115 research outputs found

    A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission

    Get PDF
    To slow down the spread of COVID-19, governments around the world are trying to identify infected people and to contain the virus by enforcing isolation and quarantine. However, it is difficult to trace people who came into contact with an infected person, which causes widespread community transmission and mass infection. To address this problem, we develop an e-government Privacy Preserving Mobile and Fog computing framework entitled PPMF that can trace infected and suspected cases nationwide. We use personal mobile devices with contact tracing app and two types of stationary fog nodes, named Automatic Risk Checkers (ARC) and Suspected User Data Uploader Node (SUDUN), to trace community transmission alongside maintaining user data privacy. Each user's mobile device receives a Unique Encrypted Reference Code (UERC) when registering on the central application. The mobile device and the central application both generate Rotational Unique Encrypted Reference Code (RUERC), which broadcasted using the Bluetooth Low Energy (BLE) technology. The ARCs are placed at the entry points of buildings, which can immediately detect if there are positive or suspected cases nearby. If any confirmed case is found, the ARCs broadcast pre-cautionary messages to nearby people without revealing the identity of the infected person. The SUDUNs are placed at the health centers that report test results to the central cloud application. The reported data is later used to map between infected and suspected cases. Therefore, using our proposed PPMF framework, governments can let organizations continue their economic activities without complete lockdown.Comment: 12 pages, 9 figures, 1 table, 1 algorith

    A study on anatomy of smartphone,”

    Get PDF
    Abstract: The latest smartphones are attributed with the quality graphics, portable size and user applications support and multimode connectivity features. Smartphone incorporatesthe capabilities of both computing and communication devices. The latest distributed computing models are focused on employing smartphone as a significant stakeholder for enabling complicated and ubiquitous applications in the changing mobile computing world. Therefore, it is necessary to understand the components of smartphone and its working behavior for operation in the cellular and data networks. In this paper we study the anatomy of the smartphone by discussing its major components such as application processor and baseband processor. We describe different subcategories of smartphone components and highlight the behavior and significance of each component for dual mode functionalities of smartphone. The paper provides tutorial for understanding the architecture of the smartphone and exploring the functionalities of the dual processors of smartphone which are used for accessing different types of wireless networks. It helps in developing optimal procedures for deploying the components of the smartphone while accessing cellular and data network

    Network-coding-based Cooperative V2V Communication in Vehicular Cloud Networks

    Get PDF
    Chinacom 2018 - 13th EAI International Conference on Communications and Networking in China, 23-25 October 2018, Chengdu, ChinaThis is the author accepted manuscript. the final version is available from Springer Verlag via the DOI in this recordWe investigate the potential of applying cooperative relaying and network coding techniques to support vehicle-to-vehicle (V2V) communication in vehicular cloud networks (VCN). A reuse-mode MIMO content distribution system with multiple sources, multiple relays, and multiple destinations under Nakagami-m fading is considered. We apply a class of finite field network codes in the relays to achieve high spatial diversity in an efficient manner and derive the system communication error probability that the destinations fail to recover the desired source messages. The results show that our method can improve the performance over conventional data transmission solutions

    Social Internet of Things and New Generation Computing -- A Survey

    Full text link
    Social Internet of Things (SIoT) tries to overcome the challenges of Internet of Things (IoT) such as scalability, trust and discovery of resources, by inspiration from social computing. This survey aims to investigate the research done on SIoT from two perspectives including application domain and the integration to the new computing models. For this, a two-dimensional framework is proposed and the projects are investigated, accordingly. The first dimension considers and classifies available research from the application domain perspective and the second dimension performs the same from the integration to new computing models standpoint. The aim is to technically describe SIoT, to classify related research, to foster the dissemination of state-of-the-art, and to discuss open research directions in this field.Comment: IoT, Social computing, Surve

    A Review on VANET Security: Future Challenges and Open Issues

    No full text
    VANET is a well-established vehicular communication technology well-aligned with emerging vehicular technologies such as the Internet of Vehicles (IoV), Unmanned Aerial Vehicle (UAV), etc. Although VANET offers improved methods for addressing contemporary technology, it confronts significant challenges in supplying adequate security measures for intended access. VANET operates on multiple execution platforms as a service delivery mechanism, namely roadside units, vehicle-to-vehicle, vehicle-to-device, and vehicle-to-everything (V2X). Using these communication platforms, VANET must establish its security measures for future purposes and bolster protocol authentications. Without adequate security conformance, VANET data delivery and network-wide execution become insecure. Consequently, VANET requires correct security configurations and device engagements for improved protocol working environments and changes. In this work, we describe some recent security problems for the VANET mechanism so that developers and engineers will be aware of the specific security needs and can avoid errors or intruders when deploying VANETS across cities and urban roadsides. This study describes the primary security components and categorical difficulties for VANET through the following themes: classification of security attacks, standard or timely requested security protocol problems and solutions, and the best feasible security criteria for extended VANETs. We finish this paper by discussing many open topics and future VANET security developments or concerns

    Performance enhancement framework for cloudlet in mobile cloud computing / Md Whaiduzzaman

    Get PDF
    A tremendous increase in the use of mobile devices, such as smart phones and tablets, has been observed in recent years. Mobile device resources, such as CPU, memory and storage resources, have also experienced dramatic increases in capacity. Simultaneously, a rich variety of mobile applications that require extensive computational resources for mobile application execution have been developed. These new applications are complemented with cloud resources through the emerging Mobile Cloud Computing (MCC) paradigm. MCC augments mobile device capabilities by leveraging the resources of distant clouds, nearby cloudlets or mobile ad-hoc clouds in the vicinity. However, practical utilization of MCC is hindered by limitations associated with network connectivity. In the case of distant clouds, jitter, bandwidth, and propagation delay pose a challenge to realtime application response. On the other hand, cloudlets and mobile ad-hoc clouds are not sufficiently resource-rich to be able to support rich mobile applications. In this research, we consider a mobile user in the vicinity of a cloudlet that is situated at a distance of one hop through aWi-Fi communication medium. We show that a substantial number of users accessing the cloudlet for computation-intensive tasks results in delayed task completion and ultimately diminishes the benefits of using cloudlets. The problem is referred to as the cloudlet resource scarcity problem. To alleviate this problem, various researchers have offered solutions whereby mobile device resources are used for partial task completion. However, the proposed approaches do not consider the mobile device offered-serviceto- load ratio. In this research, we propose the Mobile-device-based Cloudlet Resource Enhancement (MobiCoRE) framework for mobile application augmentation to employ nearby mobile devices while ensuring the following: (i) mobile devices always obtain time benefits for their tasks when submitted to the cloudlet, and (ii) the cloudlet-induced mobile device load is a fraction of its own service requirements. We map MobiCoRE on iii the M/M/c/K queue and model the system using a birth-death Markov chain. We show that for cloudlets, the framework always obtains the maximum advantage for mobile devices in terms of job completion time when the cloudlet service time is set to ¯ c l , where ¯ c is the cloudlet utilization and l is the application arrival rate. Furthermore, the optimal service time is independent of the application’s service requirement. We implemented the MobiCoRE framework using the Openstack cloud. The evaluation shows that MobiCoRE accommodates up to 50% more users when operating at the optimal service time and provides 50% time benefits for mobile users. The empirical analysis and statistical validation demonstrate that our proposed framework, i.e., MobiCoRE, significantly and positively impacts the cloudlet performance by exploiting and orchestrating nearby mobile device resources

    A Methodological Framework on Development the Garment Payroll System (GPS) as SaaS

    No full text
    Management of Payroll is a challenging task for a production based Ready Made Garmentindustry to pay the employee's salary just in time with accuracy. In an existing Garment industry, calculate thousands of worker's monthly pay depending on each and every piece of production and with different grades of workers is really a tough job. Hence, it is essential to make the system automated. In cloud based garment payroll system, it keeps track of all workers' individual daily production, including style and size and after the end of each month generates worker's net salary by calculating the production amount, production bonus, attendance bonus, festival bonus, no work amount, night allowance by deducting advance if any then generate wages by a single click. This user-friendly proposed cloud Garment Payroll System (GPS) helps to generate thousands or more of a worker's salary just with a few clicks and 100% accuracy. Unlike traditional payroll system, which is installed on site, cloud-based payroll is hosted and managed by the vendor and pay as you go. The system then can be accessed from any locations from any web-enabled devices like desktop, laptop, Smartphone, tab, etc. using internet connectivity. This proposed system also increases productivity, increase efficiency, security and moreover reduce human errors.</p
    corecore