4 research outputs found

    Mobile Computing: Trend, Challenges, Trend Topics, Success Factors and Implementation Fields

    Get PDF
    This paper aims to explore the development of mobile computing in knowing trends, challenges, trending topics, success factors, and what fields apply to mobile computing. This study uses a systematic literature review (SLR) methodology consisting of several stages: search strategy, literature criteria, data extraction and monitoring, and data synthesis. The analysis results describing the research findings show that from the reviewed articles, it can be concluded that Mobile Computing is implemented to support and play an important role in community and organizational activities in all disciplines. Mobile computing has a very important role in the ease of use of device applications. The research results can also describe the evolution of mobile computing so that it can be studied in more depth

    Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing

    No full text
    International audienceCrowdsourcing mobile applications are of increasing importance due to their suitability in providing personalized and better matching replies. The competitive edge of crowdsourcing is twofold; the requestors can achieve better and/or cheaper responses while the crowd contributors can achieve extra money by utilizing their free time or resources. Crowdsourcing location-based services inherit the querying mechanism from their legacy predecessors and this is where the threat lies. In this paper, we are going to show that none of the advanced privacy notions found in the literature except for í µí°¾-anonymity is suitable for crowdsourced location-based services. In addition, we are going to prove mathematically, using an attack we developed, that í µí°¾-anonymity does not satisfy the privacy level needed by such services. To respond to this emerging threat, we will propose a new concept, totally different from existing resource consuming privacy notions, to handle user privacy using Mobile Cloud Computing
    corecore