Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?

Size: px
Start display at page:

Download "Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?"

Transcription

1 1 Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Karthik Kumar and Yung-Hsiang Lu Purdue University Abstract: The Cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems. Is cloud computing the ultimate solution for extending battery lifetimes of mobile systems? keywords: mobile cloud computing, energy savings What is cloud computing? Cloud computing [1] is a new type of service provided through the Internet. In cloud computing, the computing resources such as processor, memory, and storage are not physically present at the users location. Instead, the computing resources are owned and managed by a service provider and the users access the resources via the Internet. For example, Amazon offers Elastic Compute Cloud (EC2) and Simple Storage Service (S3); personal data can be stored on their cloud using S3 and computation can be performed on the stored data using EC2. This type of computing paradigm provides many advantages for businesses, including low initial capital investment, shorter start-up time for new services, lower maintenance and operation cost, higher utilization through virtualization, and easier disaster recovery. Such advantages make cloud computing an attractive option. Some reports [1], [2] suggest that there are only benefits in shifting computing from desktops to the cloud. How about cloud computing for mobile users? The primary constraints for mobile computing are limited energy and wireless bandwidth. Inthis article, we investigate how cloud computing may provide energy savings as a service to mobile users and describe challenges and possible solutions. Techniques to save energy for mobile systems Mobile systems, such as smart phones, become the primary computing platforms for many users. Various studies have shown that longer battery lifetime is the most desired feature of mobile systems.

2 2 A study in 2005 among users across 15 countries [3] also showed longer battery life was the top concern, above all other features, such as cameras or storage. A 2009 survey by Changewave Research [4] shows short battery life to be the most disliked feature on Apple s iphone 3GS In August 2009, a Nokia poll showed that battery life is the most desired feature for music phones. There are many applications that are too computation-intensive to be performed on a mobile system. If a mobile user wants to use such applications, the computation has to be performed on the cloud. Other applications such as image retrieval, voice recognition, gaming, navigation, etc can be performed on a mobile system. However, they consume significant amounts of energy. Can offloading these applications to the cloud save energy and extend battery lifetimes for mobile users? Low power has been an active research topic for many years. In IEEExplore, searching low and power in the document title produces over 5,000 papers. Techniques for saving energy and extending battery lifetime can be classified into several categories: (1) Adopt new generation of semiconductor technology. As transistors become smaller, each transistor consumes less power. Unfortunately, as transistors become smaller, more transistors are used to provide more functionalities and better performance; as a result, power consumption actually increases. (2) Avoid wasting energy. Whole systems or individual components may enter standby or sleep modes to save power. (3) Execute programs slowly. When a processor s clock speed doubles, the power consumption nearly octuples. If the clock speed is reduced by half, the execution time doubles but only one quarter of energy is consumed. (4) Eliminate computation all together. This sounds like a free lunch but it is possible, except that the computation is not performed at the mobile system. Instead, computation is performed somewhere else and the mobile system s battery lifetime can be extended. This article focuses on the last approach for energy conservation. Offloading computation to save energy Sending computation to another machine is not truly a new idea. The currently popular client-server computing model is an example. Mobile users can launch web browsers, search the Internet, or shop on-line. What separates cloud computing from the existing client-server model is the adoption of virtualization in cloud computing. Through virtualization, cloud vendors can execute arbitrary programs given by the users. This is different from client-server computing because the programs running on the servers are managed by the service providers. In contrast, cloud vendors provide computing cycles and users, in particular, mobile users, can use the cycles to reduce the amounts of computation on the mobile systems and save energy. In other words, cloud computing provides the possibility of energy savings as a service for mobile users. This is called computation offloading [5].

3 3 Virtualization is a fundamental feature in cloud computing. Virtualization allows applications from different customers to run on different virtual machines; hence, providing separation and protection. Energy analysis for computation offloading Various studies about offloading focus on the question whether to offload computation to a server [6], [7]. The following is a simple analysis for this decision. Suppose the computation requires C instructions. Let S and M be the speeds, instructions per second, of the cloud server and the mobile system. The same task takes C S and C M seconds on the server and the mobile system respectively. Suppose D bytes of data are exchanged between the server and the mobile system. B is the network bandwidth. It takes D B seconds for transmitting and receiving data. Suppose the mobile system consumes P c for computing, P i while being idle, and P tr for sending and receiving data. In general, transmission power is higher than reception power but we use the same power in this simplified analysis. If the computation is performed at the mobile system, the energy consumption is P c C M.Ifthe computation is performed at the server, the energy consumption is P i C S + P tr D B. The amount of energy saved is P c C M P i C S P tr D B. (1) Suppose the server is F times faster, i.e. S = F M. We can rewrite the formula as C M (P c P i F ) P tr D B. (2) Energy is saved when this formula produces a positive number. The formula is positive if (a) D B is sufficiently small compared with C M and (b) F is sufficiently large. The values of M, P i, P c,andp th are parameters specific to the mobile system. For example, an HP ipaq PDA with a 400 MHz (M =400) Intel Xscale processor has the following values P c 0.9 W, P i 0.3 W, and P tr 1.3 W. If we use a 4 core server, with a clock speed of 3.2 GHz, the server speedup F may be given by S M X 400, where X is the speedup due to additional memory, more aggressive pipeline, etc. If we assume X =5, we obtain the value of F 160. ThevalueofF can increase even further for cloud computing if the application is parallelizable, since we can offload to multiple servers. If we assume that F =160, equation (2) becomes C 0.3 ( ) 1.3 D B ( C) 1.3 D B (3)

4 4 For offloading to break-even, we equate equation (3) to zero, and we obtain B o D C, (4) where B o is the minimum bandwidth required for offloading to save energy, determined by ratio of D C.If D C is low, then offloading can save energy. Thus offloading is beneficial when large amounts of computation C are needed with relatively small amounts of communication D. Existing studies focus on determining whether to offload by predicting the relationships between D, C, and B. Figure 1 shows how these variables affect the offloading decision. We use two examples to illustrate these factors: (1) chess game and (2) image retrieval. Fig. 1. The offloading decision depends on the values of C, D, and B. Applications for offloading Chess is one of the most popular games in the world. A chessboard has 8 8 = 64 positions. Each player controls 16 pieces at the beginning of the game. Chess is Markovian, meaning that the game is fully expressed by the current state, regardless of the history before reaching the current state. Each piece may be in one of the 64 possible locations and needs 6 bits to represent the location. This is an overestimate because some pieces have restrictions; for example, a bishop can move to only half of the board, i.e. 32 possible locations. To represent the current state of a chess game, 6 bits 32 pieces = 192 bits = 24 bytes are sufficient; this is smaller than the size of a typical wireless packet. The amount

5 5 of computation for chess is very large; Shannon and Allis estimated the complexity of chess to exceed the number of atoms in this universe. Chess can be parallelized [8], making the value of F in equation (2) very large. Since the amount of computation C is extremely large and D is very small, chess is an example where offloading is beneficial for most wireless networks. Image retrieval is an application where images similar in content to a query are retrieved from an image collection. The retrieval is done by comparing numerical representations of the images, called features. The features for the image collection may be computed in advance; for a query, its features are computed during retrieval, and compared with the image collection. Since most of the computation is done in advance, less computation is performed online, and the value of C is small. D is large since a large amount of data needs to be sent. As a result, even if the value of F becomes, D B may still be too large when compared to C M in equation (2). This makes offloading save energy only if B is very large; thus offloading saves energy only at high bandwidths. Does cloud computing make computation offloading more attractive? The analysis indicates that the energy saved by computation offloading depends on the wireless bandwidth B, the amount of data to be transmitted D, and the amount of computation to be performed C. However, there is a fundamental assumption underlying this analysis: all the data needs to be sent to the service provider. This is because the model is based on the assumption that the server does not already contain the data. The client needs to offload the program and the data to the server. For example, a newly-discovered server for computation offloading does not already contain a mobile users personal image collection. However, cloud computing changes that assumption: the cloud stores data and performs computation on the stored data. For example, services like Google s Picasa and Amazon s Simple Storage Service (S3) can store data, and Amazon s Elastic Compute Cloud (EC2) can be used to perform computation on the data stored using S3. This results in a significant change in the value of D for most applications. There is no longer a need to send the data over the wireless network; it suffices to send a pointer to the data. Also the value of F is elastic: large numbers of processors can be obtained on the cloud. This increases the energy savings in equation (2): very small D and very large F imply that energy can always be saved. Does this mean that cloud computing is the ultimate solution to the energy problem for mobile users? Not quite. While cloud computing has tremendous potential to save energy, there are several issues to be considered. Some of the issues with cloud computing include privacy and security, reliability, and handling real-time data. Why cloud computing may not save energy Privacy and security:

6 6 In cloud computing, traditional stand-alone programs are replaced by web applications, and data is no longer stored in users computers. Shifting all the data and computing resources to the cloud can have implications for privacy and security. Since the data is stored and managed on the cloud, security and privacy settings depend on the IT management provided by the cloud. A bug or security loophole in the cloud may result in breach of privacy. For example, in March 2009, a bug in Google allowed documents to be shared without owners knowledge [9]. A breach in Twitter in July 2009 allowed a hacker to obtain confidential Twitter documents [10]. Cloud service providers typically work with many third party vendors. There is no guarantee how these vendors may safeguard data. For example, a phishing attack in 2007 duped a staff member for salesforce.com into revealing passwords; the passwords were used to access confidential data. Another example of a potential privacy violation is when a user offloads location-based navigation to the cloud: this could result in tracking an individual. If this data is logged in the cloud, it is possible to reveal the information and violate the privacy of the individual. Moreover, data on the cloud may be stored in multiple locations, across different states and countries. Data that might be secure in one country may not be secure in another: different jurisdictions may apply over accessing the data. For example, the European Union favors more strict protection of privacy when compared to the US, where laws such as the Patriot Act give the government and other agencies more power to access information. Since the storage locations are typically unknown to the user, there is no knowledge about the laws that apply to safeguarding data. This may result in serious security concerns for a company that stores its trade secrets on the cloud, or a user that uploads a patentable idea from a mobile system to the cloud. All these examples make it evident that all data cannot be stored in the cloud without considering the privacy and security implications. One possible solution to storing data is encrypting the data before storage. However, the problems cannot be solved by encryption alone. Figure 2 shows two scenarios of encryption. In the first scenario, the data are kept encrypted at the cloud storage. This can prevent unauthorized access even when the storage is breached at the cloud. In Figure 2(b), the data are decrypted at the cloud vendor because of the need to perform operations on the data. This is the general case for cloud services. If it is a document, the cloud vendor must know which words are used to check spelling. If it is a spreadsheet, the cloud application must know the numbers for calculation. Another possible solution is using a technique called steganography (see sidebox on Data Outsourcing and Privacy). Steganographic techniques can be used to transform the data such that operations can be performed without exposing the data. Performing encryption or steganographic techniques before sending data to the cloud requires some

7 7 Fig. 2. (a) Encryption protects from unauthorized access through the Internet; the cloud vendor cannot access the data, either. This is applicable in cloud storage. (b) Data are decrypted at the cloud vendor. This is necessary when operations on the data are necessary. additional processing C p on the mobile system and consumes additional energy. Equation (2) can be rewritten as where P c Cp M C M (P c P i F ) P tr D B P c C p M. (5) is the additional energy required to protect privacy and security. If this energy is significant, cloud computing may not save energy for the mobile user. It may be more energy-efficient to perform operations on the mobile system, since C p =0when the computation is performed on the device. Reliability: Another potential concern with cloud computing is reliability [11]. A mobile user performing computation on the cloud is dependent on the wireless network and the cloud service. Dependence on the wireless network immediately implies that cloud computing may not even be possible (let alone energy efficient) when wireless network connectivity is limited. This is typical in regions like national parks; a user capturing images in the park may not be able to organize, retrieve, or identify any images inside the park. Mobile cloud computing is also difficult in locations such as the basement of a building, interior of a tunnel, subway etc. In this case, the value of B in equation (2) can become very small, or even zero,

8 8 TABLE I Reliability Issues with Cloud Computing [11], [12] Outage Date Vendor Service July 2008 Amazon s3 outage Feb 2008 Amazon s3 outage August 2008 Google Gmail service outage Oct 2009 TMobile/Microsoft SideKick loses users data and cloud computing does not save energy. Dependence on the cloud for important computations could lead to problems during service outages. Several service providers such as Google, Amazon, and TMobile have experienced reliability issues. Table I shows some of the service outages for different providers. These service outages can significantly reduce the value of F in equation (2). Another problem of reliability is data storage. In October 2009, TMobile s and Microsoft s mobile SideKick service crashed, and customers lost their data and contacts. One option in such scenarios, is an independent backup of data with an alternate service provider; this may increase the value of D in equation (2). Real-time data: Some applications have real-time data. Examples include chess, searching newly captured images for CBIR, mobile surveillance, and context-aware navigation. In such scenarios, D in equation (2) is no longer a pointer to the data, it refers to the actual data. For applications like chess, the value of D is small and hence offloading can still save energy. When the value of D is large, offloading may not save energy. In such scenarios, performing the computation on the mobile system may be more energyefficient. A possible solution is partitioning computation between the mobile system and the cloud to reduce the energy consumption. Such a solution may include partially processing the real-time data on the mobile system. If the processed data is smaller in size, sending the processed data to the server reduces the wireless transmission energy. The mobile cloud The analysis presented in this article indicates that cloud computing can potentially save energy for mobile users. However, not all applications are energy-efficient when migrated to the cloud. Mobile cloud computing services would be significantly different from cloud services for desktops since they must offer energy savings. The services should consider the energy-overhead for privacy, security, reliability, and data communication before offloading.

9 9 REFERENCES [1] Mache Creeger. CTO Roundtable: Cloud Computing. Queue, 7(5):1 2, June [2] Google. Away with applications: The death of the desktop. available at [3] CNN. Battery life concerns mobile users. available at [4] John Paczkowski. iphone owners would like to replace battery, att. available at [5] K. Yang, S. Ou, and H.H. Chen. On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications. IEEE Communications Magazine, 46(1):56 63, [6] Cheng Wang and Zhiyuan Li. Parametric Analysis for Adaptive Computation Offloading. In ACM SIGPLAN Conference on Programming Language Design and Implementation, pages , June [7] R. Wolski, S. Gurun, C. Krintz, and D. Nurmi. Using Bandwidth Data to make Computation Offloading Decisions. In IEEE International Symposium on Parallel and Distributed Processing, pages 1 8, [8] Monroe Newborn. A parallel search chess program. In ACM 85: Proceedings of the 1985 ACM annual conference on The range of computing : mid-80 s perspective, pages , New York, NY, USA, ACM. [9] Jason Kincaid. Google privacy blunder shares your docs without permission. available at [10] Robert McMillan. Hacker: I broke into twitter. available at [11] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, et al. Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS , [12] T-Mobile COO. T-mobile sidekick. available at

10 10 SIDEBAR 1 Mobile Image Processing Mobile devices such as cell phones and PDAs are becoming increasingly popular. Most of these devices are equipped with cameras and have several gigabytes of flash storage capacity. As a result, thousands of images can be captured and stored on these devices. With such large image collections, two functionalities become important: (1) access specific sets of images from the collection, and (2) transmit the images over a wireless network to other devices and to servers for storage. For accessing a specific set of images, content-based image retrieval (CBIR) can be a better alternative when compared to manually browsing through all the images. For example, a user may want to view all images taken with a specific person, or at a specific location. Mobile image retrieval allows the user to obtain the relevant pictures by comparing images and eliminating the irrelevant matches on the mobile system. Several works [1-4] propose to perform CBIR on mobile devices. Since these mobile devices are battery-powered, energy conservation is important [2-4]. In [3], we show that it is energy-efficient to partition CBIR between the mobile device and server depending on the wireless bandwidth. As the bandwidth increases, offloading image retrieval saves more energy. Most of the energy consumption for offloaded applications is due to transmission. For image retrieval, transmitting the images over a wireless network consumes significant amounts of energy. The images may be pre-processed on the mobile device before transmission [5] in order to reduce the transmission energy. This reduction in transmission energy is achieved by reducing the file sizes. However, the amount of energy saved depends on the wireless bandwidth and the contents of the image. Pre-processing the images saves energy if the reduction in transmission energy compensates for the energy spent due to pre-processing. If the wireless bandwidth is high, the value of the former reduces. Moreover, different images may have different values of the latter based on their contents. Hence it is required to make the pre-processing adaptive based on the wireless bandwidth and the image contents. As cloud computing becomes more popular, the wireless transmission energy is the most significant bottleneck for mobile energy savings, and such techniques become increasingly significant. References [1] Yang, J., Park, S., Seong, H., Byun, H., and Lim, Y A Fast Image Retrieval System Using Index Lookup Table on Mobile Device. 19th International Conference on Pattern Recognition, [2] Zhu, C., Li, K., Lv, Q., Shang, L., and Dick, R. P iscope: Personalized Multi-modality Image Search for Mobile Devices. Mobisys,

11 11 [3] Hong, Y.-J., Kumar, K., and Lu, Y.-H Energy Efficient Content-based Image Retrieval for Mobile Systems. IEEE International Symposium on Circuits and Systems, [4] Chen, D., Tsai, S., Chandrasekhar, V., Takacs, G., Singh, J., and Girod, B Tree Histogram Coding for Mobile Image Matching. Data Compression Conference, [5] Nimmagadda, Y., Kumar, K., and Lu, Y-H. Energy-Efficient Image Compression in Mobile Devices for Wireless Transmission. IEEE International Conference on Multimedia & Expo 2009,

12 12 SIDEBAR 2 Data Outsourcing and Privacy Data Outsourcing refers to sending data outside of the users immediate computing environment. This is an increasingly important concern for cloud computing. As government agencies shift to the cloud (such as and information like healthcare, criminal records, and tax information move to the cloud. This makes security and privacy a critical concern. Different types of data many be sent, such as multimedia, spreadsheets, and text. Multimedia content like images and videos have a lot of redundancy. This makes it possible to hide data in multimedia, using steganography [1]. The following figure shows an example of steganography: the images (a) and (c) look identical, but image (c) contains image (b) hidden in it. When appropriate transformations are applied to image (c), we can obtain image (b). Steganographic techniques can be used to transform the data before storage, so that operations may still be performed on the data. For text documents and spreadsheets however, there is very little redundancy. This makes it difficult to transform the data and still perform operations. For example, a word document that has alphabets mapped onto symbols is difficult to spell check. If the mapping is one-to-one and onto, then alphabet frequency can be easily used to determine the words. Similarly, if the elements in a spreadsheet are transformed, it is difficult to perform meaningful mathematical operations on them. Performing computattion on encrypted or steganographic data still remains an open research problem. The interim solution to the data outsourcing problem is development of a hybrid cloud. The website searchcloudcomputing.com defines the hybrid cloud as a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally. They

13 13 claim that this is more feasible currently since large enterprises already have the substantial investments in their infrastructure, required to provide resources in-house. In addition, many organizations would prefer to keep sensitive data under their own control to ensure privacy and security. Acknowledgements: We would like to thank Jibang Liu for the steganography images used in this section. [1] FAP Petitcolas, RJ Anderson, MG Kuhn Information hiding-a survey. Proceedings of the IEEE - special issue on protection of multimedia content, 87(7):

14 14 Author biography: Karthik Kumar is a Ph.D. candidate in the School of Electrical and Computer Engineering at Purdue University. His research interests include energy conservation for mobile systems and resource allocation for scalable computing. He is a student member of the IEEE. Contact him at kumar25@purdue.edu. Yung-Hsiang Lu is an associate professor in the School of Electrical and Computer Engineering at Purdue University. His research focuses on energy efficiency of computing systems. He received Ph.D. from Stanford University and is a senior member of the IEEE. Contact him at yunglu@purdue.edu.

Published by the IEEE Computer Society

Published by the IEEE Computer Society CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University The cloud heralds a new era of computing where application services are provided

More information

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,

More information

perform computations on stored data (Elastic Compute Cloud (EC2). )

perform computations on stored data (Elastic Compute Cloud (EC2). ) Karthik Kumar and Yung-Hsiang Lu, Purdue University Presenter Yifei Sun Take Amazon cloud for example. store personal data (Simple Storage Service (S3) ) perform computations on stored data (Elastic Compute

More information

Security in Offloading Computations in Mobile Systems Using Cloud Computing

Security in Offloading Computations in Mobile Systems Using Cloud Computing Security in Offloading Computations in Mobile Systems Using Cloud Computing S.Masiperiyannan 1,C.M.Mehathaf Begum 2,I.Mohammed Farook Ali 3,G.Mayuri Priya 4,S.Sudhakar 5 UG Student, Dept. of CSE, K S R

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE,

More information

Saving Mobile Battery Over Cloud Using Image Processing

Saving Mobile Battery Over Cloud Using Image Processing Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013

Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013 Mobile Cloud Computing: Survey & Discussion Jianting Yue Sep 27, 2013 1 Outline Lead-in Definition Main Functions Architecture Computation Offloading: an example Challenges Potential Ideas Summary 2 3

More information

Secured Storage of Outsourced Data in Cloud Computing

Secured Storage of Outsourced Data in Cloud Computing Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated

More information

Prediction System for Reducing the Cloud Bandwidth and Cost

Prediction System for Reducing the Cloud Bandwidth and Cost ISSN (e): 2250 3005 Vol, 04 Issue, 8 August 2014 International Journal of Computational Engineering Research (IJCER) Prediction System for Reducing the Cloud Bandwidth and Cost 1 G Bhuvaneswari, 2 Mr.

More information

CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION NETWORK

CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION NETWORK BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 105-110 BEST Journals CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Security Benefits of Cloud Computing

Security Benefits of Cloud Computing Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: alecu.felician@ie.ase.ro Abstract: The nature of the Internet is

More information

Cloud Computing for Libraries: A SWOT Analysis

Cloud Computing for Libraries: A SWOT Analysis Cloud Computing for Libraries: A SWOT Analysis 8 th Convention PLANNER 2012 Abstract Cloud Computing for Libraries: A SWOT Analysis Miteshkumar Pandya This paper provides brief information on cloud computing

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 01-06 Cloud Computing for hand-held Devices:Enhancing Smart phones viability

More information

Copyright IEEE. Citation for the published paper:

Copyright IEEE. Citation for the published paper: Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method

A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method Radhika Chowdary G PG Scholar, M.Lavanya Assistant professor, P.Satish Reddy HOD, Abstract: In this paper, we present

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud

More information

Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Hybrid Cloud Computing Issues and Solutions , pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University

More information

Cloud Based Instructional Resources for Distance Learning

Cloud Based Instructional Resources for Distance Learning Cloud Based Instructional Resources for Distance Learning Noah Sturdevant Stamford International University Bangkok, Thailand Abstract Technology has advanced sufficiently, especially in the area of communication,

More information

Cloud Computing and its Security in Higher Education

Cloud Computing and its Security in Higher Education Cloud Computing and its Security in Higher Education Samir Tout stout@emich.edu School of Technology Studies, Information Assurance Eastern Michigan University (EMU) William Sverdlik wsverdlik@emich.edu

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

Session 11 : (additional) Cloud Computing Advantages and Disadvantages INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud

More information

Offloading file search operation for performance improvement of smart phones

Offloading file search operation for performance improvement of smart phones Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul

More information

Review On Digital Library Application Services Of Mobile Cloud Computing

Review On Digital Library Application Services Of Mobile Cloud Computing Review On Digital Library Application Services Of Mobile Cloud Computing Dr Abdulrahman M. Al-Senaidy, Tauseef Ahmad Abstract: - In the recent years growth of computer technology contribute to the progress

More information

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department

More information

Cloud and Mobile Computing

Cloud and Mobile Computing Cloud and Mobile Computing Protect Privacy in Offloading Yung-Hsiang Lu Electrical and Computer Engineering Purdue University Technological Trends Mobile systems become primary computing platforms for

More information

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE Johan Versendaal HU University of Applied Sciences Utrecht Nijenoord 1, 3552 AS Utrecht, Netherlands, johan.versendaal@hu.nl Utrecht University

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in

More information

MOBILE CLOUD COMPUTING: OPEN ISSUES Pallavi 1, Pardeep Mehta 2

MOBILE CLOUD COMPUTING: OPEN ISSUES Pallavi 1, Pardeep Mehta 2 MOBILE CLOUD COMPUTING: OPEN ISSUES Pallavi 1, Pardeep Mehta 2 1 Asst Prof,Dept of Computer Science, Apeejay College of Fine Arts, Jalandhar 144001 2 Asst Prof,Dept of Computer Science,HMV,Jalandhar 144001

More information

A Web Base Information System Using Cloud Computing

A Web Base Information System Using Cloud Computing A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 A Survey of Load Balancing Algorithms using VM B.KalaiSelvi 1 and Dr.L.Mary Immaculate Sheela 2 1 Research

More information

Cloud Computing Security Issues and Controls

Cloud Computing Security Issues and Controls Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS

DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS 1. INTRODUCTION Virgil Chichernea 1 Dragos-Paul Pop 2 In a globalized society with state of the art informational technologies,

More information

Reputation in Cloud Computing

Reputation in Cloud Computing Reputation in Cloud Computing Adrian Yanes Aalto University School of Science and Technology adrian.yanes@aalto.fi Abstract Nowadays the concept of cloud computing is getting popular around the Net. The

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Survey On Cloud Computing

Survey On Cloud Computing Survey On Cloud Computing 1,2 Heena I. Syed 1, Naghma A. Baig 2 Jawaharlal Darda Institute of Engineering & Technology, Yavatmal,M.S., India. 1 kauser.heena853@gmail.com 2 naghmabaig@gmail.com Abstract

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems Aysan Rasooli Department of Computing and Software McMaster University Hamilton, Canada Email: rasooa@mcmaster.ca Douglas G. Down

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

New Cloud Computing Network Architecture Directed At Multimedia

New Cloud Computing Network Architecture Directed At Multimedia 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk Mobile Cloud Computing Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk Mobile Computing Rapid progress of mobile computing have become a powerful trend in the

More information

Next Generation Mobile Cloud Gaming

Next Generation Mobile Cloud Gaming Next Generation Mobile Cloud Gaming Wei Cai, Victor C.M. Leung Department of Electrical and Computer Engineering The University of British Columbia Min Chen School of Computer Science and Technology Huazhong

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers Rostand Costa a,b, Francisco Brasileiro a a Federal University of Campina Grande Systems and Computing Department, Distributed

More information

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,

More information

MOBILE ARCHITECTURE BEST PRACTICES: BEST PRACTICES FOR MOBILE APPLICATION DESIGN AND DEVELOPMENT. by John Sprunger

MOBILE ARCHITECTURE BEST PRACTICES: BEST PRACTICES FOR MOBILE APPLICATION DESIGN AND DEVELOPMENT. by John Sprunger MOBILE ARCHITECTURE BEST PRACTICES: BEST PRACTICES FOR MOBILE APPLICATION DESIGN AND DEVELOPMENT by John Sprunger When developing mobile applications, there are a number of key challenges where architecture

More information

IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESS

IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESS IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESS M.surendra 1, T.Sujilatha 2, #1 Student of M.Tech (C.S) and Department Of CSE, GOKULA KRISHNA COLLEGE OF ENGINEERING

More information

Choosing a Cloud Computing Company

Choosing a Cloud Computing Company Benefits of Cloud Computing - Pros of Cloud Computing - Arguments for Cloud Computing Choosing a Cloud Computing Company 1. With Cloud Computing, employee's computers will cost less, because essentially

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

ENERGY EFFICIENT DATA TRAFFIC MANAGEMENT IN MOBILE CLOUD COMPUTING

ENERGY EFFICIENT DATA TRAFFIC MANAGEMENT IN MOBILE CLOUD COMPUTING ENERGY EFFICIENT DATA TRAFFIC MANAGEMENT IN MOBILE CLOUD COMPUTING Bharath V 1, Priyadarsini K 2 1 Department of CSE, SRM University, bharath10feb@gmail.com 2 Department of CSE, SRM University, priyadarsinikk@gmail.com

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Chapter 19 Cloud Computing for Multimedia Services

Chapter 19 Cloud Computing for Multimedia Services Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5

More information

Cloud Resource Management for Image and Video Analysis of Big Data from Network Cameras

Cloud Resource Management for Image and Video Analysis of Big Data from Network Cameras -RXIVREXMSREP SRJIVIRGISR PSYH SQTYXMRKERH&MK(EXE Cloud Resource Management for Image and Video Analysis of Big Data from Network Cameras Ahmed S. Kaseb, Anup Mohan, Yung-Hsiang Lu School of Electrical

More information

Mobile Cloud Middleware: A New Service for Mobile Users

Mobile Cloud Middleware: A New Service for Mobile Users Mobile Cloud Middleware: A New Service for Mobile Users K. Akherfi, H. Harroud Abstract Cloud computing (CC) and mobile cloud computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes

More information

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Cloud Computing: Technical Challenges and CloudSim Functionalities

Cloud Computing: Technical Challenges and CloudSim Functionalities Cloud Computing: Technical Challenges and CloudSim Functionalities Firas D. Ahmed 1, Amer Al Nejam 2 1 Universiti Tenaga Nasional, College of Information Technology, Jalan IKRAM-UNITEN, 43000 Kajang, Malaysia

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Cloud Computing Phillip Hampton LogicForce Consulting, LLC

Cloud Computing Phillip Hampton LogicForce Consulting, LLC Phillip Hampton LogicForce Consulting, LLC New IT Paradigm What is? Benefits of Risks of 5 What the Future Holds 7 Defined...model for enabling ubiquitous, it convenient, ondemand network access to a shared

More information

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer

More information

Database Management System as a Cloud Service

Database Management System as a Cloud Service Database Management System as a Cloud Service Yvette E. Gelogo 1 and Sunguk Lee 2 * 1 Society of Science and Engineering Research Support, Korea vette_mis@yahoo.com 2 Research Institute of Industrial Science

More information

Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud

Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud Amandeep Kaur 1, Sarpreet Singh 2 1 Research Fellow, 2 Asst. Professor 1,2 Sri Guru Granth Sahib World University,Fatehgarh

More information

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal

More information

Data Backups in the Clouds

Data Backups in the Clouds ELEKTROTEHNIŠKI VESTNIK 78(3): 118-122, 2011 ENGLISH EDITION Data Backups in the Clouds Aljaž Zrnec University of Ljubljana, Faculty of Computer and Information Science, Trzaska 25, 1000 Ljubljana, Slovenia

More information

Ch. 4 - Topics of Discussion

Ch. 4 - Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed

More information

Who Controls Your Information in the Cloud?

Who Controls Your Information in the Cloud? Who Controls Your Information in the Cloud? threat protection compliance archiving & governance secure communication Contents Who Controls Your Information in the Cloud?...3 How Common Are Information

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department

More information