Skip to main content
Top

2017 | OriginalPaper | Chapter

8. Mobile Computing in the Construction Industry: Main Challenges and Solutions

Authors : M. Silverio, S. Renukappa, S. Suresh, A. Donastorg

Published in: Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing (CC) enables users to access application remotely, providing mobility and ubiquitous data access; this would be an advantage in construction management. In addition, mobile cloud computing (MCC) enables mobile devices to augment constrained resources such as processing, storage, and battery autonomy by using the cloud infrastructure. This paper is aimed at proposing solutions to some of the main challenges of the construction sector by adopting mobile cloud services. A literature review was performed highlighting the potential benefits and risks in the implementation of CC, infrastructure and execution of MCC, and main challenges in the construction industry. The main benefits of adopting cloud-based resources are cost reduction, system mobility, system flexibility, and system maintenance. While the main risks are information security, privileged user access, regulatory compliance, data location, availability, and disaster recovery. In terms of execution, cloud-based mobile applications present mostly benefits since they enable users to execute ubiquitously high-performance operations in mobile devices. The review of the literature provided enough information for this paper to suggest solutions to some of the main challenges in the construction sector, namely: design, materials, finance, management, and knowledge. The solutions are mainly based on providing mobility, ubiquitous data access, and improved cross-functional communication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef
go back to reference Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52–68.CrossRef Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52–68.CrossRef
go back to reference CSA (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance. CSA (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance.
go back to reference Ayarkwa, J., Agyekum, K., & Adinyira, E. (2011). Barriers to sustainable implementation of lean construction in the Ghanaian building industry (p. 67). Paper presented at the Sixth Built Environment Conference Johannesburg South Africa July 31–August 2, 2011. Ayarkwa, J., Agyekum, K., & Adinyira, E. (2011). Barriers to sustainable implementation of lean construction in the Ghanaian building industry (p. 67). Paper presented at the Sixth Built Environment Conference Johannesburg South Africa July 31–August 2, 2011.
go back to reference Ballagas, R. A., Kratz, S. G., Borchers, J., Yu, E., Walz, S. P., Fuhr, C. O., et al. (2007). REXplorer: A mobile, pervasive spell-casting game for tourists (pp. 1929–1934). Paper presented at the CHI’07 Extended Abstracts on Human Factors in Computing Systems. Ballagas, R. A., Kratz, S. G., Borchers, J., Yu, E., Walz, S. P., Fuhr, C. O., et al. (2007). REXplorer: A mobile, pervasive spell-casting game for tourists (pp. 1929–1934). Paper presented at the CHI’07 Extended Abstracts on Human Factors in Computing Systems.
go back to reference Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726–733.CrossRef Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726–733.CrossRef
go back to reference Cano, M., & Domenech-Asensi, G. (2011). A secure energy-efficient m-banking application for mobile devices. Journal of Systems and Software, 84(11), 1899–1909.CrossRef Cano, M., & Domenech-Asensi, G. (2011). A secure energy-efficient m-banking application for mobile devices. Journal of Systems and Software, 84(11), 1899–1909.CrossRef
go back to reference Carroll, M., Van Der Merwe, A., & Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls (pp. 1–9). Paper presented at the Information Security South Africa (ISSA), 2011. Carroll, M., Van Der Merwe, A., & Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls (pp. 1–9). Paper presented at the Information Security South Africa (ISSA), 2011.
go back to reference Cheng, J. C., & Kumar, B. (2012). Cloud computing support for construction collaboration. In Mobile and pervasive computing in construction (pp. 237–254). Cheng, J. C., & Kumar, B. (2012). Cloud computing support for construction collaboration. In Mobile and pervasive computing in construction (pp. 237–254).
go back to reference Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload (pp. 49–62). Paper presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload (pp. 49–62). Paper presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services.
go back to reference European Network and Information Security Agency. (2009). Cloud computing: Benefits, risks and recommendations for information security. ENISA. European Network and Information Security Agency. (2009). Cloud computing: Benefits, risks and recommendations for information security. ENISA.
go back to reference Fink, A. (1998). Conducting research literature reviews: From paper to the internet. 1st ed. Los Angeles, United States: Thousand Oaks : Sage Publications. Fink, A. (1998). Conducting research literature reviews: From paper to the internet. 1st ed. Los Angeles, United States: Thousand Oaks : Sage Publications.
go back to reference Häkkinen, T., & Belloni, K. (2011). Barriers and drivers for sustainable building. Building Research & Information, 39(3), 239–255.CrossRef Häkkinen, T., & Belloni, K. (2011). Barriers and drivers for sustainable building. Building Research & Information, 39(3), 239–255.CrossRef
go back to reference Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner report. Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner report.
go back to reference Hubbard, D., & Sutton, M. (2010). Top threats to cloud computing v1. 0. Cloud Security Alliance. Hubbard, D., & Sutton, M. (2010). Top threats to cloud computing v1. 0. Cloud Security Alliance.
go back to reference Jansen, W., & Hooks, C. (2011) Security and privacy issues in cloud computing system sciences (HICSS). Paper presented at the 2011 44th Hawaii International Conference on. Jansen, W., & Hooks, C. (2011) Security and privacy issues in cloud computing system sciences (HICSS). Paper presented at the 2011 44th Hawaii International Conference on.
go back to reference Lenders, V., Wagner, J., & May, M. (2006). Analyzing the impact of mobility in ad hoc networks (pp. 39–46). Paper presented at the Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality. Lenders, V., Wagner, J., & May, M. (2006). Analyzing the impact of mobility in ad hoc networks (pp. 39–46). Paper presented at the Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality.
go back to reference Marotta, M. A., Faganello, L. R., Schimuneck, M. A. K., Granville, L. Z., Rochol, J., & Both, C. B. (2015). Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks. Marotta, M. A., Faganello, L. R., Schimuneck, M. A. K., Granville, L. Z., Rochol, J., & Both, C. B. (2015). Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks.
go back to reference Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. New York: Assoc Computing Machinery. Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. New York: Assoc Computing Machinery.
go back to reference Menken, I. (2012). An introduction to Cloud Computing. Emereo Publishing. Menken, I. (2012). An introduction to Cloud Computing. Emereo Publishing.
go back to reference Nazir, F., Ma, J., & Seneviratne, A. (2009). Time critical content delivery using predictable patterns in mobile social networks (Vol. 4, pp. 1066–1073). Paper presented at the International Conference on Computational Science and Engineering, 2009, CSE’09. Nazir, F., Ma, J., & Seneviratne, A. (2009). Time critical content delivery using predictable patterns in mobile social networks (Vol. 4, pp. 1066–1073). Paper presented at the International Conference on Computational Science and Engineering, 2009, CSE’09.
go back to reference Prakash, S. (2011). Risk management: Cloud computing considerations. Canadian Management Accounting. Prakash, S. (2011). Risk management: Cloud computing considerations. Canadian Management Accounting.
go back to reference Proverbs, D.G., Holt, G.D. and Cheok, H.Y., 2000. Construction industry problems: the views of UK construction Directors, 16th Annual ARCOM Conference 2000, pp. 73–81. Proverbs, D.G., Holt, G.D. and Cheok, H.Y., 2000. Construction industry problems: the views of UK construction Directors, 16th Annual ARCOM Conference 2000, pp. 73–81.
go back to reference Rengaraju, P., Lung, C., Yu, F. R., & Srinivasan, A. (2012). On QoE monitoring and E2E service assurance in 4G wireless networks. IEEE Wireless Communications, 19(4), 89–96.CrossRef Rengaraju, P., Lung, C., Yu, F. R., & Srinivasan, A. (2012). On QoE monitoring and E2E service assurance in 4G wireless networks. IEEE Wireless Communications, 19(4), 89–96.CrossRef
go back to reference Rountree, D. and Castrillo, I., 2013. The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes. Rountree, D. and Castrillo, I., 2013. The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes.
go back to reference Shehu, Z., & Akintoye, A. (2010). Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis. International Journal of Project Management, 28(1), 26–39.CrossRef Shehu, Z., & Akintoye, A. (2010). Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis. International Journal of Project Management, 28(1), 26–39.CrossRef
go back to reference Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116.CrossRef Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116.CrossRef
go back to reference Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278.CrossRef Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278.CrossRef
go back to reference Teuteberg, F., & Wittstruck, D. (2010). A systematic review of sustainable supply chain management. Multikonferenz Wirtschaftsinformatik, 2010, 203. Teuteberg, F., & Wittstruck, D. (2010). A systematic review of sustainable supply chain management. Multikonferenz Wirtschaftsinformatik, 2010, 203.
go back to reference Vaquero, L.M., Rodero-Merino, L., Caceres, J. and Lindner, M., 2009. A Break in the Clouds: Towards a Cloud Definition. New York: Assoc Computing Machinery. Vaquero, L.M., Rodero-Merino, L., Caceres, J. and Lindner, M., 2009. A Break in the Clouds: Towards a Cloud Definition. New York: Assoc Computing Machinery.
go back to reference Vouk, M.A., 2008. Cloud computing - Issues, research and implementations, 2008, IEEE, pp. 31–40. Vouk, M.A., 2008. Cloud computing - Issues, research and implementations, 2008, IEEE, pp. 31–40.
go back to reference Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.CrossRef Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.CrossRef
go back to reference Zhang, J., & Figueiredo, R. J. (2006). Application classification through monitoring and learning of resource consumption patterns (10 pp). Paper presented at the 20th International Parallel and Distributed Processing Symposium, 2006, IPDPS 2006. Zhang, J., & Figueiredo, R. J. (2006). Application classification through monitoring and learning of resource consumption patterns (10 pp). Paper presented at the 20th International Parallel and Distributed Processing Symposium, 2006, IPDPS 2006.
Metadata
Title
Mobile Computing in the Construction Industry: Main Challenges and Solutions
Authors
M. Silverio
S. Renukappa
S. Suresh
A. Donastorg
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-43434-6_8