. Stuedi, P., Mohomed, I., & Terry, D. (2010). Wherestore: Location-based data storage for mobile devices interacting with the cloud. In ACM workshop on mobile cloud computing and services: Social networks and beyond, pp. 1–8.
63.
Zurück zum Zitat Ananthanarayanan, G., Douglas, C., Ramakrishnan, R., Rao, S., & Stoica, I. (2012). True elasticity in multi-tenant data-intensive compute clusters. In ACM symposium on cloud computing, pp. 1–7. Ananthanarayanan, G., Douglas, C., Ramakrishnan, R., Rao, S., & Stoica, I. (2012). True elasticity in multi-tenant data-intensive compute clusters. In ACM symposium on cloud computing, pp. 1–7.
64.
Zurück zum Zitat Rai, A., Bhagwan, R., & Guha, S. Generalized resource allocation for the cloud. In ACM symposium on cloud computing, pp. 15:1–15:12. Rai, A., Bhagwan, R., & Guha, S. Generalized resource allocation for the cloud. In ACM symposium on cloud computing, pp. 15:1–15:12.
65.
Zurück zum Zitat He, Y., Elnikety, S., Larus, J., & Yan, C. (2012). Zeta: Scheduling interactive services with partial execution. In ACM symposium on cloud computing, pp. 1–14. He, Y., Elnikety, S., Larus, J., & Yan, C. (2012). Zeta: Scheduling interactive services with partial execution. In ACM symposium on cloud computing, pp. 1–14.
66.
Zurück zum Zitat Tumanov, A., Cipar, J., Ganger, G. R., & Kozuch, M. A. (2012). alsched: Algebraic scheduling of mixed workloads in heterogeneous clouds. In ACM Symposium on Cloud Computing (pp. 1–7). Tumanov, A., Cipar, J., Ganger, G. R., & Kozuch, M. A. (2012). alsched: Algebraic scheduling of mixed workloads in heterogeneous clouds. In ACM Symposium on Cloud Computing (pp. 1–7).
67.
Zurück zum Zitat Shen, Z., Subbiah, S., Gu, X., & Wilkes, J. (2011). CloudScale: Elastic resource scaling for multi-tenant cloud systems. In ACM symposium on cloud computing, pp. 1–14. Shen, Z., Subbiah, S., Gu, X., & Wilkes, J. (2011). CloudScale: Elastic resource scaling for multi-tenant cloud systems. In ACM symposium on cloud computing, pp. 1–14.
68.
Zurück zum Zitat Harbitter A., & Menascé, D. A. (2001). The performance of public key-enabled kerberos authentication in mobile computing applications. In ACM conference on computer and communications security, pp. 78–85. Harbitter A., & Menascé, D. A. (2001). The performance of public key-enabled kerberos authentication in mobile computing applications. In ACM conference on computer and communications security, pp. 78–85.
69.
Zurück zum Zitat Al-Muhtadi, J., Ranganathan, A., Campbell, R., & Mickunas, M. (2002). A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In International conference on distributed computing systems workshops, pp. 771–776. Al-Muhtadi, J., Ranganathan, A., Campbell, R., & Mickunas, M. (2002). A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In International conference on distributed computing systems workshops, pp. 771–776.
70.
Zurück zum Zitat Bonneau, J., Herley, C., van Oorschot, P., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE symposium on security and privacy, pp. 553–567. Bonneau, J., Herley, C., van Oorschot, P., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE symposium on security and privacy, pp. 553–567.
71.
Zurück zum Zitat Recordon D., & Reed, D. (2006). Openid 2.0: A platform for user-centric identity management. In ACM workshop on digital identity management, pp. 11–16. Recordon D., & Reed, D. (2006). Openid 2.0: A platform for user-centric identity management. In ACM workshop on digital identity management, pp. 11–16.
72.
Zurück zum Zitat Parno, B., Kuo, C., & Perrig, A. (2006). Phoolproof phishing prevention. In Financial cryptography and data security (pp. 1–19). International Financial Cryptography Association. Parno, B., Kuo, C., & Perrig, A. (2006). Phoolproof phishing prevention. In Financial cryptography and data security (pp. 1–19). International Financial Cryptography Association.
74.
Zurück zum Zitat Sun, S.-T., & Beznosov, K. (2012). The devil is in the (implementation) details: An empirical analysis of oauth sso systems. In ACM conference on Computer and communications security, pp. 378–390. Sun, S.-T., & Beznosov, K. (2012). The devil is in the (implementation) details: An empirical analysis of oauth sso systems. In ACM conference on Computer and communications security, pp. 378–390.
75.
Zurück zum Zitat Chari, S., Jutla, C., & Roy, A. (2011). Universally composable security analysis of oauth v2. 0. 0. Cryptology ePrint Archive, Report 2011/526, Tech. Rep. Chari, S., Jutla, C., & Roy, A. (2011). Universally composable security analysis of oauth v2. 0. 0. Cryptology ePrint Archive, Report 2011/526, Tech. Rep.
76.
Zurück zum Zitat Pai, S., Sharma, Y., Kumar, S., Pai, R., & Singh, S. (2011). Formal verification of oauth 2.0 using alloy framework. In IEEE international conference on communication systems and network technologies, pp. 655–659. Pai, S., Sharma, Y., Kumar, S., Pai, R., & Singh, S. (2011). Formal verification of oauth 2.0 using alloy framework. In IEEE international conference on communication systems and network technologies, pp. 655–659.
78.
Zurück zum Zitat Miculan, M., & Urban, C. (2011). Formal analysis of facebook connect single sign-on authentication protocol. In SOFSEM, Vol. 11, pp. 22–28. Miculan, M., & Urban, C. (2011). Formal analysis of facebook connect single sign-on authentication protocol. In SOFSEM, Vol. 11, pp. 22–28.
81.
Zurück zum Zitat van Dijk, M., Juels, A., Oprea, A., Rivest, R. L., Stefanov, E. & Triandopoulos, N. (2012). Hourglass schemes: How to prove that cloud files are encrypted. In ACM conference on computer and communications security, pp. 265–280. van Dijk, M., Juels, A., Oprea, A., Rivest, R. L., Stefanov, E. & Triandopoulos, N. (2012). Hourglass schemes: How to prove that cloud files are encrypted. In ACM conference on computer and communications security, pp. 265–280.
82.
Zurück zum Zitat Chen, I., & Wang, Y. (2012). Reliability analysis of wireless sensor networks with distributed code attestation. IEEE Communications Letters, 16(10), 1640–1643.CrossRef Chen, I., & Wang, Y. (2012). Reliability analysis of wireless sensor networks with distributed code attestation. IEEE Communications Letters, 16(10), 1640–1643.CrossRef
83.
Zurück zum Zitat Zaman, S., & Grosu, D. (2011). Combinatorial auction-based dynamic vm provisioning and allocation in clouds. In IEEE third international conference on cloud computing technology and science, pp. 107–114. Zaman, S., & Grosu, D. (2011). Combinatorial auction-based dynamic vm provisioning and allocation in clouds. In IEEE third international conference on cloud computing technology and science, pp. 107–114.
84.
Zurück zum Zitat Wang, W., Li, B., & Liang, B. (2012). Towards optimal capacity segmentation with hybrid cloud pricing. In IEEE 32nd international conference on distributed computing systems, pp. 425–434. Wang, W., Li, B., & Liang, B. (2012). Towards optimal capacity segmentation with hybrid cloud pricing. In IEEE 32nd international conference on distributed computing systems, pp. 425–434.
85.
Zurück zum Zitat Lampe, U., Siebenhaar, M., Papageorgiou, A., Schuller, D., & Steinmetz, R. (2012). Maximizing cloud provider profit from equilibrium price auctions. In IEEE 5th international conference on cloud computing, pp. 83–90. Lampe, U., Siebenhaar, M., Papageorgiou, A., Schuller, D., & Steinmetz, R. (2012). Maximizing cloud provider profit from equilibrium price auctions. In IEEE 5th international conference on cloud computing, pp. 83–90.
86.
Zurück zum Zitat Zafer, M., Song, Y., & Lee, K. (2012). Optimal bids for spot vms in a cloud for deadline constrained jobs. In IEEE 5th international conference on cloud computing, pp. 75–82. Zafer, M., Song, Y., & Lee, K. (2012). Optimal bids for spot vms in a cloud for deadline constrained jobs. In IEEE 5th international conference on cloud computing, pp. 75–82.
87.
Zurück zum Zitat Tang, S., Yuan, J., & Li, X. (2012). Towards optimal bidding strategy for amazon ec2 cloud spot instance. In IEEE 5th international conference on cloud computing, pp. 91–98. Tang, S., Yuan, J., & Li, X. (2012). Towards optimal bidding strategy for amazon ec2 cloud spot instance. In IEEE 5th international conference on cloud computing, pp. 91–98.
88.
Zurück zum Zitat Li, H., & Li, H. (2011). A research of resource provider-oriented pricing mechanism based on game theory in cloud bank model. In IEEE international conference on cloud and service computing, pp. 126–130. Li, H., & Li, H. (2011). A research of resource provider-oriented pricing mechanism based on game theory in cloud bank model. In IEEE international conference on cloud and service computing, pp. 126–130.
89.
Zurück zum Zitat Mokbel, M., Ghanem, T., & Aref, W. (2003). Spatio-temporal access methods. IEEE Data Engineering Bulletin, 26(2), 40–49. Mokbel, M., Ghanem, T., & Aref, W. (2003). Spatio-temporal access methods. IEEE Data Engineering Bulletin, 26(2), 40–49.
90.
Zurück zum Zitat Jensen, C., Lin, D., & Ooi, B. (2004). Query and update efficient b+-tree based indexing of moving objects. In International conference on very large data bases-Volume 30, pp. 768–779. Jensen, C., Lin, D., & Ooi, B. (2004). Query and update efficient b+-tree based indexing of moving objects. In International conference on very large data bases-Volume 30, pp. 768–779.
91.
Zurück zum Zitat Kwon, D., Lee, S., & Lee, S. (2002). Indexing the current positions of moving objects using the lazy update r-tree. In IEEE international conference on mobile data management, pp. 113–120. Kwon, D., Lee, S., & Lee, S. (2002). Indexing the current positions of moving objects using the lazy update r-tree. In IEEE international conference on mobile data management, pp. 113–120.
92.
Zurück zum Zitat Lee, M., Hsu, W., Jensen, C., Cui, B., & Teo, K. (2003). Supporting frequent updates in r-trees: A bottom-up approach. In International conference on very large databases, pp. 608–619. Lee, M., Hsu, W., Jensen, C., Cui, B., & Teo, K. (2003). Supporting frequent updates in r-trees: A bottom-up approach. In International conference on very large databases, pp. 608–619.
93.
Zurück zum Zitat Lin, B., & Su, J. (2004). On bulk loading TPR-tree. In IEEE international conference on mobile data management, pp. 114–124. Lin, B., & Su, J. (2004). On bulk loading TPR-tree. In IEEE international conference on mobile data management, pp. 114–124.
94.
Zurück zum Zitat Saltenis, S., & Jensen, C. (2002). Indexing of moving objects for location-based services. In IEEE international conference on data engineering, pp. 463–472. Saltenis, S., & Jensen, C. (2002). Indexing of moving objects for location-based services. In IEEE international conference on data engineering, pp. 463–472.
95.
Zurück zum Zitat Tao, Y., Papadias, D., & Sun, J. (2003). The TPR*-tree: an optimized spatio-temporal access method for predictive queries. In International conference on very large databases vol. 29, pp. 790–801. Tao, Y., Papadias, D., & Sun, J. (2003). The TPR*-tree: an optimized spatio-temporal access method for predictive queries. In International conference on very large databases vol. 29, pp. 790–801.
96.
Zurück zum Zitat Mokbel, M., & Aref, W. (2005). Gpac: Generic and progressive processing of mobile queries over mobile data. In IEEE international conference on mobile data management, pp. 155–163. Mokbel, M., & Aref, W. (2005). Gpac: Generic and progressive processing of mobile queries over mobile data. In IEEE international conference on mobile data management, pp. 155–163.
97.
Zurück zum Zitat Badger, L., Grance, T., Patt-Corner, R., & Voas, J. (2011). Draft cloud computing synopsis and recommendations. NIST Special Publication, 800, 146. Badger, L., Grance, T., Patt-Corner, R., & Voas, J. (2011). Draft cloud computing synopsis and recommendations. NIST Special Publication, 800, 146.
98.
Zurück zum Zitat Rimal, B., Choi, E., & Lumb, I. (2009). A taxonomy and survey of cloud computing systems. In IEEE international joint conference on INC, IMS and IDC, pp. 44–51. Rimal, B., Choi, E., & Lumb, I. (2009). A taxonomy and survey of cloud computing systems. In IEEE international joint conference on INC, IMS and IDC, pp. 44–51.
99.
Zurück zum Zitat Reiss, C., Tumanov, A., Ganger, G. R., Katz, R. H., & Kozuch, M. A. (2012). Heterogeneity and dynamicity of clouds at scale: Google trace analysis. In ACM symposium on cloud computing, pp. 1–13. Reiss, C., Tumanov, A., Ganger, G. R., Katz, R. H., & Kozuch, M. A. (2012). Heterogeneity and dynamicity of clouds at scale: Google trace analysis. In ACM symposium on cloud computing, pp. 1–13.
101.
Zurück zum Zitat Yilmaz, O., & Chen, I. R. (2009). Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Computer Communications, 32(2), 317–323.CrossRef Yilmaz, O., & Chen, I. R. (2009). Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Computer Communications, 32(2), 317–323.CrossRef
102.
Zurück zum Zitat Chen, I. R., Yilmaz, O., & Yen, I. L. (2006). Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks. Wireless Personal Communications, 38(3), 357–376.CrossRef Chen, I. R., Yilmaz, O., & Yen, I. L. (2006). Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks. Wireless Personal Communications, 38(3), 357–376.CrossRef
103.
Zurück zum Zitat Noor, T.H., Sheng, Q.Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Survey, 46(1), article 12. Noor, T.H., Sheng, Q.Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Survey, 46(1), article 12.
104.
Zurück zum Zitat Sherchan, W., Nepal, S., & Paris, C. (2013). A survey of trust in social networks. ACM Computing Survey, 45(4), article 47. Sherchan, W., Nepal, S., & Paris, C. (2013). A survey of trust in social networks. ACM Computing Survey, 45(4), article 47.
105.
Zurück zum Zitat Cho, J.H., Swami, A., & Chen, I. R. (2009). Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In International Conference on Computational Science and Engineering, August 2009, pp. 641–650. Cho, J.H., Swami, A., & Chen, I. R. (2009). Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In International Conference on Computational Science and Engineering, August 2009, pp. 641–650.
106.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.CrossRef Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.CrossRef
107.
Zurück zum Zitat Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183. Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.
108.
Zurück zum Zitat Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. (2011). Trust-based intrusion detection in wireless sensor networks. IEEE international conference on communications (ICC), pp. 1–6. Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. (2011). Trust-based intrusion detection in wireless sensor networks. IEEE international conference on communications (ICC), pp. 1–6.
109.
Zurück zum Zitat Chen, I. R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef Chen, I. R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef
Metadaten
Titel
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges
verfasst von
Yating Wang
Ing-Ray Chen
Ding-Chau Wang
Publikationsdatum
01.02.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2102-7

Weitere Artikel der Ausgabe 4/2015

Wireless Personal Communications 4/2015 Zur Ausgabe

Neuer Inhalt