93 research outputs found
A REVIEW AND RESEARCH TOWARDS SECURITY IN MOBILE CLOUD COMPUTING
Mobile cloud computing is a combination of cloud computing and mobiles. Mobile cloud computing represents an infrastructure where data processing and storage of the data happens away from the mobile deviceĀ Ā because of theĀ limited resources which is provided by the mobile infrastructure. Total of 42.8 million (1.1% of total mobile users) people are Mobile Cloud Computing users in 2008 which will be about 998 million (19% of total mobile users) by 2015. This is because of the reason of security and cost. Most of the ITĀ Executives andĀ CEOs are not willing to adopt the MCC infrastructure because of the security concern. Inspite of many efforts and research which has been made there are many loopholesĀ and challenges which are still present. In this paper we present the security aspects and possible solutions for the same
An overview of VANET vehicular networks
Today, with the development of intercity and metropolitan roadways and with
various cars moving in various directions, there is a greater need than ever
for a network to coordinate commutes. Nowadays, people spend a lot of time in
their vehicles. Smart automobiles have developed to make that time safer, more
effective, more fun, pollution-free, and affordable. However, maintaining the
optimum use of resources and addressing rising needs continues to be a
challenge given the popularity of vehicle users and the growing diversity of
requests for various services. As a result, VANET will require modernized
working practices in the future. Modern intelligent transportation management
and driver assistance systems are created using cutting-edge communication
technology. Vehicular Ad-hoc networks promise to increase transportation
effectiveness, accident prevention, and pedestrian comfort by allowing
automobiles and road infrastructure to communicate entertainment and traffic
information. By constructing thorough frameworks, workflow patterns, and update
procedures, including block-chain, artificial intelligence, and SDN (Software
Defined Networking), this paper addresses VANET-related technologies, future
advances, and related challenges. An overview of the VANET upgrade solution is
given in this document in order to handle potential future problems
Intelligence at the Extreme Edge: A Survey on Reformable TinyML
The rapid miniaturization of Machine Learning (ML) for low powered processing
has opened gateways to provide cognition at the extreme edge (E.g., sensors and
actuators). Dubbed Tiny Machine Learning (TinyML), this upsurging research
field proposes to democratize the use of Machine Learning (ML) and Deep
Learning (DL) on frugal Microcontroller Units (MCUs). MCUs are highly
energy-efficient pervasive devices capable of operating with less than a few
Milliwatts of power. Nevertheless, many solutions assume that TinyML can only
run inference. Despite this, growing interest in TinyML has led to work that
makes them reformable, i.e., work that permits TinyML to improve once deployed.
In line with this, roadblocks in MCU based solutions in general, such as
reduced physical access and long deployment periods of MCUs, deem reformable
TinyML to play a significant part in more effective solutions. In this work, we
present a survey on reformable TinyML solutions with the proposal of a novel
taxonomy for ease of separation. Here, we also discuss the suitability of each
hierarchical layer in the taxonomy for allowing reformability. In addition to
these, we explore the workflow of TinyML and analyze the identified deployment
schemes and the scarcely available benchmarking tools. Furthermore, we discuss
how reformable TinyML can impact a few selected industrial areas and discuss
the challenges and future directions
Cloud Services Brokerage for Mobile Ubiquitous Computing
Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing.
In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands.
Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile
Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance
Mobile Technology Deployment Strategies for Improving the Quality of Healthcare
Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer\u27s health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs
Identifying Critical Factors To Adopt E-HRM Based Cloud Computing System For Healthcare Organizations
The presence of EHRM issues and challenges have critical influence on the success of cloud systems. The aim of the paper is to identify the critical factors leading to adopt E-HRM based cloud computing system for healthcare organizations.There are four dimensions forEHRM based cloud computing system that include electronic human resource management activities,the level awareness of EHRM and cloud computing, IT and cloud computing infrastructure, and management support system and quality for HRM. The critical EHRM issues and challenges need to be addressed and thereafter need to be managed by usingcontrol methods. As a future work, we will apply quantitative to control EHRM issuesbased cloud computing system. A successful EHRM based cloud computing will greatly improve the probability of systemsuccess in healthcare organizations
Strategies for Integrating Technological Innovations in Small Businesses
The effective integration of technological innovation is vital to the success of small businesses and can catapult growth and profitability. Some business managers and supervisors, however, may not have a firm understanding of strategies for integrating technological innovations in businesses; this lack of knowledge may result in employee frustration and costly roadblocks to achieving business objectives. This case study was conducted to identify the strategies used by business managers and supervisors to integrate technological innovations in small businesses. Christensen\u27s theory of disruptive innovation and Rogers\u27 theory of diffusion of innovation served as the conceptual framework. Ten business managers and supervisors from Castries, St. Lucia, participated in semistructured interviews. Participants who were selected using purposive sampling worked in a small business in St. Lucia for atleast 5 years, were part of senior management, and used strategies for integrating technological innovations in a small business. Two of the themes that emerged from data analysis were integration challenges relating to technological innovation complexity, and technology cost regarding hardware, upgrades and software procurement. Findings from this study may contribute to positive social change by providing business managers and supervisors insight about strategies and innovative solutions they can use to develop better business practices, increase tax revenues, and employment opportunities, improve profitability, and boost the economy
Mobile cloud healthcare systems using the concept of pointāofācare
Recent years have witnessed a rapid growth in delivering/accessing healthcare services on mobile devices. An example of a health practice/application that is benefiting from the mobile evolution is māhealth, which is aimed at providing health services to mobile devices on the move. However, mobile devices have restricted computational and storage capacity, and run on batteries that have limited power. These limitations render māhealth unable to run the demanding tasks that may be required for accessing/providing health services. The mobile cloud has recently been proposed as a solution for dealing with some of the limitations of mobile devices, such as low storage and computing capacity. However, introducing this solution into the māhealth field is not straightforward, as the integration of this technology has specific limitations, such as disconnection issues and concerns over privacy and security. This thesis presents research work investigating the ability to introduce mobile cloud computing technology into the health field (e.g., māhealth) to increase the chances of survival in cases of emergencies. This work focuses on providing help to people in emergencies by allowing them to seek/access help via mobile devices reliably and confidently, as well as the ability to build a communication platform between people who require help and professionals who are trusted and qualified to provide it. The concept of pointāofācare has been used here, which means providing as much medical support to the public as possible where and when it is needed. This thesis proposes a mobile cloud middleware solution that enhances connectivity aspects by allowing users to create/join a mobile adāhoc network (MANET) to seek help in the case of emergencies. On the other side, the cloud can reach users who do not have a direct link to the cloud or an Internet connection. The most important advantage of combining a MANET and a mobile cloud is that management tasks such as IP allocation and split/merge operations are shifted to the cloud, which means resources are saved on the mobile side. In addition, two mobile cloud services were designed which have the aim of interacting with users to facilitate help to be provided swiftly in the case of emergencies. The system was deployed and tested on Amazon EC2 cloud and Androidābased mobile devices. Experimental results and the reference architecture show that the proposed middleware is feasible and meets preādefined requirements, such as enhancing the robustness and reliability of the system
Dependability of the NFV Orchestrator: State of the Art and Research Challenges
Ā© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The introduction of network function virtualisation (NFV) represents a signiļ¬cant change in networking technology, which may create new opportunities in terms of cost efļ¬ciency, operations, and service provisioning. Although not explicitly stated as an objective, the dependability of the services provided using this technology should be at least as good as conventional solutions. Logical centralisation, off-the-shelf computing platforms, and increased system complexity represent new dependability challenges relative to the state of the art. The core function of the network, with respect to failure and service management, is orchestration. The failure and misoperation of the NFV orchestrator (NFVO) will have huge network-wide consequences. At the same time, NFVO is vulnerable to overload and design faults. Thus, the objective of this paper is to give a tutorial on the dependability challenges of the NFVO, and to give insight into the required future research. This paper provides necessary background information, reviews the available literature, outlines the proposed solutions, and identiļ¬es some design and research problems that must be addressed.acceptedVersio
- ā¦