The emergence of the Internet of Things (IoT) and the advantages of Mobile Cloud Computing (MCC) have drawn a big absorption from technological experts. This paper investigates the integration of IoT and MCC by introducing the service architecture towards the applications of mobile devices, sensors and Cloud computing. The proposed approach not only presents the cutting edge convergence between IoT and MCC but also focuses on the smart home scenario to answer the question what the benefits are, coming from the integration of IoT and MCC. A developmental process of DropLock architecture dedicated to Smart City is also presented to demonstrate this convergence.
Taking full advantage of the availability of Cloud computing facilities, Mobile Cloud Computing (MCC) is becoming more and more popular as an element of mobile technology. This availability enables mobile users to use the cloud infrastructure to overcome the limitations of mobile technology; namely limited data storage, processing power and battery life. With the increasing use of mobile cloud computing, security issues remain a challenge. This paper investigates some available trusted platforms in order to pinpoint the question on how to secure the MCC under trusted platforms. This investigation comprises an overview of the security aspects of Trusted Platforms including Secure Elements (SE), Host Card Emulation (HCE), Trusted Execution Environment (TEE), and Trusted Platform Module (TPM). In addition, it shows how these platforms can be suitable for securing mobile Cloud computing.
Mobile Cloud Computing (MCC) is an emerging and popular mobile technology which uses fully available Cloud Computing services and functionalities. This technology provides rich computational services to the users, network operators and Cloud service providers as well. However due to users mobility and high computational operations, consumption of energy is a major issue. Energy efficiency over MCC is needed since 57% of generated energy is used by ICT related devices and other negative impacts over environment. This paper investigates different mobile Cloud computing architectures and their performance over energy efficiency by examining different approaches: OSGi, overlay, and container based solutions.
The surge of the presence of personal mobile devices in multi-environment makes a significant attention to the mobile cloud computing (MCC). Along with this concern, security issues also appear as a barrier to prevent the propagation of this trend. This paper focuses on an important feature in many security protocols and application, which is the device attestation in the MCC.The existing remote attestation mechanisms are currently used in trusted computing environment such as binary attestation and property-based attestation. In this paper, by taking advantage of the combination of technologies and trends, such as trusted platform module, cloud computing, and bring your own device, we introduce property-based token attestation to secure the mobile user in the enterprise cloud environment. In order to accomplish a secure MCC environment, security threats need to be studied and acted accordingly, and therefore, we first represent the common threats and then explain a novel attestation schema for addressing these threats by providing security proofs. In addition, Scyther is in use to verify the correctness of our protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.