Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P120 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P120
Providing Cloud Services over Mobile Cloud Data
Sruthi Tammana, Sri Rashmi Matta, Dr.S.Satyanarayana
Citation :
Sruthi Tammana, Sri Rashmi Matta, Dr.S.Satyanarayana, "Providing Cloud Services over Mobile Cloud Data," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 536-538, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P120
Abstract
In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices as service nodes, e.g sensing services. The sensed information, such as location coordinates, health related information, should be processed and stored in a secure fashion to protect user`s privacy in the cloud. To this end, we present a new mobile cloud data processing framework through trust management and private data isolation. Finally, an implementation pilot for improving teenagers driving safety, which is called Focus Drive, is presented to demonstrate the solution.
Keywords
Mobile Computing, Mobile cloud infrastructure, Mobile Cloud Service, Malware Detection, RF Algorithm
References
[1] C. Dwork, “The Differential Privacy Frontier Extended Abstact,”Proc. 6th Theory of Cryptography,Springer,2009.
[2] White, Mark “Machine Learning-lecture Slides, Fall 2005.
[3] E. Naone, “The Slow-Motion Internet,” Technology Rev.Apr. 2011;
[4] I. Burguera, U. Zurutuza and S. NadjmTehrani, "Crowdroid: Behaviorbased malware detection system for android", Proceedings of the 1st workshop on Security and privacy in smartphones and mobile devices(SPSM’11), New York, NY, USA, October 17, 2011.
[5] E. E. Marinelli, "Hyrax: cloud computing on mobile devices using MapRecuce", a Mater Thesis, CMU-CS-09-164, Carnegie Mellon University, September, 2009 which is available in Url:http://reportsarchive.adm.cs.cmu.edu/anon/200 9/CMU-CS-09-164.pdf.
[6] H. Dee, D. Hogg, Detecting inexplicable behaviour, in: British Machine Vision Conference, 2004, pp. 477–486.
[7] A. Dempster, N. Laird, D. Rubin, Maximumlikelihood from incomplete data via the EM algorithm, Journal of the Royal Statistical Society B 39 (1977) 1–38
[8] Z. Zhou, D. Huang, Efficient and Secure Data Storage Operations for Mobile Cloud Computing, IACR Cryptology ePrint Archive: 185 (2011).
[9] Distributed Intrusion Detection in Clouds Using Mobile Agents, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.