Providing Cloud Services over Mobile Cloud Data
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - April Issue 2013 by IJCTT Journal|
|Volume-4 Issue-4 |
|Year of Publication : 2013|
|Authors :Sruthi Tammana, Sri Rashmi Matta, Dr.S.Satyanarayana|
Sruthi Tammana, Sri Rashmi Matta, Dr.S.Satyanarayana "Providing Cloud Services over Mobile Cloud Data"International Journal of Computer Trends and Technology (IJCTT),V4(4):536-538 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices as service nodes, e.g sensing services. The sensed information, such as location coordinates, health related information, should be processed and stored in a secure fashion to protect user`s privacy in the cloud. To this end, we present a new mobile cloud data processing framework through trust management and private data isolation. Finally, an implementation pilot for improving teenagers driving safety, which is called Focus Drive, is presented to demonstrate the solution.
 C. Dwork, “The Differential Privacy Frontier Extended Abstact,”Proc. 6th Theory of Cryptography,Springer,2009.
 White, Mark “Machine Learning-lecture Slides, Fall 2005. New York, NY, USA, October 17, 2011.
 E. E. Marinelli, "Hyrax: cloud computing on mobile devices using MapRecuce", a Mater Thesis, CMU-CS-09-164, Carnegie Mellon University, September, 2009 which is available in Url:http://reportsarchive.adm.cs.cmu.edu/anon/200 9/CMU-CS-09-164.pdf.
 H. Dee, D. Hogg, Detecting inexplicable behaviour, in: British Machine Vision Conference, 2004, pp. 477–486
Keywords — Mobile Computing, Mobile cloud infrastructure, Mobile Cloud Service, Malware Detection, RF Algorithm