You are on page 1of 6

MOBILE CLOUD COMPUTING

Authors
Name: Ekanath M. Patil & Aparna D. Kulkarni
th
7 sem- CSE
Hirasugar Institute of Technology, Nidasoshi
Email Id: ekanathl@gmail.com aparna2128@gmail.com
Mob: 9008616346 9008124392

I. INTRODUCTION
A. About cloud computing
Abstract - The term "cloud computing" is being hyped about a lot
these days, mainly in the context of the "future of the web." Cloud
computing refers to a style of computing where online resources and
applications are accessed by users through a Web browser, but the
actual software and data are stored on remote servers (or “big
computers”). Users don’t need to purchase, manage or maintain the
technology "in the cloud" that supports them. In this paper, we focus
on mobile cloud computing, the newest application of cloud
computing, which is recently seeing explosive adoption, since the
capabilities of mobile devices are enhanced by moving the computing
power and data storage away from mobile phones and into the cloud.

Smartphones enable a new, rich user experience but their hardware


is still very limited in terms of computation, memory, and energy
reserves, thus limiting potential applications. Here we present a
novel architecture that addresses these challenges by partially off-
loading execution from the smartphone to a computational
infrastructure hosting a cloud of smartphone clones. When the
smartphone needs to perform CPU-intensive tasks or tasks that drain
the battery, it connects to its clone on the server, and lets the clone
do the heavy lifting. All the smartphone has to do now is to wait for
the results to be returned.

We outline new augmented execution opportunities for smartphones


enabled by Intel’s CloneCloud architecture.

We also address the related security issues, the fast emerging


applications. Lastly, we also elucidate the advantages of mobile
cloud computing against the conventional cloud computing.
Cloud computing, one of the new buzz words, allows to store today still do most of the data storage and processing on the
files and folders in a “cloud” mobile devices themselves and not in the cloud. In a few
years, that could change.

II. OVERVIEW OF MOBILE CLOUD COMPUTING


Smartphones with Internet access, GPS, sensors and various
applications are recently seeing explosive adoption like the
Apple iPhone , Blackberry smartphones, and the Google
Android phone. In a slightly more advanced capability bracket
also lie mobile Internet devices (MIDs) such as the Nokia
N810 and Moblin-based devices that provide a richer
unethered Internet experience.
The problem with mobile phones is that everyone wants them
to work like a regular computers despite lesser hardware
specifications. However, the nature of the phones’ hardware
still limits them when it comes to sheer processing power. And
the more work the phone has to do on its own, the quicker its
battery life gets eaten up.
Although, solutions for all the problems like memory
area on the Internet, allowing access to all the files and folders leaks, sucking up power by runaway processes, malicious
wherever in the world – but with the help of Internet to access intrusions, private data disclosure etc are frequently
it. With cloud computing, information can be stored implemented in traditional desktop and server platforms, this
permanently on the internet in huge servers and cached on is yet to be developed for the mobile applications. Alas, such
desktops, table computers, notebooks, monitors, handhelds solutions tend to be expensive when cast to mobile
etc. on a temporary basis. architectures.
Table 1 : Specifications of a few high-end smartphones. Their
Let’s discover what changes will it make in our mobile life. network connectivities include Wi-Fi, UMTS, WCDMA,
HSDPA, GSM/GPRS/EDGE, and Bluetooth 2.0.
Cloud computing is being looked at as extremely powerful
because of its ability to perform tens of trillions of
Phone CPU RAM Battery (talk time
computations every second and this is huge when you
(MHz) (MB) in hrs)
compare it to the most powerful desktop PC, which can
process about 3 billion computations in a second. Experts IPhone 3G 412 512 5
believe that it soon people will be using cloud computing just Android HTC 528 192 6
as they do electricity and other utilities, only paying for what G1
they used. There will be no limitation on processing and Blackberry 624 128 4.5
computational power as its all is the cloud. But a cloud is Bold
different from conventional server these days.

B. "Mobile Cloud Computing”: an application

“Basically, it refers to an infrastructure where both the data TABLE 2: Specification of a commodity laptop and a desktop.
storage and the data processing happen outside of the mobile
device.”Some good examples of mobile cloud computing Computer CPU RAM
applications including mobile Gmail, Google Maps, and some MacBook Pro Laptop 2.5GHz 2-core 4GB
navigation applications. However, the majority of applications
Dell Precision T7400 3.3GHz 4-core 8GB
Their connectivities include 1Gbps Ethernet and Wi-Fi, and
they are frequently powered from the electric grid.

The hardware capabilities of those devices are similar to those


of the desktop PCs of the mid-1990’s, many generations of
hardware and software behind (see Table 1 and contrast to
Table 2).
The above tables describes vast disparity between the Platforms Volantis (content adaptation)
hardware specifications of the latest versions of mobile
devices and computers. Development Eclipse Foundation (manages the
tools Eclipse IDE, used as the basis for
III. WHY MOBILE CLOUD COMPUTING? Nokia’s Carbide, Wind River tools and
many others). Plus RhoMobile – a new
With a Western-centric view of the world, everyone owns a
set of open source developer tools for
smartphone or a feature phone. And it's their very existence
creating connected enterprise apps on
which will
smartphones.
help drive
the mobile Industry Symbian Foundation (EPL license),
cloud initiatives Open Handset Alliance (APL2 license),
computing LiMo Foundation (open source as it
trend. builds on top of Linux), GNOME
Not only is Mobile and Embedded (LGPL-licensed
there a GTK+ and related software)
broader
audience
using feature phones in the world, there are also more web
developers capable of building mobile web applications than Intel’s Clone Cloud research aims to make it
there are developers for any other type of mobile device. possible to execute rich applications on resource - constrained
Those factors, combined with the fact that feature phones mobile devices by off-loading computation to available cloud
themselves are becoming more capable with smarter built-in resources in nearby data centers.
web browsers (and more alternative browsers available for
download), will have an impact on mobile cloud V. CLONE IN A CLOUD, A CONCEPT OF MOBILE
computing's growth. CLOUD COMPUTING

IV. REQUIREMENTS OF THE MOBILE DEVICES:


Clone Cloud uses a smart phone’s high-speed connection to
the Internet to communicate with a copy of itself
Linux support Wind River (also one of the most
packages prominent integrators for mobile Linux
stacks), MontaVista
Operating for feature phones: Purple Labs; for
systems smartphones: Azingo, Access Linux
Platform, A la Mobile, OpenMoko; for
MIDs: Intel Moblin, Ubuntu Mobile.
Also OKL4 is virtualisation (hypervisor)
software for mobile phones.
Middleware GNOME’s GTK+ and related projects
(e.g. D-Bus, Gstreamer), the graphics
subsystem of Nokia’s Qt and the db4o
database engine.
Application Google’s Android, Nokia’s Maemo,
environments Nokia’s Qt, Eclipse eRCP, Sun’s Java
phone ME, Motorola’s Java MIDP3,
AOL’s Open Mobile Platform and
Nokia’s Web Runtime that lives in a cloud-computing environment on remote servers
Browsers Apple’s WebKit (on the verge of in the cloud. It is a new service that uses cloud computing to
becoming a de facto standard for web- provide extra processing power for mobile phones. It does so
centric service delivery) and Firefox on an execution engine that augments the smartphone’s
Mobile capabilities by seamlessly off-loading some tasks to a nearby
computer, where they are executed in a cloned whole-system
Service deliv. Funambol (consumer email sync), image of the device, reintegrating the results in the
smartphone’s execution upon completion. This augmented
execution overcomes smartphone hardware limitations and it
is provided (semi)-automatically to applications whose
developers need few or no modifications to their applications.

A. Augmented smart-phone applications through clone


cloud execution:

Augmented execution is categorized into the following types.


(Figure 2).

a) Primary functionality
outsourcing:
Computation hungry applications such as speech processing,
video indexing, and super-resolution are automatically split,
so that the user-interface and other low-octane processing is
retained at the smartphone, while the high-power, expensive
computation is off-loaded to the infrastructure, synchronously.
b) Background augmentation:
Unlike primary functionality outsourcing, this category deals
with functionality that does not need to interact with users in a
short time scale. This functionality typically happens in the Conceptually, this system provides a way to boost a
background, such as scanning the file system for viruses is off- smartphone application by utilizing heterogeneous computing
loaded and acts as virtual client. Even when the smartphone is platforms through cloning and computation transformation.
turned off, the virtual client continues to run background tasks. For doing so, our system (semi)-automatically transforms a
Later when the smartphone returns online, it synchronizes its single-machine execution (e.g., smartphone computation) into
state with the infrastructure. a distributed execution (e.g., smartphone plus cloud
c) Mainline augmentation: computation) in which the resource-intensive part of the
This category sits between primary functionality outsourcing execution is run in powerful clones. Figure 3 illustrates the
and background augmentation. Here the user may choose to high-level system model of our approach.
run a particular application in a wrapped fashion, altering the
method of its execution but not its semantics. Example is
Figure 3: The system transforms a single-machine execution
private-data leak detection. Unlike background augmentation,
(smartphone computation) into a distributed execution
mainline augmentation is interspersed in the execution of the
(smartphone and cloud computation)(semi)automatically.
application.
Augmented execution is performed in four steps:
d) Hardware augmentation: 1) Initially, a clone of the smartphone is created within the
This category is interesting because it compensates for cloud (laptop, desktop, or server nodes);
fundamental weaknesses of the smartphone platform, such as 2) The state of the primary (phone) and the clone is
memory capabilities or other constraints, and hardware periodically or on-demand synchronized; 3) Application
peculiarities. Just using faster hardware significant savings can augmentations (whole applications or augmented pieces of
be observed even while thrashing. applications) are executed in the clone, automatically or upon
e) Augmentation through request; and 4) Results from clone execution are re-integrated
multiplicity: back into the smartphone state.
The last category we consider is unique as it uses multiple Figure 4 Shows clone execution architecture for smartphones.
copies of the system image executed in different ways. This We achieve this by combining whole-system replication
can help running data parallel applications (e.g., doing through incremental checkpointing, (semi)-automatic
indexing for disjoint sets of images). This can also help the partitioning and invocation of augmented execution, and
application to “see the future,” by exhaustively exploring all coordination of computation between the primary (phone) and
possible next steps within some small horizon—as would be the clone. The system components are running inside the
done for model checking—or to evaluate in maximum detail operating system (OS). The Replicator is in charge of
all possible choices for a decision before making that decision. synchronizing the changes

B. Clone cloud Architecture:


in phone software and state to the clone. The Controller d) One of the most popular mobile applications among
running in the smartphone invokes an augmented execution these users during these initial years will be the
and merges its results back to the smartphone. It interacts with navigation applications (ex. gmaps).
the Replicator to synchronize states while coordinating the
augmentation. The Augmenter running in the clone manages A. Applications of mobile cloud computing in govt.
the local execution, and returns a result to the primary. sectors in U.S:
Once a computation block for remote execution is specified,
the following steps are performed for the primary functionality As stated in an August US Government Computer News
outsourcing augmentation category. article:-
First, the smartphone application process enters a sleep state. a) The U.S. Postal Service has equipped nearly 9,500
The process transfers its state to the clone VM. The VM senior and operational managers with BlackBerrys,
allocates a new process state and overlays what it received giving them access to real-time information and alerts
from the phone with hardware description translation. The they need to make decisions about services USPS
clone executes the complete computation block. The clone provides to the public.
transfers its process state back to the phone. The phone b) The Census Bureau has deployed the Microsoft
receives the process state and reintegrates it, and wakes up the Windows Mobile operating system on 140,000
sleeping process to continue its execution. handheld personal digital assistants that census
workers use during the decennial head count.
VI. SECURITY IN MOBILE CLOUD NETWORKS: c) Users of Army Knowledge Online (AKO) will be
able to access and send sensitive information through
A. Data encryption: a secure mobile platform using Windows Mobile
Encryption is a key technology for data security. The Web devices.
services APIs that you use to access the cloud, either
programmatically, or with clients provide SSL encryption for And......
access. Once the object arrives at the cloud, it is decrypted,
and stored. d) President Barack Obama, for whom security is
B. Access Controls: paramount, kept his BlackBerry after taking office —
Authentication and identity management is more important but not before it was locked down with strong
than ever. Using strong passwords, changing frequently, with encryption and security provisions to protect e-mail
typical IT security processes, that element of access can be and communications with his inner circle.
protected. In case the device is lost to avoid unauthorized
access device id or sim pin number can be used.
C. Taint checking
One approach, known as "private data disclosure detection" or
"taint checking," examines all of the variables in a program VIII ADVANTAGES:
that could be affected by inputs from outside sources, in order
to detect whether these inputs contain data inserted for a) Smartphones/mobile phones are likely to move to
malicious purposes. SaaS/PaaS faster than desktop computers due to the
D. Service Level Agreements (SLA) following reasons:
The service commitment offered by the provider decides Mobile phones consume much less power than desktop
security. computers.
b) Irreplaceable files are probably safer in a data centre than
VII. APPLICATIONS in the desktop when we consider the combined threats of
fire, theft, hard drive failure and good old user error.
A. Commercial applications c) There are more dominant mobile platforms than dominant
desktop platforms. J2ME + Symbian OS + iPhone OS +
a) Business users will benefit from collaboration and Blackberry OS + Windows Mobile + Android + [possibly,
data sharing applications. Palm WebOS] Vs Windows + Mac OS X + Linux. Thus,
b) An innovative application is the LiNK from Schlage for mobile phones market, it's more tempting to create a
which is a keyless lock system for the home that web app and instantly go cross-platform.
enables subscribers to remotely control not only the d) Mobile broadband networks evolve much faster than
door lock, but heating/cooling, security cameras and landlines, especially in third world countries.
light monitors, all via PC or mobile device. e) Mobile browsers evolve faster than their desktop
c) Personal users will gain from remote access counterparts.
applications allowing them to share photos and video f) CloneCloud can do a lot more work a lot faster than the
or incorporate their phone address books and phone itself.
calendars.
g) If the smartphone is lost or destroyed, the clone can. be [1] www.readwriteweb.com
used as a backup.
h) One of the biggest benefits reaped is device independence [2] www.computingunplugged.com
achieved.
[3] www.abiresearch.com

IX MAJOR PLAYERS IN THE MOBILE [4] www.intel.research.com


CLOUD COMPUTING ARENA :
B. International Papers:
A. Google( Android )
[1] Augmented Smartphone Applications Through Clone
B. Motorola’s Motoblur
Cloud Execution By Byung-Gon Chun, Petros Maniatis from
C. Amazon Web Services
Intel Research Berkeley.
D. Intel
E. Soonr
[2] B. Cully et al. Remus: High availability via asynchronous
virtual machine replication. In NSDI, 2008.
X CONCLUSION:
[3] Rudenko, P. Reiher, G. J. Popek, and G. H. Kuenning.
Saving portable computer battery power through remote
When applied to mobile, Cloud Computing is ushering in a process execution. MCCR, 1998.
new future for Internet-based computing. It will allow for
increased collaboration through open APIs, and access to [4] M. Satyanarayanan et al. Pervasive personal computing in
research, analysis, mobile marketing services, and software an internet sus-pend/resume system. IEEE Internet
services without investing in IT. In a few years, this will Computing, 2007.
enable a true focus on the customer and the brand. Although
the mobile devices have hardware constraints and [5] Cloud Computing & related Security issues, a project
computational limitations, these can be overcome by using the report written by Traian Andrei.
cloud computing technology. CloneCloud uses nearby
computers or data centers to speed up your smart phone
applications, bringing the power of the cloud computing to
your fingertips.

Best of all, CloneCloud calculates what it can do faster than


the phone itself AFTER taking into consideration not only
time, but battery life also. This is a pretty exciting
development in the mobile world that could make for some
substantial changes for our Smart phones and the way we can
use them.

Based on their study, ABI Research forecasts that the number


of mobile cloud computing subscribers worldwide will grow
rapidly over the next five years, rising from 42.8 million
subscribers in 2009 to over 998 million in 2014 – from the
current 1.1 percent of all mobile subscribers to about 19
percent.
VIII. ACKNOWLEDGEMENT
We are grateful to the organizers of “paanchajanya09” for
providing us the platform to explore our skills and gain
knowledge. Also we are thankful to our college and CSE Dept.
to support us whenever we needed it.

IX. REFERENCES:

A. Websites:

You might also like