SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895
AN OVERVIEW ON MOBILE CLOUD COMPUTING
Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4
1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Given the advances in mobile telephones, users
start to consider a mobile phone a personal information
processing tool. So users wanted various operations be
performed on the top of mobile devices. Researchers havelong
acknowledged that mobile hardware is necessarily resource-
poor on static client and server hardware. Mobile cloud
computing (MCC) Which combines mobile computing and
cloud computing is a good result for this problem and has
become one of the industry buzz words and a major discussion
topic since 2009.This paper presents a review of the
background, security and open issues in mobile cloud
computing.
Key Words: mobile cloud computing, partitioning,
augmentation.
1. INTRODUCTION
The increasing use of mobile phones is clear from the study
from Juniper Research, which states that the consumer and
enterprise market for cloud-based mobile
applications expected to increase to $9.5 billion by 2014. In
recent years, applications targeted at mobile devices have
started becoming abundant with applications in various
categories such as amusement, social networking, travel,
health, games, business and news. The popularity in the
mobile computing are clear by browsing throughmobileapp
download centers such as Apple's iTunes or Nokia's Ovi
suite. The ground for the mobile cloud computing is that
mobile computing is able to offer a tool to the user whenand
where it is a needed irrespective of user movement, hence
supporting location independence. Indeed, 'mobility' is one
of the important features of a permeating computing
environment where the user is able to continue his/her
work flawless careless of his/her cause. These place the
problem of executing many useful programs that could aid
the user and create a pervasive environment. According to
Tim O'Reilly 'the future of mobility belongs to services that
respond in real-time to information that are supplied either
by nonhuman sensors or by their users. Real time
application demands intensive computing resources to one
character of mobile applications that demand high levels of
reactivity. Location-based social networking process in
mobile applications makesuse of the phone'svarioussensor
data. Nevertheless, extensive use of sensors, such as
obtaining a GPS reading, isexpensive in terms of energy and
this limits the mobile phone in providing the user a better
service through its embedded sensors. Furthermore,
consider applications that call for extensive processing -
image processing for video games, speech synthesis, natural
language processing, augmented reality, wearable
computing-all these demand high computational capacities
thusrestricting the developersin implementingapplications
for mobile telephone sets. problems will be solved in the
future by considering the trends in mobile phone
architecture and battery. This is, in fact, not merely a
temporary technological deficiency, but intrinsictomobility,
and a barrier that needs to overcome to actualized the full
potential of mobile computing. [2].
Fig:1 Mobile cloud computing architecture
2. MOBILE CLOUD COMPUTING BACKGROUND
Today, both hardware and software of mobile devices get
more capital improvementsthan before, somesmartphones
such as I Phones, Android serials, window mobile phones
and blackberry, are no longer just traditional mobile phones
with the conversation, SMS, Email and website browser, but
are daily necessities to the user. Still, at any given cost and
level of technology, considerations such as weight, size,
battery life, ergonomics and heat dissipation exact a severe
penalty in computational resourcessuch as processorspeed,
storage size, and disk capacity. Thus, three approaches are
aimed for mobile cloud applications:
1. Extending out the access to cloud services to mobile
devices. In this approach users use mobile devices often
through web browsers, to use software/applications as
services extended by cloud. The mobile cloud is most often
viewed as a Software-as-a-service (SaaS) Cloud and all the
computation and data treatment are usually performed in
the swarm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896
2. Enabling mobile devices to act collaboratively as cloud
resource providers. This approach makesuseoftheresource
at personal mobile devices to give a virtual mobile cloud,
which is useful in an ad hoc networking environment
without function of internet cloud.
3. Portable devices using cloud resources are augmented by
the execution of mobile applications. This attack uses the
cloud storage and processing for applications working on
mobile devices. The mobile cloud is thought as an
Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service
(PaaS) cloud. In this partial offloading of computation and
data warehousing is done to clod from the mobile devices
[1].
Fig:2 Cloud Computing Framework
3. ARCHITECTURE
With mobile cloud computing, mobile network and cloud
computing joined, thereby providing an ideal service for
mobile customers. Cloud computing exists when tasks and
data retained on each device. Applications run on a remote
server and then shipped to the client. Here the mobile
devices connect to the mobile networks through the base
stations; they will set up and manipulatetheconnections(air
interface) And functional interfaces between the mobile
networks and fluid devices. Mobile users send service
requests to the cloud through a WWW browser or desktop
application. The information is transmitted to the central
processors that tied to the serversprovidingmobilenetwork
services. Here, services like AAA (Authentication,
Authorization and Accounting) can store subscriber data in
databases and can offer the users based on Home Agent
(HA). The request of the subscriber is then saved to the
internet. Cloud controllerspresent in the cloud, providesthe
request to the mobile users with the corresponding cloud
services. These services originated based on the concepts of
utility computing, virtualization and service-oriented
architecture. The major use of a cloud computing system is
storing data in the cloud and using technology on the client
to use that data. Various business models rapidly evolved to
harnessthis technology by providing software applications,
programming platforms, data-storage, computing
infrastructure and hardware as services. [3]
Fig:3 Mobile Cloud Computing Architecture
4. SECURITY ISSUES
Many sources have presented classifications of security
issues in communication networks. There are five central
goals of security of information system.
 Confidentiality: preventingunauthorizedusersfrom
gaining admission to critical information of any
particular user.
 Integrity: Ensuresunauthorizedchange,destruction
or creation of information cannot take space.
 Availability: Ensuring authorized users getting the
access they need.
 Legitimate: Ensuring that only authorized users
receive access to services.
 Accountability: Ensuring that the users are held
responsible for their security related activities by
arranging the user and his/her body processes
linked if and when necessary. The way these goals
achieved depends on the security policy adoptedby
the service providers.[4]
5. SECURITY COUNTERMEASURES
Secure mobile computing is critical in evolution any
application of wireless networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897
5.1 Security Requirements
Similar to traditional networks, the goalsof securing mobile
computing can delimited by the following attributes:
availability, confidentiality, integrity, authenticity and non-
repudiation.
 Availability: ensures that the intended network
services are available when the intended
parties required.
 Confidentiality: ensuresthat the intended receivers
can use the data and is never revealed to
unauthorized entities.
 Authenticity: allowsa user to find out identityofthe
entity it is communicating with. Without
certification, an adversary can masquerade a
legitimate user, thusgaining unauthorizedaccessto
resources and sensitive information andinterfering
with operation of users.
 Integrity: guarantees that data is never corrupted
during transmission. But the authorized partiescan
change it.
 Non-repudiation: ensures that an entity can prove
the transmission or reception of information from
another entity, i.e., a sender/receiver cannot falsely
deny having received or sent certain data. [4]
6. OPEN ISSUES IN MOBILE CLOUD COMPUTING
There are some issues occurred while implementing the
cloud computing for mobile. These topics can related to
networking, related to limited resources, related to security
of mobile users and clouds. Some subjects explained as
follows:
 LIMITED RESOURCES: having limited resources in
mobile devices makes use of cloud computing in
mobile devices difficult. Basic limitations related to
limited computing power, limitedresources,limited
battery, and low of quality display.
 NETWORK RELATED ISSUES: All processinginMCC
performed along the network. Thus there are some
issues related to the network like bandwidth,
latency, availability and heterogeneity.
 SECURITY: Mobile devices also have to face a
number of troubles related to security and privacy.
To master this problem threat detection services is
now performed at the clouds, but this also has to
face many challenges. There are so many security
threats like, hacking, viruses, Trojan horses in
mobile devices also. The role of global positioning
system (GPS) in mobile devices gives birth to the
privacy issues.
 LOW BANDWIDTH: Bandwidth is one of the big
events at MCC since the radio resource for wireless
networks is much scarce as compared with the
traditional wired networks.
 AVAILABILITY: In MCC service availabilitybecomes
more important issue than that in the cloud
computing with wired networks. Mobile phone
users may not able to link up to the cloud to get
service due to network failures, traffic congestion
and the out-of-signal. [5]
7. CONCLUSION
Mobile Cloud Computing is one of the technology trends in
the fourth coming processas it unitesthe advantagesofboth
cloud computing and mobile computing, and hence
providing optimal services. MCC offers more possibilitiesfor
access services in a convenient way. It is anticipated that
after some more years the number of mobile users will be
using cloud computing on their mobile devices. This report
has provided an overview of mobile cloud computing in
which itsdefinitions, architecture, existingworkapplication,
advantages and challenges have presented. [5]
REFERENCES
[1] Nitesh Kaushik, Gaurav, Jitender Kumar ,”
A Literature Survey on Mobile Cloud Computing: Open
Issues and Future Directions” International Journal Of
Engineering And Computer ScienceISSN:2319-7242Volume
3 Issue 5 may, 2014 Page No. 6165-6172
[2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile
Cloud Computing” Volume 4, No. 10, September-October
2013, ISSN No. 0976-5697 , International Journal of
Advanced Research in Computer Science
[3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile
Cloud Computing Architecture, ApplicationsandChallenges”
International Journal of Scientific Research Engineering &
Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6,
September 2014
[4] T.Balasubramanian” MobileComputing–AnIntroduction
With Issues In Mobile Security” International Journal of
Review and Research in Applied Sciences and Engineering,
Vol.7 No.1 2015, ISSN: 2231-0061
[5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile
Cloud Computing for Smart Phones” International Journalof
Science, Engineering and Technology Research (IJSETR),
Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798

More Related Content

PDF
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
PDF
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
PDF
Addressing Security Issues and Challenges in Mobile Cloud Computing
PDF
40120130405016
PDF
Smart Computing Mobile Cloud
PDF
20120130406025
PDF
IRJET - Cloud Computing and IoT Convergence
PDF
Iot vijaya priya r cat1
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
Addressing Security Issues and Challenges in Mobile Cloud Computing
40120130405016
Smart Computing Mobile Cloud
20120130406025
IRJET - Cloud Computing and IoT Convergence
Iot vijaya priya r cat1

What's hot (20)

PPTX
Cloud computing in indian perspective
PPTX
Mobile Cloud Computing Challenges and Security
PPTX
Mobile Cloud Computing
PDF
Security aspects-of-mobile-cloud-computing
PDF
Lightweight IoT middleware for rapid application development
PPT
Mobile cloud computing; Future of Cloud Computing
PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
PPTX
PPTX
Mobile Cloud Computing 2012
PPTX
Mobile-Cloud Computing
PDF
End-to-End Security in Mobile-Cloud Computing
PDF
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
PDF
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
PDF
Cloud Computing: Overview and its Deployment Model
PDF
Design and implementation of intelligent community system based on thin clien...
PDF
Securing io t_with_aws
PDF
Mobile cloud computing
PDF
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
PDF
Choosing the right network management solution: Increase network visibility t...
Cloud computing in indian perspective
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing
Security aspects-of-mobile-cloud-computing
Lightweight IoT middleware for rapid application development
Mobile cloud computing; Future of Cloud Computing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Mobile Cloud Computing 2012
Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
Cloud Computing: Overview and its Deployment Model
Design and implementation of intelligent community system based on thin clien...
Securing io t_with_aws
Mobile cloud computing
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Choosing the right network management solution: Increase network visibility t...
Ad

Similar to IRJET- An Overview on Mobile Cloud Computing (20)

PPTX
Details About Mobile Cloud Computing
PDF
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
PPTX
MOBILE CLOUD COMPUTING fundamental and basic
PDF
Week 7 lecture material
PDF
Mobile cloud computing as future for mobile applications
PDF
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
PDF
A Survey On Mobile Cloud Computing
PPTX
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
PDF
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
PDF
A survey of mobile cloud computing Architecture, applications, and approache...
PDF
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
DOCX
Security and privacy issues and solutions of Mobile Cloud Computing
PDF
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
PPTX
Mobile Cloud Comuting
PDF
Secured Communication Model for Mobile Cloud Computing
PPTX
Cloud_Computing.pptx
PPTX
Gearing up of resource poor mobile devices using cloud
PDF
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
PDF
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
PPTX
Mobile Cloud Computing1 informatique.pptx
Details About Mobile Cloud Computing
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
MOBILE CLOUD COMPUTING fundamental and basic
Week 7 lecture material
Mobile cloud computing as future for mobile applications
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
A Survey On Mobile Cloud Computing
MOBILE CLOUD TECHNOLOGY AS FUTURE FOR MOBILE APPLICATIONS - IMPLEMENTATION ME...
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A survey of mobile cloud computing Architecture, applications, and approache...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Security and privacy issues and solutions of Mobile Cloud Computing
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Mobile Cloud Comuting
Secured Communication Model for Mobile Cloud Computing
Cloud_Computing.pptx
Gearing up of resource poor mobile devices using cloud
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
Mobile Cloud Computing1 informatique.pptx
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
additive manufacturing of ss316l using mig welding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
573137875-Attendance-Management-System-original
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
additive manufacturing of ss316l using mig welding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
573137875-Attendance-Management-System-original
CYBER-CRIMES AND SECURITY A guide to understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Operating System & Kernel Study Guide-1 - converted.pdf
CH1 Production IntroductoryConcepts.pptx
Digital Logic Computer Design lecture notes
UNIT 4 Total Quality Management .pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

IRJET- An Overview on Mobile Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 895 AN OVERVIEW ON MOBILE CLOUD COMPUTING Dhana Priyadharsini.K1, Mohanapriya.K2, Rubasri.K3, Pavithra.S4 1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India 2,3,4 III BCA , Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Given the advances in mobile telephones, users start to consider a mobile phone a personal information processing tool. So users wanted various operations be performed on the top of mobile devices. Researchers havelong acknowledged that mobile hardware is necessarily resource- poor on static client and server hardware. Mobile cloud computing (MCC) Which combines mobile computing and cloud computing is a good result for this problem and has become one of the industry buzz words and a major discussion topic since 2009.This paper presents a review of the background, security and open issues in mobile cloud computing. Key Words: mobile cloud computing, partitioning, augmentation. 1. INTRODUCTION The increasing use of mobile phones is clear from the study from Juniper Research, which states that the consumer and enterprise market for cloud-based mobile applications expected to increase to $9.5 billion by 2014. In recent years, applications targeted at mobile devices have started becoming abundant with applications in various categories such as amusement, social networking, travel, health, games, business and news. The popularity in the mobile computing are clear by browsing throughmobileapp download centers such as Apple's iTunes or Nokia's Ovi suite. The ground for the mobile cloud computing is that mobile computing is able to offer a tool to the user whenand where it is a needed irrespective of user movement, hence supporting location independence. Indeed, 'mobility' is one of the important features of a permeating computing environment where the user is able to continue his/her work flawless careless of his/her cause. These place the problem of executing many useful programs that could aid the user and create a pervasive environment. According to Tim O'Reilly 'the future of mobility belongs to services that respond in real-time to information that are supplied either by nonhuman sensors or by their users. Real time application demands intensive computing resources to one character of mobile applications that demand high levels of reactivity. Location-based social networking process in mobile applications makesuse of the phone'svarioussensor data. Nevertheless, extensive use of sensors, such as obtaining a GPS reading, isexpensive in terms of energy and this limits the mobile phone in providing the user a better service through its embedded sensors. Furthermore, consider applications that call for extensive processing - image processing for video games, speech synthesis, natural language processing, augmented reality, wearable computing-all these demand high computational capacities thusrestricting the developersin implementingapplications for mobile telephone sets. problems will be solved in the future by considering the trends in mobile phone architecture and battery. This is, in fact, not merely a temporary technological deficiency, but intrinsictomobility, and a barrier that needs to overcome to actualized the full potential of mobile computing. [2]. Fig:1 Mobile cloud computing architecture 2. MOBILE CLOUD COMPUTING BACKGROUND Today, both hardware and software of mobile devices get more capital improvementsthan before, somesmartphones such as I Phones, Android serials, window mobile phones and blackberry, are no longer just traditional mobile phones with the conversation, SMS, Email and website browser, but are daily necessities to the user. Still, at any given cost and level of technology, considerations such as weight, size, battery life, ergonomics and heat dissipation exact a severe penalty in computational resourcessuch as processorspeed, storage size, and disk capacity. Thus, three approaches are aimed for mobile cloud applications: 1. Extending out the access to cloud services to mobile devices. In this approach users use mobile devices often through web browsers, to use software/applications as services extended by cloud. The mobile cloud is most often viewed as a Software-as-a-service (SaaS) Cloud and all the computation and data treatment are usually performed in the swarm.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 896 2. Enabling mobile devices to act collaboratively as cloud resource providers. This approach makesuseoftheresource at personal mobile devices to give a virtual mobile cloud, which is useful in an ad hoc networking environment without function of internet cloud. 3. Portable devices using cloud resources are augmented by the execution of mobile applications. This attack uses the cloud storage and processing for applications working on mobile devices. The mobile cloud is thought as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud. In this partial offloading of computation and data warehousing is done to clod from the mobile devices [1]. Fig:2 Cloud Computing Framework 3. ARCHITECTURE With mobile cloud computing, mobile network and cloud computing joined, thereby providing an ideal service for mobile customers. Cloud computing exists when tasks and data retained on each device. Applications run on a remote server and then shipped to the client. Here the mobile devices connect to the mobile networks through the base stations; they will set up and manipulatetheconnections(air interface) And functional interfaces between the mobile networks and fluid devices. Mobile users send service requests to the cloud through a WWW browser or desktop application. The information is transmitted to the central processors that tied to the serversprovidingmobilenetwork services. Here, services like AAA (Authentication, Authorization and Accounting) can store subscriber data in databases and can offer the users based on Home Agent (HA). The request of the subscriber is then saved to the internet. Cloud controllerspresent in the cloud, providesthe request to the mobile users with the corresponding cloud services. These services originated based on the concepts of utility computing, virtualization and service-oriented architecture. The major use of a cloud computing system is storing data in the cloud and using technology on the client to use that data. Various business models rapidly evolved to harnessthis technology by providing software applications, programming platforms, data-storage, computing infrastructure and hardware as services. [3] Fig:3 Mobile Cloud Computing Architecture 4. SECURITY ISSUES Many sources have presented classifications of security issues in communication networks. There are five central goals of security of information system.  Confidentiality: preventingunauthorizedusersfrom gaining admission to critical information of any particular user.  Integrity: Ensuresunauthorizedchange,destruction or creation of information cannot take space.  Availability: Ensuring authorized users getting the access they need.  Legitimate: Ensuring that only authorized users receive access to services.  Accountability: Ensuring that the users are held responsible for their security related activities by arranging the user and his/her body processes linked if and when necessary. The way these goals achieved depends on the security policy adoptedby the service providers.[4] 5. SECURITY COUNTERMEASURES Secure mobile computing is critical in evolution any application of wireless networks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897 5.1 Security Requirements Similar to traditional networks, the goalsof securing mobile computing can delimited by the following attributes: availability, confidentiality, integrity, authenticity and non- repudiation.  Availability: ensures that the intended network services are available when the intended parties required.  Confidentiality: ensuresthat the intended receivers can use the data and is never revealed to unauthorized entities.  Authenticity: allowsa user to find out identityofthe entity it is communicating with. Without certification, an adversary can masquerade a legitimate user, thusgaining unauthorizedaccessto resources and sensitive information andinterfering with operation of users.  Integrity: guarantees that data is never corrupted during transmission. But the authorized partiescan change it.  Non-repudiation: ensures that an entity can prove the transmission or reception of information from another entity, i.e., a sender/receiver cannot falsely deny having received or sent certain data. [4] 6. OPEN ISSUES IN MOBILE CLOUD COMPUTING There are some issues occurred while implementing the cloud computing for mobile. These topics can related to networking, related to limited resources, related to security of mobile users and clouds. Some subjects explained as follows:  LIMITED RESOURCES: having limited resources in mobile devices makes use of cloud computing in mobile devices difficult. Basic limitations related to limited computing power, limitedresources,limited battery, and low of quality display.  NETWORK RELATED ISSUES: All processinginMCC performed along the network. Thus there are some issues related to the network like bandwidth, latency, availability and heterogeneity.  SECURITY: Mobile devices also have to face a number of troubles related to security and privacy. To master this problem threat detection services is now performed at the clouds, but this also has to face many challenges. There are so many security threats like, hacking, viruses, Trojan horses in mobile devices also. The role of global positioning system (GPS) in mobile devices gives birth to the privacy issues.  LOW BANDWIDTH: Bandwidth is one of the big events at MCC since the radio resource for wireless networks is much scarce as compared with the traditional wired networks.  AVAILABILITY: In MCC service availabilitybecomes more important issue than that in the cloud computing with wired networks. Mobile phone users may not able to link up to the cloud to get service due to network failures, traffic congestion and the out-of-signal. [5] 7. CONCLUSION Mobile Cloud Computing is one of the technology trends in the fourth coming processas it unitesthe advantagesofboth cloud computing and mobile computing, and hence providing optimal services. MCC offers more possibilitiesfor access services in a convenient way. It is anticipated that after some more years the number of mobile users will be using cloud computing on their mobile devices. This report has provided an overview of mobile cloud computing in which itsdefinitions, architecture, existingworkapplication, advantages and challenges have presented. [5] REFERENCES [1] Nitesh Kaushik, Gaurav, Jitender Kumar ,” A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions” International Journal Of Engineering And Computer ScienceISSN:2319-7242Volume 3 Issue 5 may, 2014 Page No. 6165-6172 [2] Dr.I.Ravi Prakash Reddy, V.Usha” A Survey of Mobile Cloud Computing” Volume 4, No. 10, September-October 2013, ISSN No. 0976-5697 , International Journal of Advanced Research in Computer Science [3] Ms.Gayathri M R1, Prof K. Srinivas2” A Survey on Mobile Cloud Computing Architecture, ApplicationsandChallenges” International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3, Issue 6, September 2014 [4] T.Balasubramanian” MobileComputing–AnIntroduction With Issues In Mobile Security” International Journal of Review and Research in Applied Sciences and Engineering, Vol.7 No.1 2015, ISSN: 2231-0061 [5] P.CHOZHA RAJAN1, K.JAYASHREE2” A Survey of Mobile Cloud Computing for Smart Phones” International Journalof Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015, ISSN: 2278 – 7798