Mobile Cloud Computing Application Model and Security Constraint

  • 60,000+ Completed Assignments

  • 3000+ PhD Experts

  • 100+ Subjects

Question:

Discuss about the Essay for Mobile Cloud Computing Application Model and Security Constraint.

Answer:

Abstract

Mobile Cloud Computing (MCC) provides a vast platform where mobile users can explore their data anywhere anytime using Cloud services. Mobile Cloud Computing integrates the advantage of cloud computing, internet technology and mobile computing.

The major issue of using Mobile Cloud Computing is the security of data. Due to advancement in technology, the data security risks also increase tremendously. One of the major issues is to secure their private and regulated data. When the data goes from source to destination it gets encrypted and decrypted to maintain the one of the security layer. There is the need of security not only in the mobile device but also in cloud based storage system. Now-a-days Google provides a security to lock their data at cloud and smart phones gives various new techniques to lock their phones. Regulated data is the sensitive and confidential data that organizations are legally required to keep safe and secure.

There are many issues when accessing the cloud service by using mobile computing. There exist three basic cloud computing service models named SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). But in Mobile Cloud Computing only SaaS is implemented to use the services of mobile software. So again it become one of the major concern regarding the security of the data so overall there are few concerns regarding the Mobile Cloud Computing architecture and application model which needs to be address and evaluated.  

Research Problem

The main research problem that would be focused upon in this research is how to improve application of mobile cloud computing in businesses and how to meet the security related challenges. In the current environment despite of increasing usage of cloud computing and mobile computing system, there are many problems associated with the use of MCC like frequent disconnections, resource scarcity, mobility and security. Mobile computing environment faces other problems like signal disturbance, hand-off delay, low computing ability and limited power. So this system becomes less reliable and affecting the quality of service (Othman et al., 2014). On the other hand cloud, computing required an efficient resources scheduling mechanism and improved to third-party software and infrastructure for mobile devices. It will be research upon how the various obstacles in the implementation of the MCC can be overcome mainly focusing upon security. 

This research will help the reader to develop the understanding of security related problems occurring in MCC and implement solutions of these. The inappropriate security measures becomes one of the difficult challenges for users of mobile cloud computing. An effective security system is required to enable the reduction of security problems. It provides the users to use the MCC with more reliability and assurance. At the same time use of MCC will increase if this security related problems will be sorted out by web developers.

Literature Review

According to Rost et al., (2014), in modern scenario, technology is changing very rapidly, mobile cloud computing improving the performance by storing mobile app and all information on the cloud platform. In support of Hashem (2015), depicts that MCC can also improve the memory space and computing power that cause users want to store data on the cloud. Authors Dinh et al. (2013), stated that mobile cloud computing uses in mobile learning and mobile gaming. M- Learning helps learners to remotely access the resources. MCC solve the traditional M-Learning problems like limited resources and limited transmission rate. MCC also uses in mobile health care and Assertive technologies. M-Healthcare provides a facility of convenient access to medical resources and reduces the limitation of traditional medical treatment. So, there are several application of MCC however, there are number challenges in application and security.

According to Samad (2015), along with these advantages, MCC faces some problem like offloading, security, privacy and MCC only uses software as service (SaaS) model to use the cloud software. Computation offloading is not effective in saving energy at several occasions. Security and privacy of mobile users in mobile computing is also an issue in MCC because mobile devices suffer from various threat and vulnerability. At the same time Conti and Giordano (2014) depicts that mobile cloud computing provides private information of particular user like current location, so maintaining privacy is also a challenge in MCC.

To put the MCC in effective usage, Barbarossa (2014) mentions that a cloud computing service model consists of three basic models named SaaS, PaaSand IaaS. SaaS provides a facility to end user to virtually access application software from cloud platform and uses it on personal devices without installing it. PaaS provides a platform to cloud users to develop and run the application on cloud. IaaS Provides a virtualized computing resources to the end users over the internet.

Purpose of Research

Main objective of conducting this research is to enable the organizations in identification of challenges and issues faced by users at the time of using mobile cloud computing for different purposes. It will help the organization in solving user problem by adopting security related measures. The user can get an insight that how cloud computing will be helpful in exploration of different business opportunities. Security is considered as a major threat to MCC so this research will be helpful to organization in identification of different measures to solve the issue related to security (Sanaei et al., 2014). This research will be also helpful in identification of various benefits associated with the use of mobile cloud computing to users.

Research Rationale

This research is going to fulfill the needs in various contexts like personal, organizational and at tutorial level. This research is helpful for the organization dealing with MCC to identify the challenges and threats faced by customers at the time of using of mobile cloud computing platform to exchange or explore the data. This research also helpful in analyzing various benefits associated with it like integration of internet technology etc. This study will be significant to organization in finding out that how mobile cloud computing can become the most promising system which will be helpful in using of advancement of technology with security. This research will be helpful in understanding the implication of mobile cloud computing in cell phones (Rahimi et al., 2014).This research has holistic approach and strategic value to those organizations or individuals who are using mobile cloud computing because it defines concerns related to security, privacy and regulations.

This research offers a value proposition in respect of mobile cloud computing which is totally different from IT environment. This research study will be beneficial for individuals to the personal level to create a better understanding in enhancing their theoretical and practical knowledge regarding how to furnish security in exploration and transformation of data with the help of mobile cloud computing technology. Moreover, findings of this study will be helpful in contributing in the existing database by acquiring a detailed understanding about the consequences of installation of mobile cloud computing. At student level, this research study will helpful in contributing to enhance my understandings about the consequences of mobile cloud computing which are going to assist me in my future career (Fernando et al., 2013). The Literature Review section is the heart of research which provides details about advantages and challenges which are faced at the time of using mobile cloud computing platform.

Justification of usefulness and benefits of Project to different stakeholders

This research study is quite significant in today’s century of changing technology and innovations at a faster pace in which Mobile cloud computing has become a recognized stage to store the data and to explore the data for various purposes (Wang, 2013). The outcome of this research are very much significant to organizations and other industries to determine the factor which are faced by users at the time of using cloud computing platform in mobile phones. It would help the firms to make essential changes in mobile cloud computing so that security related problems can be easily sorted out (Shiraz, 2014). The research outcome will help the firms to come up with innovations in mobile cloud computing so that there can be increased use of this particular platform.

Apart from this, this research study is quite wide in terms of scope due to significance of its outcome in informing organization about the need of security in mobile cloud computing system, which is critical to organization (Abolfazli et al., 2014). The outcome of this research will help the organization to understand the users behavior towards mobile cloud computing.

Apart from this, this research would also be significant in developing an understanding in the readers mind about the various threats related to use of mobile cloud computing platform. It will also provides a critical understanding to readers about the benefits of mobile cloud computing and various opportunities associated with mobile cloud computing platform. At the same time, this research will provide a detailed understanding of various challenges related to MCC (Othman et al., 2014). It will be supportive to organizations in making required changes in mobile cloud computing technology.

References:

Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A. and Buyya, R. (2014) Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges.IEEE Communications Surveys & Tutorials, 16(1), pp.337-368.

Barbarossa, S., Sardellitti, S. and Di Lorenzo, P. (2014) Communicating while computing: Distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal Processing Magazine, 31(6), pp.45-55.

Conti, M. and Giordano, S. (2014) Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine,52(1), pp.85-96.

Dinh, H.T., Lee, C., Niyato, D. and Wang, P. (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.

Fernando, N., Loke, S.W. and Rahayu, W. (2013) Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), pp.84-106.

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U. (2015) The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.

Othman, M., Madani, S.A. and Khan, S.U. (2014) A survey of mobile cloud computing application models.IEEE Communications Surveys & Tutorials, 16(1), pp.393-413.

Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N. (2014) Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications, 19(2), pp.133-143.

Rost, P., Bernardos, C.J., De Domenico, A., Di Girolamo, M., Lalam, M., Maeder, A., Sabella, D. and Wübben, D. (2014) Cloud technologies for flexible 5G radio access networks. IEEE Communications Magazine, 52(5), pp.68-76.

Samad, J., Loke, S.W. and Reed, K. (2015)Mobile Cloud Computing. Cloud Services, Networking, and Management, pp.153-190.

Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014) Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), pp.369-392.

Shiraz, M., Ahmed, E., Gani, A. and Han, Q. (2014) Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing. The Journal of Supercomputing, 67(1), pp.84-103.

Wang, S. and Dey, S. (2013) Adaptive mobile cloud computing to enable rich mobile multimedia applications.IEEE Transactions on Multimedia, 15(4), pp.870-883.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company in UK which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades