An Efficient and Secured Framework for Mobile Cloud Computing

  • Ibrahim A. Elgendy
  • , Wei Zhe Zhang*
  • , Chuan Yi Liu
  • , Ching Hsien Hsu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

63 Scopus citations

Abstract

Smartphone devices are widely used in our daily lives. However, these devices exhibit limitations, such as short battery lifetime, limited computation power, small memory size and unpredictable network connectivity. Therefore, numerous solutions have been proposed to mitigate these limitations and extend the battery lifetime with the use of the offloading technique. In this paper, a novel framework is proposed to offload intensive computation tasks from the mobile device to the cloud. This framework uses an optimization model to determine the offloading decision dynamically based on four main parameters, namely, energy consumption, CPU utilization, execution time, and memory usage. In addition, a new security layer is provided to protect the transferred data in the cloud from any attack. The experimental results showed that the framework can select a suitable offloading decision for different types of mobile application tasks while achieving significant performance improvement. Moreover, different from previous techniques, the framework can protect application data from any threat.

Original languageEnglish
Article number8387470
Pages (from-to)79-87
Number of pages9
JournalIEEE Transactions on Cloud Computing
Volume9
Issue number1
DOIs
StatePublished - 1 Jan 2021
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2013 IEEE.

Keywords

  • Smartphones
  • computation offloading
  • mobile cloud computing
  • particle swarm optimization
  • security

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An Efficient and Secured Framework for Mobile Cloud Computing'. Together they form a unique fingerprint.

Cite this