Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues

作者: Nazanin Aminzadeh , Zohreh Sanaei , Siti Hafizah Ab Hamid

DOI: 10.1016/J.SIMPAT.2014.05.009

关键词:

摘要: Worldwide employment of mobile devices in various critical domains, particularly healthcare, disaster recovery, and education has revolutionized data generation rate. However, rapidly rising volume intensifies storage battery limitations devices. Mobile Cloud Computing (MCC) as the state-of-the-art computing aims to augment by leveraging infinite cloud resources provide unlimited capabilities with energy-dissipation prevention. Researchers have already surveyed varied MCC aspects its challenges, but successful futuristic Storage Augmentation (MSA) approaches demand deep insight into current augmentation solutions that highlights which are lacking. This paper thoroughly investigates main MSA issues three domains computing, present a taxonomy. Also, it examines several credible mechanisms MCC, classifies characteristics cloud-based resources, presents open direct future research.

参考文章(60)
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park, MiSC: A New Availability Remote Storage System for Mobile Appliance Networking - ICN 2005. ,vol. 3421, pp. 504- 520 ,(2005) , 10.1007/978-3-540-31957-3_60
Zhibin Zhou, Dijiang Huang, Efficient and secure data storage operations for mobile cloud computing conference on network and service management. pp. 37- 45 ,(2012) , 10.5555/2499406.2499411
Behrouz Jedari, Feng Xia, A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks arXiv: Networking and Internet Architecture. ,(2013) , 10.1109/SURV.2014.022714.00153
MinHwan Ok, Daegeun Kim, Myong-soon Park, UbiqStor: a remote storage service for mobile devices parallel and distributed computing applications and technologies. ,vol. 3320, pp. 685- 688 ,(2004) , 10.1007/978-3-540-30501-9_132
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou, Enabling public verifiability and data dynamics for storage security in cloud computing european symposium on research in computer security. pp. 355- 370 ,(2009) , 10.1007/978-3-642-04444-1_22
Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan Clarke, Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) Security and Communication Networks. ,vol. 6, pp. 1087- 1116 ,(2013) , 10.1002/SEC.673
Fernando Pedone, Rachid Guerraoui, André Schiper, The Database State Machine Approach Distributed and Parallel Databases. ,vol. 14, pp. 71- 98 ,(2003) , 10.1023/A:1022887812188
R. K. Panta, R. Jana, F. Cheng, Y.-F. R. Chen, V. A. Vaishampayan, Phoenix: Storage Using an Autonomous Mobile Infrastructure IEEE Transactions on Parallel and Distributed Systems. ,vol. 24, pp. 1863- 1873 ,(2013) , 10.1109/TPDS.2013.84
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001
Patrick Stuedi, Iqbal Mohomed, Doug Terry, None, WhereStore: location-based data storage for mobile devices interacting with the cloud mobile cloud computing & services. pp. 1- 8 ,(2010) , 10.1145/1810931.1810932