Cloud Computing for Enhanced Mobile Health Applications
|
|
|
- Rudolf Burke
- 10 years ago
- Views:
Transcription
1 Cloud Computing for Enhanced Mobile Health Applications M.T Nkosi, F. Mekuria SM IEEE CSIR Modelling and Digital Sciences Mobile Computing & Security Unit Meiring Naude Road, Pretoria 0001, South Africa Abstract Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations in computation and power supply. Since mobile devices have limited computational capacity and run on small batteries; they are unable to run heavy multimedia & security algorithms. In this paper a cloud computing framework to relieve mobile devices from executing heavier multimedia and security algorithms in delivering mobile health services is described. The proposed framework uses a Cloud Computing protocol management model which intends to provide multimedia sensor signal processing & security as a service to mobile devices. Our approach suggests that multimedia and security operations can be performed in the cloud, allowing mobile health service providers to subscribe and extend the capabilities of their mobile health applications beyond the existing mobile device limitations. Keywords Multimedia DSP, Security, cloud computing, Mobile health application. 1. Introduction Mobile phones as service platforms can provide several societal, business and governmental services. Hence, serious applications, like bank transactions, can now be performed on a mobile device, constituents can send SMS requests to their representatives in parliament, and people can access health information through text enquiries. Further developments will allow mobile devices with unique features that can sense the environment and physiological parameters to enhance quality of life and remote monitoring of patients [1]. However, mobile devices as compared to desktops computers have limitations in computational capacity and power consumption[2]. These limitations must be acknowledged when developing mobile applications and hinders them from functioning in a more or less acceptable capability and reliability like desktop computers. Users of desktop PC based online applications have become comfortable with accessing more sensitive health applications via the Internet. Securing mobile health applications running on a mobile device is therefore an important area, if we want the applications to be trustworthy and reliable. In this article a frame work and protocol based on cloud computing is proposed to enhance the capability of mobile devices for use in advanced sensor based health care and monitoring applications. The emergence of cloud computing in the research space promises to solve some of the concerns facing mobile computing platforms. The following definition is used: Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services. The services themselves have long been referred to as Software as a Service (SaaS), so we use that term. The data-center hardware and software is what we will call a Cloud. Hence, cloud computing could be regarded as an unlimited resource that can be accessed anytime and anywhere in the world. This is in direct contrast to having servers inside organisation s premises to run applications. Irrespective of several concerns against cloud computing, it is envisaged as an answer to questions about capability of mobile devices to function equally as desktop computers [4]. Mobile health services are one of the applications that can benefit from the combination of mobile & cloud computing technologies. Building a converged and trusted network infrastructure and mechanism for mobile cloud computing is undertaken in this paper, to promote mobile health monitoring services. There are a number of computationally intensive operations that can be offloaded onto the cloud, when considering multimedia services using ubiquitous mobile devices. Among these are multimedia sensor signal processing and security management operations which have not been given much attention in mobile cloud computing research field. In this paper a proposal is presented to use cloud computing for mobile health management which also addresses security concerns in mobile cloud computing. 2. Related Work A number of cloud based mechanisms are being suggested to protect mobile devices and improve the capacity & reliability of mobile devices. The offloading approach is proposed in [7] which address the outsourcing of execution of heavy application to the
2 surrounding systems called surrogates. In this approach, when a mobile device has to run a heavy application, it sends that application to a close by surrogate system that will execute it and sends the output to the mobile device. Byung-Gon and Petros [4] proposed a cloud based architecture that present a technique to combat problem of smartphones limitations in terms of computation, memory, and energy reserves. In their architecture, a smartphone is cloned and its execution offloaded to a computational infrastructure hosting a cloud of clones. In that way, a mobile device is relieved from running heavier applications. From both offloading approaches mentioned above, security concern is not addressed. 3. Model Security Layer Application development on its own is a challenge; it gets even more complicated when one has to think about the limitations of mobile devices and securing the applications. Running secure multimedia signal processing algorithms in mobile applications turns to be a burden for developers as mobile devices have limited computational capacity. With the current business model, organisations spend a lot of money in buying or developing software applications to provide or access services. Furthermore, security of applications must be built in inside the infrastructure so as to protect data flowing through the various nodes. And when security has been added it must be well managed from time to time to keep it up to date to fight new security threats. The concept of cloud computing seeks to come up with a new business model whereby companies can outsource IT infrastructure (data storage, computation, etc) and other services to the cloud. It promises to benefit companies, more especially small businesses, by minimising costs as they will not have to buy expensive hardware to store data in their premises. But one may wonder how can organisations, that have already invested a lot of money to build IT infrastructure, benefit from the concept of cloud computing? The continuous growth in technology has an impact on users, including organisations that have invested in building IT infrastructure. The rapid growth of technology comes with security challenges that can never be overlooked; hence security updates to protect existing infrastructure are a continuous necessity. Therefore, organisations that have invested in building IT infrastructure will benefit if security can be provided as services via the cloud. Furthermore, with advent of mobile technology, security concerns will not vanish anytime soon instead more innovations on security mechanisms are required to complement the technology[4,8]. A security management mechanism is therefore essential to address security issues in cloud computing. A successful security management mechanism will compel adoption of cloud computing by organisations. In figure 1, a new security management model of mobile devices is presented. The model aims at separating applications and the management of their security, more especially in wireless or mobile computing environment. But the model can also be applicable to desktop based applications if one wishes to minimise costs of running or implementing security applications. The incapability of mobile devices to execute heavy applications due to limited computational power motivated the proposition of this model. The work done by Byung-Gon and Petros [4] and Kun and Shumao [6] suggest offloading technique of applications execution from a mobile device to a close by computer connected to Internet. This approach raises a concern as to who manages security during the whole process. Like in the case of Byung-Gon and Petros architecture, when a mobile device is cloned to a computational infrastructure how can you be sure that results of computation will not be infected by viruses when it is loaded back to the mobile device? This can be a serious concern for those who want to adopt cloud computing for mobile applications. Consequently, in our proposed model we argue that a security can be provided as a service to protect mobile applications while a mobile device is cloned to an untrusted computational infrastructure. In so doing, there would be a security provider or vendor organisation that offers security to mobile devices. Mobile health application providers and users will not have to worry about security as it will be taken care of by security vendor. Figure 1: Cloud-Based Mobile Health Security Management The concept of Security as a Service (SaaS) has been implemented in desktop systems to support small businesses [9] but not to mobile based technology services. SaaS means, security management is offered as a service to organisations that runs applications which must be protected against unauthorised access. For example, in our proposed model, when mobile devices request to access a particular application, security verification is performed in the cloud. The proposed model intends to address or answer to security concerns in mobile devices. Some of security concerns to be addressed by this model are briefly discussed below: - Secure Software Execution Environment: viruses from malicious software can cause a serious negative impact to the functioning of a mobile device, therefore threat detection and prevention mechanism is required to avoid this impact. - Secure Data Communication: communication channel must retain privacy and integrity of data communicated to and from mobile applications. - User Identification: unauthorized access to mobile applications must be prevented.
3 - Secure Network Access: only subscribers must be able to connect to network and access services. - Content Security: the content downloaded and stored in the mobile device must be utilised as per the terms set by the content provider. - Secure Storage: private and sensitive information must be protected from unauthorized access. The above mentioned security concerns pose even more research questions in accordance with our proposed model. In this paper, we will address some of these concerns with respect to the proposed model. The following section will discuss the dimensions of security and show how the proposed model can address security issues at different levels. 4. Role of Cloud Computing Research developments towards cloud computing will have a direct impact to a number of issues in existing technologies. Different approaches are necessary to successfully address those issues. Research efforts in cloud computing has identified services that can be delivered via the cloud. Below we list some of those services: - Software as a Service (SaaS). - Data storage. - Sales force automation. - Supply chain management. - Hosted infrastructure (services, network capability). - Hosted services (fully operational IT environment). Services delivered via the cloud are dependent on other factors that affect cloud computing. More research will have to be undertaken to find ways to deal with these factors. Some of the aspects that will be affected by cloud computing are listed below: - The volume of traffic in the network: increased bandwidth will be required to allow fast connection to the Internet. - Security Aspects: a secure way to access services through Internet must be ensured. - Business Models: the way business is conducted will have to change to suit the cloud computing paradigm. - Accessibility: a reliable IT infrastructure must be in place to enable access to services. Each of these aspects is an inevitable challenge that requires innovative approaches to address it. Our proposed model tackles security aspect and business model. 5. Cloud & Mobile Health Today's mobile applications run in different platforms and serve diverse purposes. Future possibilities are that mobile networks will operate in an open model as the Internet [4,11]. Whereby applications developed and managed by different companies can run with cloud support. Mobile services require different levels of security to run on the cloud, depending on several factors. A service that transmits or stores sensitive health information will require a secure mechanism to protect applications as opposed to non-security-critical applications. Therefore, a varied layered security model is imperative to meet security needs of applications for running on cloud resources. Figure 2 illustrates a framework for a sensor based remote mobile health monitoring services. The framework focuses on mobile health applications and their limitations. Sensor Signal Non-invasive Sensor Human Body Mobile Sensor Cloud Computing App. Server Figure 2: Sensor based Mobile Health Service A basic idea of this framework is that a multimedia sensor signal processing will require increased power consumption for it to execute in a mobile device. To prevent this power drainage, the proposed model uploads complex computational algorithms to be executed in the cloud and final output is then uploaded back to the mobile device and the application server (AS). The model framework, therefore, classifies the required computational service request as weak and strong classes. The weak class requires low security and computation, and strong class complex multimedia processing and security. It is assumed that weak class offload request consumes less power and will be entirely performed in a mobile device and strong class is performed in the cloud with varied conditions. Furthermore, we innovatively propose a transitional performance of strong class multimedia and security verification. Transitional offloading where, part of (eg., 85%) a complex multimedia operation is performed in the cloud and the other remaining part (15%) is transferred to mobile device for completion. Mobile device is therefore expected to execute the remaining 15% and send a completion acknowledgement feedback to the mechanism in the cloud. 6. Sensor Signal Processing Sensor signal are captured with environmental noise signals which makes the sensor signal unusable without signal enhancement and extraction to remove the unwanted additive noise signal. The signal-to-noise ratio (SNR) of the sensed signal can typically be in the region of 0 db SNR, for many real world applications. Hence digital signal enhancement and extraction are crucial components of a mobile sensor based health monitoring system. Since the physiological or important information
4 parameters are embedded in the waveform of the sensor signal, accurate and non-distortive sensor signal waveform extraction requires digital filter models which give a high magnitude attenuation for out-of-band frequencies and unwanted additive noise signal while preserving the linear phase characteristic of the filter to avoid distortion in the important sensor signal waveform. Such a digital filter transfer function characteristic is defined by:... (1) Where, H(f) is the magnitude or attenuation function of the filter, and is the phase function with respect to frequency. An ideal transfer function plot of a low-pass filter, with a normalized cut-off frequency of 0.3 Hz is shown in figures 6a-b. The filter characteristic depicts a 60 db attenuation of out-of-band frequencies, while the phase characteristic is maintained linear within the passband (0-0.3 Hz). Such a signal enhancement filter characteristic for 1D sensor signals can be obtained using one of the two digital filter design methods, namely the Infinite Impulse Response (IIR) architecture described by equation (2), or Finite Impulse Response (FIR) model as given in equation (3)....(2)...(3) Where and are the filter coefficients, x(n) is the input and y(n) is the output of the filter, M & N are the sizes of the recursive and non-recursive parts of the filter. Figure 3, shows and ideal digital filter characteristics for sensor signal enhancement. We assume that such 1D or 2D signal enhancement digital filters can run either in the mobile sensor device in the case of smart phones, or the operation is offloaded to the cloud for processing in the case of limited capacity client mobile devices[6,14]. (a) (b) Figure 3. Ideal sensor signal filter characteristics 7. NGN & Health Services The all-ip network vision of next generation networks (NGN) allows support for authentication, and offloading of mobile services based on the IP multimedia subsystem (IMS) standard [13,14]. The convergence of IP, fixed and mobile networks in the NGN-IMS architecture raises an important issue to combine mobile and cloud computing [10,16]. How can the SIM (subscriber identity module) based authentication and mobile computing defined in the 3GPP-IMS standard is suitable for: 1- Easy service creation, and integration of convergent services. 2- The definition and allocation of authentication keys for the various mobile services, a subscriber wants to access with a single device. Although the 3GPP Generic bootstrap authentication (GBA) architecture allows for different kinds of authentication based on service requirements [4,5], service oriented scalable security architecture will be required, for this to be effective. The question: who should be responsible to define the level of authentication needed for health services, is crucial. Should health service providers who develop the content and services do the job or the network operator, who owns the network? This is a contentious issue which requires regulatory intervention and the setting up of a general guideline for promoting successful launch of the myriad of innovative mobile services services expected to appear in the near future [8,12]. In the meantime, NGN based services such as circuit/packet switched voice services and web based health monitoring services can be improved with a flexible cloud computing architecture [4,7,11]. At the same time Next Generation mobile broadband services require multimedia content and the involvement of service providers to set the required level of security. The use of cloud computing architectures is expected to complement the 3GPP-IMS standards in improving the execution of multimedia health and security mechanisms for increased reliability and efficient provision of next generation innovative mobile health services. Mobile network operators and mobile based health service providers are gearing up to provide next generation ubiquitous health monitoring systems based on the integration of IMS and the cloud computing paradigms[11,13]. Figure 4 shows a block diagram of a health monitoring system that uses mobile device as an IMS client. In figure 4, a non-invasive (NI) sensor is used to obtain the necessary sensor signal which is fed to a digital signal processor (DSP) embedded in the IMS client. The DSP is used to extract the physiological information necessary for health monitoring and decision support. In case of limited capability IMS client device, the IMS client can also offload the signal processing into a cloud resource, which could be operated by either the network operator or a service provider. The session initiation protocol signalling (SIPS), the SIP event packet (SIP-EP) connect the IMS client to the call session control functions (CSCF). The CSCFs are essentially SIP proxy servers, supporting IMS signalling and session
5 control functions. The database management system (XDMS), controls and organizes data created by the health monitoring services. The application server (AS) contains the ongoing mobile service and the transcieves data to-and-from the IMS client. The AS also acts as a subset (for health related data) of the home subscriber server (HSS), which is the central repository of mobile user-related information. At the other end, the IMS system monitor acts as the recipient and interpreter of the sensed physiological information, and communicate back the necessary decision and action to be taken. The system described in figure 4, is simulated using the IMS based service development API and Testbed. It further uses J2ME (Java mobile edition) libraries to exploit the IMS functionality for the client and core network nodes [11,12]. IMS CLIENT SIPS SIP-EP HSS CSCFs Cloud Resource in the design of the health monitoring system is crucial for the usability and sustainability of such mobile health services. 9. References [1] Y. Lin and I Chlamtac, Wireless and Mobile Network Architecture (Book Style).Robert Ipsen, USA: John Wiley & Sons, 2001, pp [2] F. Koushanfar, M. Potkonjak, V. Prabhu, J. Rabaey, Processors for Mobile Applications, in IEEE International Conference on Computer Design (ICCD 00), pp.603, September [3] A. Agarwal, D. Gupta, Security Requirements Elicitation Using View Points for Online System, First International Conference on Emerging Trends in Engineering and Technology, pp , July [4] B. Chun, P. Maniatis, Augmented Smartphone Applications Through Clone Cloud Execution, 12 th Workshop on Hot Topics in Operating Systems, Monte Verita, Switzerland, May 2009 NI Sensor XDMS IMS System Monitor [5] 3GPP TS ; Generic Authentication Architecture (GAA). Generic Bootstrapping Architecture (GBA) ; December Subject Application Server IMS Components Figure 4. IMS-based Mobile Health Monitoring with Cloud Support 8. Conclusion and Future Work Cloud computing technology and sciences can be used to alleviate limitations of ubiquitous mobile devices for use as service platforms in a number of societal applications. Mobile health monitoring and management is one example shown in this paper. The system described in this paper uses an NGN/IMS system with cloud computing to reduce the burden of organizing and improving the functions of existing mobile health monitoring systems. This will improve the utilization of the ubiquitous mobile device for societal services and promote health service delivery to marginalized rural communities. However, necessary functional testing of the IMS protocols, for secure transportation of sensor signals to-and-from the supporting cloud computing resources should be made with care. The interaction between health service provider, IMS network operator and cloud computing service providers should be regulated so as identity management and security verification is performed in accordance with accepted standards. The transitional execution and synchronization necessary for cloud offloading of computationally heavy algorithms will require more research with regard to IMS client capability, to look at which part of applications must be performed in the mobile device and the computationally intensive part that could be executed by the cloud. Involvement of medical professionals and users [6] K. Yang, S. Ou., On Effective Offloading Services for Resource-Constrained Mobile Devices Running Heavier Mobile Internet Applications. IEEE Communication Magazine, pp.53 63, January [7] S. Beji, N. E. Kadhi, An Overview of Mobile Applications Architecture and the Associated Technologies, The 4 th Intern. Conference on Wireless and Mobile Communications, pp , July [8] F. Mekuria, Issues in Mobile Broadband Networks & Services. Proc. of the IEEE Mobile for Development, M4D2008, 10-12, Dec. 2008, Karlstad, Sweden. [9] Armbrust et.al., Above the clouds: A Berkeley View of cloud compuring. February 10, [10] K. Rikitaki,et.al Ubiquitous Health Monitoring System, in Proc. of the 6 th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Las Vegas, Nevada, USA, Jan [11] The open IMS core project: [12] S.Loreto, et.al. IMS service development API and Test-bed IEEE Communications Magazine, April Pp [13] M. Weitzel, et. Al, A web 2.0 model for patient centered health informatics applications. IEEE Computer Magazine, July [14] M.T. Nkosi, F. Mekuria, Mobile Government for Improved Service Delivery., Proceedings of IST-Africa 2010, May, 2010, Durban, South Africa.
An Evaluation of Architectures for IMS Based Video Conferencing
An Evaluation of Architectures for IMS Based Video Conferencing Richard Spiers, Neco Ventura University of Cape Town Rondebosch South Africa Abstract The IP Multimedia Subsystem is an architectural framework
Mobile Broadband Technology & Services: Sustainability Factors
Mobile Broadband Technology & Services: Sustainability Factors Fisseha Mekuria (PhD.) CSIR Modelling and Digital Sciences, Mobile Computing Platforms. Pretoria 0001, South Africa. [email protected] Abstract:
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Service Delivery Platforms for Network Operators
Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza [email protected] UCT Department of Computer Science Abstract:
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
How To Build A Cloud Cloud For A Carrier (Nec)
White Paper Carrier Cloud Carrier-centric, Carrier-grade and Founded on IT and Network Innovation NEC Corporation http://www.nec.com/ Carrier Cloud Table of Contents 1. Acquiring New Value Chains with
Third Party Data Session Control in the Evolved Packet System
Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA [email protected]
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS
International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
A business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Enterprise Resource Planning System Deployment on Mobile Cloud Computing
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.3, No.1 (2013), pp. 1-8 http://dx.doi.org/10.14257/ajmscahs.2013.06.02 Enterprise Resource Planning System
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
OPTIMIZED CONSUMPTION AND ACCESS OF REMOTE DISPLAY ON MOBILE DEVICE ENVIRONMENT
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 2, Feb 2014, 167-174 Impact Journals OPTIMIZED CONSUMPTION AND
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK GEARING THE RESOURCE POOR MOBILE DEVICES INTO RESOURCEFULL BY USING THE MOBILE
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure
SIP Roaming Server Product Overview. Mobile Convergence Technology
SIP Roaming Server Product Overview Mobile Convergence Technology CONNECTING NETW ORKS Roam, Talk and Text (without a Mobile Network) By interworking with existing communications infrastructures, Session
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
A Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Service Broker Function in IMS Architecture - Issues and Considerations
12th WSE International Conference on COMPUTERS, Heraklion, Greece, July 23-25, 2008 Function in IMS Architecture - Issues and Considerations HUI-NA CHUA, CHOR-MIN TAN Malaysian Research Centre, British
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures
4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud
Converged Private Networks. Supporting voice and business-critical applications across multiple sites
Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected]
Mobile Cloud Computing Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected] Mobile Computing Rapid progress of mobile computing have become a powerful trend in the
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
Mobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
HMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core
Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core T. Magedanz, P. Weik, D. Vingarzan, F. Carvalho de Gouveia, S.
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
VAS ConSolidAtion, VirtuAliSAtion And the Cloud Pieter oonk, ProduCt MAnAger
VAS Consolidation, Virtualisation and The Cloud Pieter Oonk, Product Manager Executive Summary Over the past decade, computing power and the bandwidth to deliver it have become extraordinarily efficient,
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
BENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
Understanding CIC Compensation Filters
Understanding CIC Compensation Filters April 2007, ver. 1.0 Application Note 455 Introduction f The cascaded integrator-comb (CIC) filter is a class of hardware-efficient linear phase finite impulse response
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Service Continuity Path to smooth user experiences
Path to smooth user experiences Qualcomm Incorporated June 2010 Table of Contents [1] Introduction... 2 [2] Architecture... 3 [3] Use case... 4 [4] Conclusion... 6 06/2010 Page i [1] Introduction Qualcomm
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
A DESIGN OF DSPIC BASED SIGNAL MONITORING AND PROCESSING SYSTEM
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2009 : 9 : 1 (921-927) A DESIGN OF DSPIC BASED SIGNAL MONITORING AND PROCESSING SYSTEM Salih ARSLAN 1 Koray KÖSE
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
A General Framework for Tracking Objects in a Multi-Camera Environment
A General Framework for Tracking Objects in a Multi-Camera Environment Karlene Nguyen, Gavin Yeung, Soheil Ghiasi, Majid Sarrafzadeh {karlene, gavin, soheil, majid}@cs.ucla.edu Abstract We present a framework
Keywords Cloud Environment, Cloud Testing, Software Testing
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Software Testing
UPnP Control Point for Mobile Phones in Residential Networks
1 UPnP Control Point for Mobile Phones in Residential Networks Andreas Häber 1, Frank Reichert 2, and Andreas Fasbender 3 Abstract Together, Ericsson and HiA are studying the role of WiFi-enabled mobile
