Skip to main content

2017 | OriginalPaper | Buchkapitel

8. Mobile Computing in the Construction Industry: Main Challenges and Solutions

verfasst von : M. Silverio, S. Renukappa, S. Suresh, A. Donastorg

Erschienen in: Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing (CC) enables users to access application remotely, providing mobility and ubiquitous data access; this would be an advantage in construction management. In addition, mobile cloud computing (MCC) enables mobile devices to augment constrained resources such as processing, storage, and battery autonomy by using the cloud infrastructure. This paper is aimed at proposing solutions to some of the main challenges of the construction sector by adopting mobile cloud services. A literature review was performed highlighting the potential benefits and risks in the implementation of CC, infrastructure and execution of MCC, and main challenges in the construction industry. The main benefits of adopting cloud-based resources are cost reduction, system mobility, system flexibility, and system maintenance. While the main risks are information security, privileged user access, regulatory compliance, data location, availability, and disaster recovery. In terms of execution, cloud-based mobile applications present mostly benefits since they enable users to execute ubiquitously high-performance operations in mobile devices. The review of the literature provided enough information for this paper to suggest solutions to some of the main challenges in the construction sector, namely: design, materials, finance, management, and knowledge. The solutions are mainly based on providing mobility, ubiquitous data access, and improved cross-functional communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef
Zurück zum Zitat Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52–68.CrossRef Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52–68.CrossRef
Zurück zum Zitat CSA (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance. CSA (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance.
Zurück zum Zitat Ayarkwa, J., Agyekum, K., & Adinyira, E. (2011). Barriers to sustainable implementation of lean construction in the Ghanaian building industry (p. 67). Paper presented at the Sixth Built Environment Conference Johannesburg South Africa July 31–August 2, 2011. Ayarkwa, J., Agyekum, K., & Adinyira, E. (2011). Barriers to sustainable implementation of lean construction in the Ghanaian building industry (p. 67). Paper presented at the Sixth Built Environment Conference Johannesburg South Africa July 31–August 2, 2011.
Zurück zum Zitat Ballagas, R. A., Kratz, S. G., Borchers, J., Yu, E., Walz, S. P., Fuhr, C. O., et al. (2007). REXplorer: A mobile, pervasive spell-casting game for tourists (pp. 1929–1934). Paper presented at the CHI’07 Extended Abstracts on Human Factors in Computing Systems. Ballagas, R. A., Kratz, S. G., Borchers, J., Yu, E., Walz, S. P., Fuhr, C. O., et al. (2007). REXplorer: A mobile, pervasive spell-casting game for tourists (pp. 1929–1934). Paper presented at the CHI’07 Extended Abstracts on Human Factors in Computing Systems.
Zurück zum Zitat Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726–733.CrossRef Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726–733.CrossRef
Zurück zum Zitat Cano, M., & Domenech-Asensi, G. (2011). A secure energy-efficient m-banking application for mobile devices. Journal of Systems and Software, 84(11), 1899–1909.CrossRef Cano, M., & Domenech-Asensi, G. (2011). A secure energy-efficient m-banking application for mobile devices. Journal of Systems and Software, 84(11), 1899–1909.CrossRef
Zurück zum Zitat Carroll, M., Van Der Merwe, A., & Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls (pp. 1–9). Paper presented at the Information Security South Africa (ISSA), 2011. Carroll, M., Van Der Merwe, A., & Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls (pp. 1–9). Paper presented at the Information Security South Africa (ISSA), 2011.
Zurück zum Zitat Cheng, J. C., & Kumar, B. (2012). Cloud computing support for construction collaboration. In Mobile and pervasive computing in construction (pp. 237–254). Cheng, J. C., & Kumar, B. (2012). Cloud computing support for construction collaboration. In Mobile and pervasive computing in construction (pp. 237–254).
Zurück zum Zitat Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload (pp. 49–62). Paper presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload (pp. 49–62). Paper presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services.
Zurück zum Zitat European Network and Information Security Agency. (2009). Cloud computing: Benefits, risks and recommendations for information security. ENISA. European Network and Information Security Agency. (2009). Cloud computing: Benefits, risks and recommendations for information security. ENISA.
Zurück zum Zitat Fink, A. (1998). Conducting research literature reviews: From paper to the internet. 1st ed. Los Angeles, United States: Thousand Oaks : Sage Publications. Fink, A. (1998). Conducting research literature reviews: From paper to the internet. 1st ed. Los Angeles, United States: Thousand Oaks : Sage Publications.
Zurück zum Zitat Häkkinen, T., & Belloni, K. (2011). Barriers and drivers for sustainable building. Building Research & Information, 39(3), 239–255.CrossRef Häkkinen, T., & Belloni, K. (2011). Barriers and drivers for sustainable building. Building Research & Information, 39(3), 239–255.CrossRef
Zurück zum Zitat Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner report. Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner report.
Zurück zum Zitat Hubbard, D., & Sutton, M. (2010). Top threats to cloud computing v1. 0. Cloud Security Alliance. Hubbard, D., & Sutton, M. (2010). Top threats to cloud computing v1. 0. Cloud Security Alliance.
Zurück zum Zitat Jansen, W., & Hooks, C. (2011) Security and privacy issues in cloud computing system sciences (HICSS). Paper presented at the 2011 44th Hawaii International Conference on. Jansen, W., & Hooks, C. (2011) Security and privacy issues in cloud computing system sciences (HICSS). Paper presented at the 2011 44th Hawaii International Conference on.
Zurück zum Zitat Lenders, V., Wagner, J., & May, M. (2006). Analyzing the impact of mobility in ad hoc networks (pp. 39–46). Paper presented at the Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality. Lenders, V., Wagner, J., & May, M. (2006). Analyzing the impact of mobility in ad hoc networks (pp. 39–46). Paper presented at the Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality.
Zurück zum Zitat Marotta, M. A., Faganello, L. R., Schimuneck, M. A. K., Granville, L. Z., Rochol, J., & Both, C. B. (2015). Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks. Marotta, M. A., Faganello, L. R., Schimuneck, M. A. K., Granville, L. Z., Rochol, J., & Both, C. B. (2015). Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks.
Zurück zum Zitat Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. New York: Assoc Computing Machinery. Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. New York: Assoc Computing Machinery.
Zurück zum Zitat Menken, I. (2012). An introduction to Cloud Computing. Emereo Publishing. Menken, I. (2012). An introduction to Cloud Computing. Emereo Publishing.
Zurück zum Zitat Nazir, F., Ma, J., & Seneviratne, A. (2009). Time critical content delivery using predictable patterns in mobile social networks (Vol. 4, pp. 1066–1073). Paper presented at the International Conference on Computational Science and Engineering, 2009, CSE’09. Nazir, F., Ma, J., & Seneviratne, A. (2009). Time critical content delivery using predictable patterns in mobile social networks (Vol. 4, pp. 1066–1073). Paper presented at the International Conference on Computational Science and Engineering, 2009, CSE’09.
Zurück zum Zitat Prakash, S. (2011). Risk management: Cloud computing considerations. Canadian Management Accounting. Prakash, S. (2011). Risk management: Cloud computing considerations. Canadian Management Accounting.
Zurück zum Zitat Proverbs, D.G., Holt, G.D. and Cheok, H.Y., 2000. Construction industry problems: the views of UK construction Directors, 16th Annual ARCOM Conference 2000, pp. 73–81. Proverbs, D.G., Holt, G.D. and Cheok, H.Y., 2000. Construction industry problems: the views of UK construction Directors, 16th Annual ARCOM Conference 2000, pp. 73–81.
Zurück zum Zitat Rengaraju, P., Lung, C., Yu, F. R., & Srinivasan, A. (2012). On QoE monitoring and E2E service assurance in 4G wireless networks. IEEE Wireless Communications, 19(4), 89–96.CrossRef Rengaraju, P., Lung, C., Yu, F. R., & Srinivasan, A. (2012). On QoE monitoring and E2E service assurance in 4G wireless networks. IEEE Wireless Communications, 19(4), 89–96.CrossRef
Zurück zum Zitat Rountree, D. and Castrillo, I., 2013. The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes. Rountree, D. and Castrillo, I., 2013. The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes.
Zurück zum Zitat Shehu, Z., & Akintoye, A. (2010). Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis. International Journal of Project Management, 28(1), 26–39.CrossRef Shehu, Z., & Akintoye, A. (2010). Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis. International Journal of Project Management, 28(1), 26–39.CrossRef
Zurück zum Zitat Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116.CrossRef Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116.CrossRef
Zurück zum Zitat Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278.CrossRef Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278.CrossRef
Zurück zum Zitat Teuteberg, F., & Wittstruck, D. (2010). A systematic review of sustainable supply chain management. Multikonferenz Wirtschaftsinformatik, 2010, 203. Teuteberg, F., & Wittstruck, D. (2010). A systematic review of sustainable supply chain management. Multikonferenz Wirtschaftsinformatik, 2010, 203.
Zurück zum Zitat Vaquero, L.M., Rodero-Merino, L., Caceres, J. and Lindner, M., 2009. A Break in the Clouds: Towards a Cloud Definition. New York: Assoc Computing Machinery. Vaquero, L.M., Rodero-Merino, L., Caceres, J. and Lindner, M., 2009. A Break in the Clouds: Towards a Cloud Definition. New York: Assoc Computing Machinery.
Zurück zum Zitat Vouk, M.A., 2008. Cloud computing - Issues, research and implementations, 2008, IEEE, pp. 31–40. Vouk, M.A., 2008. Cloud computing - Issues, research and implementations, 2008, IEEE, pp. 31–40.
Zurück zum Zitat Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.CrossRef Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.CrossRef
Zurück zum Zitat Zhang, J., & Figueiredo, R. J. (2006). Application classification through monitoring and learning of resource consumption patterns (10 pp). Paper presented at the 20th International Parallel and Distributed Processing Symposium, 2006, IPDPS 2006. Zhang, J., & Figueiredo, R. J. (2006). Application classification through monitoring and learning of resource consumption patterns (10 pp). Paper presented at the 20th International Parallel and Distributed Processing Symposium, 2006, IPDPS 2006.
Metadaten
Titel
Mobile Computing in the Construction Industry: Main Challenges and Solutions
verfasst von
M. Silverio
S. Renukappa
S. Suresh
A. Donastorg
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-43434-6_8