메뉴 건너뛰기




Volumn 80, Issue 4, 2015, Pages 1607-1623

A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges

Author keywords

Cloud computing; Mobile cloud applications; Mobile cloud computing; Mobile computing

Indexed keywords

CLOUD COMPUTING; MOBILE COMPUTING; SURVEYS;

EID: 84925494226     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-014-2102-7     Document Type: Review
Times cited : (167)

References (109)
  • 3
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.
    • (2013) Wireless Communications and Mobile Computing , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 4
    • 84942917769 scopus 로고    scopus 로고
    • Introduction to the IEEE transactions on cloud computing
    • Buyya, R. (2014). Introduction to the IEEE transactions on cloud computing. IEEE Transactions on Cloud Computing, 1(1), 3–9.
    • (2014) IEEE Transactions on Cloud Computing , vol.1 , Issue.1 , pp. 3-9
    • Buyya, R.1
  • 5
    • 84966583232 scopus 로고    scopus 로고
    • The NIST definition of cloud computing. National Institute of Standards and Technology Std. 800–145
    • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology Std. 800–145, September 2011 [Online]. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.
    • (2011) September , vol.2011 , Issue.[Online]
    • Mell, P.1    Grance, T.2
  • 7
    • 78751620590 scopus 로고    scopus 로고
    • Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
    • Li, Y., & Chen, I. R. (2011). Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Transactions on Mobile Computing, 10(3), 349–361.
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , Issue.3 , pp. 349-361
    • Li, Y.1    Chen, I.R.2
  • 8
    • 84923224316 scopus 로고    scopus 로고
    • Toward scalable systems for big data analytics: A technology tutorial
    • Hu, H., Wen, Y., Chua, T. S., & Li, X. (2014). Toward scalable systems for big data analytics: A technology tutorial. IEEE Access, 2, 652–687.
    • (2014) IEEE Access , vol.2 , pp. 652-687
    • Hu, H.1    Wen, Y.2    Chua, T.S.3    Li, X.4
  • 12
    • 62949225623 scopus 로고    scopus 로고
    • Cloud computing and grid computing 360-degree compared. In Grid computing environments workshop
    • Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Grid computing environments workshop, November 2008, pp. 1–10.
    • (2008) November , vol.2008 , pp. 1-10
    • Foster, I.1    Zhao, Y.2    Raicu, I.3    Lu, S.4
  • 13
  • 15
    • 84866773563 scopus 로고    scopus 로고
    • A framework for partitioning and execution of data stream applications in mobile cloud computing. In IEEE 5th international conference on cloud computing
    • Yang, L., Cao, J., Tang, S., Li, T., & Chan, A. (2012) A framework for partitioning and execution of data stream applications in mobile cloud computing. In IEEE 5th international conference on cloud computing, June 2012, pp. 794–802.
    • (2012) June , vol.2012 , pp. 794-802
    • Yang, L.1    Cao, J.2    Tang, S.3    Li, T.4    Chan, A.5
  • 16
    • 77955183912 scopus 로고    scopus 로고
    • Access schemes for mobile cloud computing. In 2010 Eleventh international conference on mobile data management
    • Klein, A., Mannweiler, C., Schneider, J., & Schotten, H. D. (2010). Access schemes for mobile cloud computing. In 2010 Eleventh international conference on mobile data management, May 2010, pp. 387–392.
    • (2010) May , vol.2010 , pp. 387-392
    • Klein, A.1    Mannweiler, C.2    Schneider, J.3    Schotten, H.D.4
  • 17
    • 84864309803 scopus 로고    scopus 로고
    • Advancing the state of mobile cloud computing. In ACM workshop on Mobile cloud computing and services, New York, NY
    • Bahl, P., Han, R. Y., Li, L. E., & Satyanarayanan, M. (2012). Advancing the state of mobile cloud computing. In ACM workshop on Mobile cloud computing and services, New York, NY, USA, pp. 21–28.
    • (2012) USA , pp. 21-28
    • Bahl, P.1    Han, R.Y.2    Li, L.E.3    Satyanarayanan, M.4
  • 21
    • 84866627852 scopus 로고    scopus 로고
    • Yang, D., Xue, G., Fang, X., & Tang, J. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In ACM MobiCom
    • Yang, D., Xue, G., Fang, X., & Tang, J. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In ACM MobiCom.
  • 25
    • 84925526126 scopus 로고    scopus 로고
    • “Sensorly”. [Online]
    • “Sensorly”. [Online]. http://www.sensorly.com/.
  • 27
    • 84925526125 scopus 로고    scopus 로고
    • Herring, R., Hofleitner, A., Amin, S., Nasr, T., Khalek, A., Abbeel, P., et al. (2009). Using mobile phones to forecast arterial traffic through statistical learning. In Transportation research board
    • Herring, R., Hofleitner, A., Amin, S., Nasr, T., Khalek, A., Abbeel, P., et al. (2009). Using mobile phones to forecast arterial traffic through statistical learning. In Transportation research board.
  • 30
    • 84907214132 scopus 로고    scopus 로고
    • OmniSuggest: A ubiquitous cloud based context aware recommendation system for mobile social networks. IEEE Transactions on Services Computing
    • Khalid, O., Khan, M., Khan, S., & Zomaya, A. (2014). OmniSuggest: A ubiquitous cloud based context aware recommendation system for mobile social networks. IEEE Transactions on Services Computing. doi:10.1109/TSC.2013.53
    • (2014)
    • Khalid, O.1    Khan, M.2    Khan, S.3    Zomaya, A.4
  • 31
    • 84891558659 scopus 로고    scopus 로고
    • Cloud-based multicasting with feedback in mobile social networks
    • Wang, Y., Wu, J., & Yang, W. S. (2013). Cloud-based multicasting with feedback in mobile social networks. IEEE Transactions on Wireless Communications, 12(12), 6043–6053.
    • (2013) IEEE Transactions on Wireless Communications , vol.12 , Issue.12 , pp. 6043-6053
    • Wang, Y.1    Wu, J.2    Yang, W.S.3
  • 33
    • 84906821106 scopus 로고    scopus 로고
    • Cloud based solution for mobile healthcare application. ACM 18th international database engineering and applications symposium
    • Cimler, R., Matyska, J., & Sobeslav, V. (2014). Cloud based solution for mobile healthcare application. ACM 18th international database engineering and applications symposium, July 2014.
    • (2014) July , pp. 2014
    • Cimler, R.1    Matyska, J.2    Sobeslav, V.3
  • 37
    • 77957939324 scopus 로고    scopus 로고
    • A conceptual framework for provisioning context-aware mobile cloud services
    • La H., & Kim, S. (2010). A conceptual framework for provisioning context-aware mobile cloud services. In IEEE 3rd international conference on cloud computing, pp. 466–473.
    • (2010) In IEEE 3rd international conference on cloud computing , pp. 466-473
    • La, H.1    Kim, S.2
  • 39
    • 70350537372 scopus 로고    scopus 로고
    • From augmented reality to augmented computing: A look at cloud-mobile convergence. In International symposium on ubiquitous virtual reality
    • Luo, X. (2009). From augmented reality to augmented computing: A look at cloud-mobile convergence. In International symposium on ubiquitous virtual reality, July 2009, pp. 29–32.
    • (2009) July , vol.2009 , pp. 29-32
    • Luo, X.1
  • 40
    • 84883128081 scopus 로고    scopus 로고
    • Barbera, M. V., Kosta, S., Mei, A., & Stefa, J. (2013). To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. In IEEE INFOCOM 2013. Turin, Italy
    • Barbera, M. V., Kosta, S., Mei, A., & Stefa, J. (2013). To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. In IEEE INFOCOM 2013. Turin, Italy.
  • 41
    • 4544341180 scopus 로고    scopus 로고
    • The coign automatic distributed partitioning system
    • Hunt, G., Scott, M., et al. (1998). The coign automatic distributed partitioning system. ACM Operating Systems Review, 33, 187–200.
    • (1998) ACM Operating Systems Review , vol.33 , pp. 187-200
    • Hunt, G.1    Scott, M.2
  • 42
    • 70549113149 scopus 로고    scopus 로고
    • Calling the cloud: Enabling mobile phones as interfaces to cloud applications
    • Giurgiu, I., Riva, O., Juric, D., Krivulev, I., & Alonso, G. (2009). Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Middleware 2009, pp. 83–102.
    • (2009) In Middleware , vol.2009 , pp. 83-102
    • Giurgiu, I.1    Riva, O.2    Juric, D.3    Krivulev, I.4    Alonso, G.5
  • 43
    • 38549124877 scopus 로고    scopus 로고
    • Cooper, E., Lindley, S., Wadler, P., & Yallop, J. (2007). Links: Web programming without tiers. In Formal methods for components and objects (pp. 266–296). Berlin: Springer
    • Cooper, E., Lindley, S., Wadler, P., & Yallop, J. (2007). Links: Web programming without tiers. In Formal methods for components and objects (pp. 266–296). Berlin: Springer.
  • 46
    • 77954993714 scopus 로고    scopus 로고
    • Maui: Making smartphones last longer with ccode offload. In AMC international conference on Mobile systems, applications, and services, New York, NY
    • Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). Maui: Making smartphones last longer with ccode offload. In AMC international conference on Mobile systems, applications, and services, New York, NY, USA, pp. 49–62
    • (2010) USA , pp. 49-62
    • Cuervo, E.1    Balasubramanian, A.2    Cho, D.-K.3    Wolman, A.4    Saroiu, S.5    Chandra, R.6
  • 47
    • 84983734918 scopus 로고    scopus 로고
    • Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In Mobile computing, applications, and services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76, pp. 59–79). Berlin: Springer
    • Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In Mobile computing, applications, and services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76, pp. 59–79). Berlin: Springer.
  • 48
    • 84861596582 scopus 로고    scopus 로고
    • ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
    • Kosta, S., Aucinas, A., Hui, P., Mortier, R., & Zhang, X. (March 2012). ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In IEEE INFOCOM, pp. 945–953.
    • (2012) In IEEE INFOCOM , pp. 945-953
    • Kosta, S.1    Aucinas, A.2    Hui, P.3    Mortier, R.4    Zhang, X.5
  • 50
    • 20344383538 scopus 로고    scopus 로고
    • Resource-controlled remote execution to enhance wireless network applications. In Workshop on applications and services in wireless networks
    • Newhouse T., & Pasquale, J. (2004). Resource-controlled remote execution to enhance wireless network applications. In Workshop on applications and services in wireless networks, August 2004, pp. 30–38.
    • (2004) August , vol.2004 , pp. 30-38
    • Newhouse, T.1    Pasquale, J.2
  • 51
    • 84925526119 scopus 로고    scopus 로고
    • Cloud computing drives mobile data growth, October 2009. [Online]
    • Cloud computing drives mobile data growth, October 2009. [Online]. http://spectrum.ieee.org/telecom/wireless/cloud-computing-drives-mobile-data-growth.
  • 58
    • 84925526118 scopus 로고    scopus 로고
    • Int. cloud services platform beta location-based services, September 2012. [Online]
    • Int. cloud services platform beta location-based services, September 2012. [Online]. http://software.intel.com/en-us/articles/cloud-services-location-based-api-overview.
  • 59
    • 84925526117 scopus 로고    scopus 로고
    • AT&T to launch cloud-based lbs mobility data offering, January 2011. [Online]
    • AT&T to launch cloud-based lbs mobility data offering, January 2011. [Online]. http://www.mobilecommercedaily.com/att-to-launch-cloud-based-lbs-mobility-data-offering.
  • 60
    • 84904352038 scopus 로고    scopus 로고
    • Vision: Cloud and crowd assistance for GPS urban canyons
    • Tan, Z., Chu, D., & Zhong, L. (2014). Vision: Cloud and crowd assistance for GPS urban canyons. ACM Mobisys, pp. 23–27.
    • (2014) ACM Mobisys , pp. 23-27
    • Tan, Z.1    Chu, D.2    Zhong, L.3
  • 64
    • 84925526116 scopus 로고    scopus 로고
    • Rai, A., Bhagwan, R., & Guha, S. Generalized resource allocation for the cloud. In ACM symposium on cloud computing, pp. 15:1–15:12
    • Rai, A., Bhagwan, R., & Guha, S. Generalized resource allocation for the cloud. In ACM symposium on cloud computing, pp. 15:1–15:12.
  • 66
    • 84870557759 scopus 로고    scopus 로고
    • Tumanov, A., Cipar, J., Ganger, G. R., & Kozuch, M. A. (2012). alsched: Algebraic scheduling of mixed workloads in heterogeneous clouds. In ACM Symposium on Cloud Computing (pp. 1–7)
    • Tumanov, A., Cipar, J., Ganger, G. R., & Kozuch, M. A. (2012). alsched: Algebraic scheduling of mixed workloads in heterogeneous clouds. In ACM Symposium on Cloud Computing (pp. 1–7).
  • 70
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • Bonneau, J., Herley, C., van Oorschot, P., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE symposium on security and privacy, pp. 553–567.
    • (2012) In IEEE symposium on security and privacy , pp. 553-567
    • Bonneau, J.1    Herley, C.2    van Oorschot, P.3    Stajano, F.4
  • 72
    • 33750059168 scopus 로고    scopus 로고
    • Parno, B., Kuo, C., & Perrig, A. (2006). Phoolproof phishing prevention. In Financial cryptography and data security (pp. 1–19). International Financial Cryptography Association
    • Parno, B., Kuo, C., & Perrig, A. (2006). Phoolproof phishing prevention. In Financial cryptography and data security (pp. 1–19). International Financial Cryptography Association.
  • 73
    • 84925526013 scopus 로고    scopus 로고
    • Oauth2.0. [Online]
    • Oauth2.0. [Online]. http://oauth.net/2/.
  • 74
    • 84869401890 scopus 로고    scopus 로고
    • The devil is in the (implementation) details: An empirical analysis of oauth sso systems
    • Sun, S.-T., & Beznosov, K. (2012). The devil is in the (implementation) details: An empirical analysis of oauth sso systems. In ACM conference on Computer and communications security, pp. 378–390.
    • (2012) In ACM conference on Computer and communications security , pp. 378-390
    • Sun, S.-T.1    Beznosov, K.2
  • 75
    • 84866945970 scopus 로고    scopus 로고
    • Universally composable security analysis of oauth v2. 0. 0. Cryptology ePrint Archive, Report 2011/526, Tech
    • Chari, S., Jutla, C., & Roy, A. (2011). Universally composable security analysis of oauth v2. 0. 0. Cryptology ePrint Archive, Report 2011/526, Tech. Rep.
    • (2011) Rep
    • Chari, S.1    Jutla, C.2    Roy, A.3
  • 77
    • 84925526012 scopus 로고    scopus 로고
    • Oauth 2.0 (without signatures) is bad for the web. [Online]
    • Oauth 2.0 (without signatures) is bad for the web. [Online]. http://hueniverse.com/2010/09/oauth-2-0-without-signatures-is-bad-for-the-web/.
  • 78
    • 84892601932 scopus 로고    scopus 로고
    • Formal analysis of facebook connect single sign-on authentication protocol
    • Miculan, M., & Urban, C. (2011). Formal analysis of facebook connect single sign-on authentication protocol. In SOFSEM, Vol. 11, pp. 22–28.
    • (2011) In SOFSEM , vol.11 , pp. 22-28
    • Miculan, M.1    Urban, C.2
  • 79
    • 84925526011 scopus 로고    scopus 로고
    • Under the covers of oauth 2.0 at facebook. [Online]
    • Under the covers of oauth 2.0 at facebook. [Online]. http://www.sociallipstick.com/?p=239.
  • 80
    • 84925526010 scopus 로고    scopus 로고
    • Compromising twitter’s oauth security system. [Online]
    • Compromising twitter’s oauth security system. [Online]. http://www.immagic.com/eLibrary/ARCHIVES/GENERAL/GENPRESS/A090903P.
  • 82
    • 84867877581 scopus 로고    scopus 로고
    • Reliability analysis of wireless sensor networks with distributed code attestation
    • Chen, I., & Wang, Y. (2012). Reliability analysis of wireless sensor networks with distributed code attestation. IEEE Communications Letters, 16(10), 1640–1643.
    • (2012) IEEE Communications Letters , vol.16 , Issue.10 , pp. 1640-1643
    • Chen, I.1    Wang, Y.2
  • 88
    • 84863166234 scopus 로고    scopus 로고
    • A research of resource provider-oriented pricing mechanism based on game theory in cloud bank model
    • Li, H., & Li, H. (2011). A research of resource provider-oriented pricing mechanism based on game theory in cloud bank model. In IEEE international conference on cloud and service computing, pp. 126–130.
    • (2011) In IEEE international conference on cloud and service computing , pp. 126-130
    • Li, H.1    Li, H.2
  • 95
    • 85009167046 scopus 로고    scopus 로고
    • The TPR*-tree: an optimized spatio-temporal access method for predictive queries
    • Tao, Y., Papadias, D., & Sun, J. (2003). The TPR*-tree: an optimized spatio-temporal access method for predictive queries. In International conference on very large databases vol. 29, pp. 790–801.
    • (2003) In International conference on very large databases , vol.29 , pp. 790-801
    • Tao, Y.1    Papadias, D.2    Sun, J.3
  • 98
    • 73549113094 scopus 로고    scopus 로고
    • A taxonomy and survey of cloud computing systems. In IEEE international joint conference on INC
    • Rimal, B., Choi, E., & Lumb, I. (2009). A taxonomy and survey of cloud computing systems. In IEEE international joint conference on INC, IMS and IDC, pp. 44–51.
    • (2009) IMS and IDC , pp. 44-51
    • Rimal, B.1    Choi, E.2    Lumb, I.3
  • 100
    • 84925526009 scopus 로고    scopus 로고
    • Amazon EC2. [Online]
    • Amazon EC2. [Online]. http://aws.amazon.com/ec2/.
  • 101
    • 58149488760 scopus 로고    scopus 로고
    • Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
    • Yilmaz, O., & Chen, I. R. (2009). Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Computer Communications, 32(2), 317–323.
    • (2009) Computer Communications , vol.32 , Issue.2 , pp. 317-323
    • Yilmaz, O.1    Chen, I.R.2
  • 102
    • 33746659142 scopus 로고    scopus 로고
    • Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks
    • Chen, I. R., Yilmaz, O., & Yen, I. L. (2006). Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks. Wireless Personal Communications, 38(3), 357–376.
    • (2006) Wireless Personal Communications , vol.38 , Issue.3 , pp. 357-376
    • Chen, I.R.1    Yilmaz, O.2    Yen, I.L.3
  • 105
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In International Conference on Computational Science and Engineering
    • Cho, J.H., Swami, A., & Chen, I. R. (2009). Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In International Conference on Computational Science and Engineering, August 2009, pp. 641–650.
    • (2009) August , vol.2009 , pp. 641-650
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 106
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 1001-1012
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 107
    • 84862138560 scopus 로고    scopus 로고
    • Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183
    • Bao, F., Chen, I. R., Chang, M. J., & Cho, J. H. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.
  • 109
    • 84896101663 scopus 로고    scopus 로고
    • Dynamic trust management for delay tolerant networks and its application to secure routing
    • Chen, I. R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.5 , pp. 1200-1210
    • Chen, I.R.1    Bao, F.2    Chang, M.3    Cho, J.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.