Distributed System Framework for Mobile Cloud Computing

Similar documents
Central Controller Framework for Mobile Cloud Computing

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

Kusum Lata, Sugandha Sharma

SURVEY PAPER ON CLOUD COMPUTING

A Case Study on Cloud Based Hybrid Adaptive Mobile Streaming: Performance Evaluation

Multi Packed Security Addressing Challenges in Cloud Computing

Association of Cloud Computing in IOT

A Survey on Energy aware offloading Techniques for Mobile Cloud Computing

High Performance Computing Cloud - a PaaS Perspective

DEEP DIVE INTO CLOUD COMPUTING

Simulation of Cloud Computing Environments with CloudSim

An Efficient Architecture for Resource Provisioning in Fog Computing

CHEM-E Process Automation and Information Systems: Applications

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

Mobile Computation Dynamic Offloading using Cloud

Assistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

Load Balancing Algorithms in Cloud Computing: A Comparative Study

Granted: The Cloud comes with security and continuity...

A Load Balancing Approach to Minimize the Resource Wastage in Cloud Computing

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment

Cloud Based Framework for Rich Mobile Application

Global Journal of Engineering Science and Research Management

QoS aware Multimedia Cloud Computing A Survey

Load Balancing in Cloud Computing System

Mobile Cloud Computing: Issues, Challenges and Future Trends

CES: A FRAMEWORK FOR EFFICIENT INFRASTRUCTURE UTILIZATION THROUGH CLOUD ELASTICITY AS A SERVICE (CES)

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Research on Digital Library Platform Based on Cloud Computing

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Parameter Sweeping Programming Model in Aneka on Data Mining Applications

Business Strategy Theatre

Cooperative collaboration between Municipalities using public GIS

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Self Destruction Of Data On Cloud Computing

The Community Library Anniance Based on Cloud Computing

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

Introduction to Cloud Computing and Virtual Resource Management. Jian Tang Syracuse University

Efficient Task Scheduling Algorithms for Cloud Computing Environment

Achieving End-to-End Security in the Internet of Things (IoT)

Figure 1: Virtualization

Experimental Model for Load Balancing in Cloud Computing Using Equally Spread Current Execution Load Algorithm

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Core of Cloud Computing

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

SEVONE END USER EXPERIENCE

Cloud Computing introduction

Case Study: Deployment of Amazon Web Services to Fuel innovation in Multimedia Applications

API TESTING TOOL IN CLOUD

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Network Services, Cloud Computing and Virtualization

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

Introduction To Cloud Computing

Data Centers and Cloud Computing

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Science Computing Clouds.

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo

Securing Cloud Computing

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

ISSN Vol.03,Issue.37 November-2014, Pages:

Why the cloud matters?

BUT HOW DID THE CLOUD AS WE KNOW IT COME TO BE AND WHERE IS IT GOING?

A Methodology for Assigning Access Control to Public Clouds

Keywords: Cloud, Load balancing, Servers, Nodes, Resources

Market Trends in Public Cloud Storage

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

SEVONE DATA APPLIANCE FOR EUE

Mitigating Risks with Cloud Computing Dan Reis

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

MASERGY S MANAGED SD-WAN

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

RG-WLAN Series Access Point. Web-Based Configuration Guide, Release 11.1(5)B3

Computer Life (CPL) ISSN: Simulation and Implementation of Cloud Computing Based on CloudSim

Cloud Computing. Luigi Santangelo Department of Computer Engineering University of Pavia

Integrated IoT and Cloud Environment for Fingerprint Recognition

retail Free popcorn today cinema All food 20% off women s clothing counter food court

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

DDOS Attack Prevention Technique in Cloud

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014

CTO s cloud(y) agenda Clouds on CTO s heaven?

Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

DYNAMIC LOAD BALANCING FOR CLOUD PARTITION IN PUBLIC CLOUD MODEL USING VISTA SCHEDULER ALGORITHM

Danish Cloud Maturity Survey 2018

CLOUD COMPUTING-ISSUES AND CHALLENGES

Efficient Message Caching Scheme for MANET

Transcription:

Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey Abstract--- Today s global computing environment involves the vital role of the mobile cloud computing. Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks which brings rich computational resources to mobile users, network operators, as well as cloud computing providers. So its main goal is to provide the user rich experience. Now-a-day s smart phones are facing problem like slow online speed, space insufficiency (small memory), and lower stand by time. So this problem can be overcome by placing alternating solution like placing power full battery and speed can be improved by connecting the device through blue tooth or any other wireless devices and in the cloud network the basic problem is the higher response time of nodes while performing data communication operation through co-operative cache [1]. This dominant problem can be overcome by applying the distributed system as a hub in the star topology. The distributed system is used as a central controller of the star topology. Any one of the controller among the distributed system keeps track of the status of all other devices during the communication and that device will share the status among the other entire device within its own system and it use the passive scan over the device for the communication. Another basic issue in the cloud storage is that it is not able to provide security to the data stored and accessed from it and not able to prevent from the hacker so it can be overcome by using KF sensor. [Using distributed system will efficiently maintain the failure of device without data loss]. Keywords--- Mobile Cloud Computing, Co-operative Cache, Star Topology Network, Central Controller, KF sensor. I. INTRODUCTION Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device[2]. Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and distributed computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client [2]. Mobile devices face many resource challenges (battery life, storage, bandwidth etc.) Cloud computing offers advantages to users by allowing them to use infrastructure, platforms and software by cloud providers at low cost and elastically in an on-demand fashion [2]. Mobile cloud computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive computing can be performed in the cloud [2]. A. MCC Popularity According to a recent study by ABI Research, more than 240 million businesses will use cloud services through mobile devices by 2015. That traction will push the revenue of mobile cloud computing to $5.2 billion. Mobile cloud computing is a highly promising trend for the future of mobile computing. Many security issues are there as different technologies including networks, databases, operating systems, virtualization, resource scheduling, transaction management, load balancing, concurrency control and memory management are used in cloud computing. Some of the security issues include data isolation, browser security, malware, flooding attack, privacy, data integrity, and protection of DATA [3]. 1. Problem for Low Battery Life of Mobile Devices K. Arul Jothy, Final Year CSE, Department of Computer Science and India.E-mail:aruljothy22@gmail.com K. Sivakumar, Assistant Professor, Department of Computer Science and India.E-mail:sivakumar.karuppan@gmail.com M.J. Delsey, Assistant Professor, Department of Computer Science and India.E-mail:delsey217@gmail.com DOI:10.9756/BIJRCE.8357 Figure 1: Low Battery Problem

Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 6 2. Problem for Small Size of Mobile Devices Figure 2: Small Size Problem B. Mobile Cloud Computing Architecture In Mobile Cloud Computing (MCC) architecture Mobile devices are connected to the mobile networks via base stations that establish and control the connections and functional interfaces between the networks and mobile devices. Mobile users requests and information are transmitted to the central processors that are connected to servers providing mobile network services. The subscribers requests are delivered to a cloud through the Internet. In the cloud, cloud controllers process the requests to provide mobile users with the corresponding cloud services [3]. a) IAAS: IAAS provides storage, hardware, servers and networking components to the user. For example elastic cloud of Amazon [2]. b) PAAS: PAAS provides an environment of parallel programming design, testing etc. For example Google App engine [2]. c) SAAS: SAAS provides some applications that can be used via Internet and is paid according to the usage. For example Google Online Office [2]. II. DEPLOYMENT MODELS a) Public Cloud: A type of cloud in which the cloud services are delivered over a network which is open for public usage [2]. b) Private Cloud: A type of cloud that is implemented on a cloud-based secure environment that is safeguarded by a firewall. Private cloud as it permits only the authorized users can use the data [2]. c) Community Cloud: A type of cloud in which the setup is mutually shared between many organizations that belong to a particular community [2]. d) Hybrid Cloud: A type of cloud which is integrated. It can be an arrangement of two or more cloud servers, i.e. private, public or community cloud that is bound together but remain individual entities [2]. A. WLAN Scanning Process a) Active Scan: In Active Scanning a station finds out network rather than waiting for network to announce its availability to all the stations. Figure 3: MCC Architecture C. Star Topology Network In a star topology, each device has a dedicated point to point link only to a central controller, usually called a hub. The devices are not directly linked to each other. Figure 6: Active Scanning Process b) Passive Scan: In Passive Scanning, WLAN station moves to each channel as per channel list and waits for beacon frames. All these frames are buffered and are used to decode and extract information about base stations. D. Cloud Service Hierarchy Figure 4: Star Topology Network Figure 5: Cloud Service Hierarchy Figure 7: Passive Scanning Process B. KF Sensor KF sensor is the intrusion detection system, Which act as a honeypot to attract and detect hackers or the other unauthorized user by creating a virtual vulnerable system and services.

Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 7 III. PROPOSED WORK The work proposed along with the distributed system over MCC is use to overcome the various issues faced by it. The Limitations of today s smart phones are mainly of smaller size and low battery life. While typing on mobile devices, it often creates problem due to small size of typing pad in mobile device. To overcome the problem of the size, the mobile phone can be used via touchpad device connected through WIFI hotspot. A touchpad device can be used, where processor and storage both will be in the mobile device but virtually we can use the touchpad while typing in mobile devices. The touchpad device can be useful while travelling in vehicles. Even many more touchpad devices can be used to get the benefit of parallel computing in a single mobile device. Second problem is low battery life of mobile devices. To overcome this problem low battery can be replaced by a powerful battery as required for the mobile device so that it can provide backup for at least 3-4 day. In this case cost will increase but the performance, battery backup, user attractiveness will also increase. In cloud computing, instead of co-operative caching one of the devices can be chosen as a central device called Distributed Controller that keeps track of the status of all the other devices connected with it using a star topology network. During this time the Central Controller [Distributed system] scan passively all the devices dynamically to get the current status about storage whereas a device need to store any data will perform an active scan over the Central Controller [Distributed system] to know the status of all other devices. As soon as, it gets the information it will proceed directly onto that particular device to store the data. Thus Response time and efficiency can both be effective and valuable for future course. And while storing and retrieving the information from the cloud the security for the data is not provided. The hackers can easily access the data from the cloud. In order to overcome this security issue we can use the KF sensor in between user node and the cloud. So the KF sensor will categorize the authorized user and the unauthorized user (hacker) to monitor the activity. When unauthorized user access the network to collect the data it will monitor the hacker activity and it does not allow them to access the data or the resource from the cloud. The KF sensor will block the hacker to access the data from the cloud. IV. ALGORITHM 1. A finite set of nodes S= {N1, N2, N3,...} 2. Central Controller [distributed system] (N) is connected with all the nodes present in set S using star topology network. 3. Central Controller [distributed system] (N) runs a passive scan over all other devices dynamically to achieve information about the status all the devices connected with it and always keep updated information. 4. A node Ni (i=1,2,3,4,5,...)want to store the data to any other device Nj (j=1,2,3,4,5,...where j i) runs an active scan over Central Controller (N) to achieve the information about the status of rest other devices. 5. When the status of all the nodes were obtained, the node that want to store the data will directly choose the node having large storage space and it store the data within that node. 6. Continue step 4 and 5 until data communication over. And the secure communication can be provided with the KF sensor. 7. End KF SENSOR NODE 1 (HACKER) Not allowed to hack CLOUD DATABASE NODE 2 (AUTHORIZED USER) I NTERN ET NODE 3 (AUTHORIZED USER) Figure 8: Distributed System Model with Cloud Infrastructure

Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 8 START [ Connect Central Controller using Star Topology Network Central Controller keeps track of rest other devices by running a passive scan A node perform active scan over Central Controller to get the current status of all other devices Check whether a node having maximum free storage space The device directly allocate data to that particular device [ End Not found Figure 9: Flowchart of Central Controller Concept V. CONCLUSION The distributed system as a centralized controller in star topology with the MCC will increase the performance of the mobile device and the battery power of the mobile device. A touchpad device can be used with smart phones via wireless network to overcome the problem of typing in the mobile device. This topology will increase the storage efficiency of the mobile device using the cloud infrastructure. The security of the data stored in the cloud provided with the KF sensor. So all the factor combined together to increase the efficiency of the mobile device and satisfy the user experience in mobile device in higher level. ACKNOWLEDGEMENT I am thankful to Prof. K. Sivakumar and Delsey M J for them guidance and support to pursue this work. REFERENCES [1] P. Theresa Joy and K. Poulose Jacob, Cooperative Caching Framework for Mobile Cloud Computing, Global Journals Inc.(USA), Version 1.0, Vol. 13, No. 8, 2013. [2] S. Shafique Qureshi, Mobile Cloud Computing as a Future for Mobile Applications-Implementation methods and Challenging Issues, Proc. of IEEE CCIS, 2011. [3] P. Bhal, Advancing the state of mobile cloud computing, Proceedings of the Third ACM workshop on Mobile Cloud Computing and services, Pp. 21-28, 2012. [4] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, Cloud Computing and emerging IT platforms: Vision, hype, and reality for

Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 9 delivering computing as the 5th utility, Future Generation Computer Systems, Vol. 25, Pp. 599-616, 2009. [5] J. Han, W. Susilo and Y. Mu, Identity-based data storage in cloud computing, Future Generation Computer Systems, Vol. 29, Pp. 673-681, 2013. [6] A. Kumar, World of Computing and Security, International journal of Cloud Computing and Services Science, Vol. 1, No. 2, Pp. 53-58, 2012. [7] P. Zhang Zhao, G. Cao and C. R. Das, Cooperative caching in wireless P2P networks: design, implementation and evaluation, IEEE Trans Parallel Distributed Syst., Vol. 21, No. 2, Pp. 229-241, 2010.