93 research outputs found

    A REVIEW AND RESEARCH TOWARDS SECURITY IN MOBILE CLOUD COMPUTING

    Get PDF
    Mobile cloud computing is a combination of cloud computing and mobiles. Mobile cloud computing represents an infrastructure where data processing and storage of the data happens away from the mobile deviceĀ Ā  because of theĀ  limited resources which is provided by the mobile infrastructure. Total of 42.8 million (1.1% of total mobile users) people are Mobile Cloud Computing users in 2008 which will be about 998 million (19% of total mobile users) by 2015. This is because of the reason of security and cost. Most of the ITĀ  Executives andĀ  CEOs are not willing to adopt the MCC infrastructure because of the security concern. Inspite of many efforts and research which has been made there are many loopholesĀ  and challenges which are still present. In this paper we present the security aspects and possible solutions for the same

    An overview of VANET vehicular networks

    Full text link
    Today, with the development of intercity and metropolitan roadways and with various cars moving in various directions, there is a greater need than ever for a network to coordinate commutes. Nowadays, people spend a lot of time in their vehicles. Smart automobiles have developed to make that time safer, more effective, more fun, pollution-free, and affordable. However, maintaining the optimum use of resources and addressing rising needs continues to be a challenge given the popularity of vehicle users and the growing diversity of requests for various services. As a result, VANET will require modernized working practices in the future. Modern intelligent transportation management and driver assistance systems are created using cutting-edge communication technology. Vehicular Ad-hoc networks promise to increase transportation effectiveness, accident prevention, and pedestrian comfort by allowing automobiles and road infrastructure to communicate entertainment and traffic information. By constructing thorough frameworks, workflow patterns, and update procedures, including block-chain, artificial intelligence, and SDN (Software Defined Networking), this paper addresses VANET-related technologies, future advances, and related challenges. An overview of the VANET upgrade solution is given in this document in order to handle potential future problems

    Intelligence at the Extreme Edge: A Survey on Reformable TinyML

    Full text link
    The rapid miniaturization of Machine Learning (ML) for low powered processing has opened gateways to provide cognition at the extreme edge (E.g., sensors and actuators). Dubbed Tiny Machine Learning (TinyML), this upsurging research field proposes to democratize the use of Machine Learning (ML) and Deep Learning (DL) on frugal Microcontroller Units (MCUs). MCUs are highly energy-efficient pervasive devices capable of operating with less than a few Milliwatts of power. Nevertheless, many solutions assume that TinyML can only run inference. Despite this, growing interest in TinyML has led to work that makes them reformable, i.e., work that permits TinyML to improve once deployed. In line with this, roadblocks in MCU based solutions in general, such as reduced physical access and long deployment periods of MCUs, deem reformable TinyML to play a significant part in more effective solutions. In this work, we present a survey on reformable TinyML solutions with the proposal of a novel taxonomy for ease of separation. Here, we also discuss the suitability of each hierarchical layer in the taxonomy for allowing reformability. In addition to these, we explore the workflow of TinyML and analyze the identified deployment schemes and the scarcely available benchmarking tools. Furthermore, we discuss how reformable TinyML can impact a few selected industrial areas and discuss the challenges and future directions

    Cloud Services Brokerage for Mobile Ubiquitous Computing

    Get PDF
    Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing. In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands. Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance

    Mobile Technology Deployment Strategies for Improving the Quality of Healthcare

    Get PDF
    Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer\u27s health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs

    Identifying Critical Factors To Adopt E-HRM Based Cloud Computing System For Healthcare Organizations

    Get PDF
    The presence of EHRM issues and challenges have critical influence on the success of cloud systems. The aim of the paper is to identify the critical factors leading to adopt E-HRM based cloud computing system for healthcare organizations.There are four dimensions forEHRM based cloud computing system that include electronic human resource management activities,the level awareness of EHRM and cloud computing, IT and cloud computing infrastructure, and management support system and quality for HRM. The critical EHRM issues and challenges need to be addressed and thereafter need to be managed by usingcontrol methods. As a future work, we will apply quantitative to control EHRM issuesbased cloud computing system. A successful EHRM based cloud computing will greatly improve the probability of systemsuccess in healthcare organizations

    Strategies for Integrating Technological Innovations in Small Businesses

    Get PDF
    The effective integration of technological innovation is vital to the success of small businesses and can catapult growth and profitability. Some business managers and supervisors, however, may not have a firm understanding of strategies for integrating technological innovations in businesses; this lack of knowledge may result in employee frustration and costly roadblocks to achieving business objectives. This case study was conducted to identify the strategies used by business managers and supervisors to integrate technological innovations in small businesses. Christensen\u27s theory of disruptive innovation and Rogers\u27 theory of diffusion of innovation served as the conceptual framework. Ten business managers and supervisors from Castries, St. Lucia, participated in semistructured interviews. Participants who were selected using purposive sampling worked in a small business in St. Lucia for atleast 5 years, were part of senior management, and used strategies for integrating technological innovations in a small business. Two of the themes that emerged from data analysis were integration challenges relating to technological innovation complexity, and technology cost regarding hardware, upgrades and software procurement. Findings from this study may contribute to positive social change by providing business managers and supervisors insight about strategies and innovative solutions they can use to develop better business practices, increase tax revenues, and employment opportunities, improve profitability, and boost the economy

    Mobile cloud healthcare systems using the concept of pointā€“ofā€“care

    Get PDF
    Recent years have witnessed a rapid growth in delivering/accessing healthcare services on mobile devices. An example of a health practice/application that is benefiting from the mobile evolution is mā€“health, which is aimed at providing health services to mobile devices on the move. However, mobile devices have restricted computational and storage capacity, and run on batteries that have limited power. These limitations render mā€“health unable to run the demanding tasks that may be required for accessing/providing health services. The mobile cloud has recently been proposed as a solution for dealing with some of the limitations of mobile devices, such as low storage and computing capacity. However, introducing this solution into the mā€“health field is not straightforward, as the integration of this technology has specific limitations, such as disconnection issues and concerns over privacy and security. This thesis presents research work investigating the ability to introduce mobile cloud computing technology into the health field (e.g., mā€“health) to increase the chances of survival in cases of emergencies. This work focuses on providing help to people in emergencies by allowing them to seek/access help via mobile devices reliably and confidently, as well as the ability to build a communication platform between people who require help and professionals who are trusted and qualified to provide it. The concept of pointā€“ofā€“care has been used here, which means providing as much medical support to the public as possible where and when it is needed. This thesis proposes a mobile cloud middleware solution that enhances connectivity aspects by allowing users to create/join a mobile adā€“hoc network (MANET) to seek help in the case of emergencies. On the other side, the cloud can reach users who do not have a direct link to the cloud or an Internet connection. The most important advantage of combining a MANET and a mobile cloud is that management tasks such as IP allocation and split/merge operations are shifted to the cloud, which means resources are saved on the mobile side. In addition, two mobile cloud services were designed which have the aim of interacting with users to facilitate help to be provided swiftly in the case of emergencies. The system was deployed and tested on Amazon EC2 cloud and Androidā€“based mobile devices. Experimental results and the reference architecture show that the proposed middleware is feasible and meets preā€“defined requirements, such as enhancing the robustness and reliability of the system

    Dependability of the NFV Orchestrator: State of the Art and Research Challenges

    Get PDF
    Ā© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The introduction of network function virtualisation (NFV) represents a signiļ¬cant change in networking technology, which may create new opportunities in terms of cost efļ¬ciency, operations, and service provisioning. Although not explicitly stated as an objective, the dependability of the services provided using this technology should be at least as good as conventional solutions. Logical centralisation, off-the-shelf computing platforms, and increased system complexity represent new dependability challenges relative to the state of the art. The core function of the network, with respect to failure and service management, is orchestration. The failure and misoperation of the NFV orchestrator (NFVO) will have huge network-wide consequences. At the same time, NFVO is vulnerable to overload and design faults. Thus, the objective of this paper is to give a tutorial on the dependability challenges of the NFVO, and to give insight into the required future research. This paper provides necessary background information, reviews the available literature, outlines the proposed solutions, and identiļ¬es some design and research problems that must be addressed.acceptedVersio
    • ā€¦
    corecore