2015
DOI: 10.1016/j.simpat.2014.05.009
|View full text |Cite
|
Sign up to set email alerts
|

Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(11 citation statements)
references
References 49 publications
0
11
0
Order By: Relevance
“…Thus, many studies have modified the routing protocols of MANETs for adopting into VANETs. VANETs are considered a unique type of MANETs and exhibit different features, such as dynamic topological changes, frequent network disconnections, tight delay bounds, no energy limitation issues, geographic-based communication capability, and specific mobility modelling following a road topology [20, 21]. The stability and efficiency of the route are the key design metrics of VANET routing protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, many studies have modified the routing protocols of MANETs for adopting into VANETs. VANETs are considered a unique type of MANETs and exhibit different features, such as dynamic topological changes, frequent network disconnections, tight delay bounds, no energy limitation issues, geographic-based communication capability, and specific mobility modelling following a road topology [20, 21]. The stability and efficiency of the route are the key design metrics of VANET routing protocols.…”
Section: Related Workmentioning
confidence: 99%
“…A comprehensive survey has been done on augmented storage solutions for MCC applications [10]. Existing storage augmentation solutions of MCC applications, such as Pheonix, E-DRM, EECRS, offer high energy efficiency and context awareness in data storage and access management.…”
Section: Limitations Of Existing Workmentioning
confidence: 99%
“…These solutions offer restrictive access using strict policies such as write-once-read-many and do not validate the authenticity for each access request. The lack of authentication makes these solutions less secure in facilitating privacy-sensitive data access [10]. Strong password based authentications are proposed for pervasive applications [11].…”
Section: Limitations Of Existing Workmentioning
confidence: 99%
“…With advancements in technology, Cloud computing enabled support to mobile devices so that the Mobile Cloud Computing [3] was created. Because of the limited hardware resources in mobile devices, even in technological advances, resource-intensive applications runs very slowly while draining batteries faster.…”
Section: Introductionmentioning
confidence: 99%