Mobile Cloud Computing: Advantages, Disadvantages, and Implementation

Verified

Added on  2023/06/05

|8
|2201
|438
Report
AI Summary
This report provides a comprehensive overview of mobile cloud computing, discussing its fundamental concepts, advantages, and disadvantages. It explores different types of cloud computing, including public, private, and hybrid clouds, and examines the infrastructure, layers, and network examples within mobile cloud computing. The report also delves into the strengths and weaknesses of cloud-based services, covering aspects such as battery life extension, performance improvement, security concerns, and potential vulnerabilities. It highlights the challenges faced by mobile communication applications and discusses the data analysis methods used to understand the implementation of cloud computing in organizations. The conclusion emphasizes the growing importance of mobile cloud computing and suggests measures to mitigate security risks and enhance privacy.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cloud Computing
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD COMPUTING
1
Introduction
Mobile cloud computing is well-defined as
a modern tool for smartphone facilities and
it enable cloud based services into various
smart phones [1]. It is s computer resource
which provide a backup plan to consumers
and rapid progress of cloud computing
become a powerful trend in the arena of
information technology. The main goal of
this report is to recognize the fundamental
concept of cloud computing and their
advantages and disadvantages [2].
However, this type of technology faced
different challenges for example,
bandwidth issue, server issue, and security
problem. Cloud computing is an modern
and next generation of commuting
Infrastructure and it provide infrastructure
services to their consumers like servers,
networks and storage elements. According
to the research article, the use of mobile
cloud computing is increasing very fast
because it improves the bandwidth and
size of storage. This research paper
delivers a survey of mobile cloud
technology which can help to gather
knowledge in the field of the cloud. This
report explained overview of cloud
computing technology and challenges
faced by cloud based services. There are
many organizations which are providing
this type of services for example, Google,
Amazon, and sales force at very low price
by which many users can adopt this system
[3].
Overview of cloud computing
The term cloud computing is latest
innovation in the sector of processor
science and many mobile communities re
providing this prepress in smart phones. It
is an attracting option for business
industries which can reduce the running
cost of any mobile application. MCC is
defined as mobile cloud computing
process which is a part of infrastructure
system where documents storing and data
dispensation both processes are done
outside the mobile phone [4]. It is a new
platform to produce more effective
processing system outside the mobile and
many organizations uses this technology as
a backup plan. It is used to deliver
different types of services such as storage,
database system, networking, and
software. The main advantage of this
technology is that bit is more flexible
rather that other computer networks [5].
There are main three types of cloud
computing used for example, public, and
private and hybrid. Public types of clouds
are operated by third party services
providers that transfer their computer
networks and resources over the internet.
Document Page
CLOUD COMPUTING
2
Microsoft Azure and amazon web services
both are best example of public cloud
system and in which all software’s,
hardware’s, and other infrastructure
services are controlled and monitored by
third party sellers. Private clouds are
defined as computing resources which are
used by a single organization or business
industry. Some of organization also pays
to third party sellers to host their private
cloud computing technology and it is a
network in which both infrastructure and
services are controllers by using a private
network [6]. Hybrid cloud is a mixture of
private and public which is sued to share
data or information from one device to
another. In mobile cloud computing
strategies are linked to various networks
with the help of base station and data links.
There are main four layers used in cloud
computing for example, software as a
service, platform as a service,
infrastructure as a service and data centres.
Data centre layer
The main persistence of this layer is to
provide the infrastructure and hardware
facility for cloud computing. In which a
large amounts of headwaiters are
interconnected with high-speed data
systems to deliver various facilities.
IaaS layer
It is defined as infrastructure as a service
which is constructed on highest of data
centre and it enable the provision of data
storage, servers, networking equipment’s
and various hardware’s [8]. In which
clients pays according to their ability and
third party sellers provide this type of
services to consumers. Amazon elastic
cloud computing and simple storage
services bath are very best example of
IaaS.
PaaS layer
It is a platform as a service that delivers
modern assimilated services for testing and
organizing user interface applications.
There are few examples of this network
layer such as Google App engine, Amazon
web services and Map reduce and
Microsoft Azure [7].
SaaS layer
Software as a Service underpins a product
dispersion with specific provisions. In this
layer, the customers can get to a
solicitation and data remotely over the
Internet. Microsoft's Live Mesh
additionally permits sharing records and
envelopes over various gadgets at the same
time.
Document Page
CLOUD COMPUTING
3
Strength of cloud computing
There are many benefits of cloud based
services which are described below:
Extending batter life
More efficient and increase
performance of computer networks
Improving reliability
Ease to understand
Very cheap and simple process
More secure
Disadvantages of cloud computing
Down time
Security and privacy issue
Vulnerability to attack
Limited control
Vendor lock-in
Maintenance cost is very high
Research method
The research methodology will involve
various kinds of strategies and methods
which can be used in this research paper.
There are many research methods for
example, design method, data collection
method and survey method [9]. The main
purposes of these research strategies are to
improve the effectiveness of this journal
paper and researcher can resolve
challenges and issues by using data
analysis process.
Research design
In this article qualitative data analysis
method is used and author described the
working principle of cloud based services.
Qualitative data method provide
theoretical information about cloud
computing and it also helps to understand
Implementation of cloud computing in
business. Researcher used this process to
gather data or information about mobile
cloud computing and author can achieve
the objective of this research.
Research Strategy
In this research, the data or information
will be stored with the help of a survey in
order to gather significance of cloud
computing in mobile devices. This survey
also involve definition concept of cloud
computing, their architecture, and
applications [10]. This research design will
also provide a way to collect first hand
data and relevant information regarding
this topic and Microsoft word can be used
to prepare a report on cloud technology.
The theoretical data about cloud
computing will be collected by various
location for example, literature review,
journals, books and online websites.
Data collection method
In the research report secondary data
methods are used to collect relevant
information about this topic. The
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD COMPUTING
4
secondary data is stored from different
articles, books, academic publications and
government websites [3]. Secondary data
is used as it aided to understand that cloud
computing and many organization uses
this technology to enhance their productive
and performance.
Data Analysis
The data analysis process is used by author
to describe both primary and secondary
data to find the pattern of cloud
computing. There are many other data
analysis techniques by which people can
analysis data or information regarding
cloud computing such as content analysis,
discloser analysis process, and statistical
analysis method. In this research paper,
author used content analysis technique to
find the reason for implementation of
cloud computing for any organizations.
This process is also helped to achieve the
goal and reach at a valid outcome [11].
Finding
In this research paper it is founded that
cloud computing technology can helps to
enhance the batter life time and it also
reduce the power consumption problem. It
is observed that security is single problem
for cloud technology and author founded
that many customers use simple password
based system that can be easily hacker by
attackers [9]. Due to which consumers and
organization can lose their privacy and
personal information like account details
and pictures. First precedent is the
Amazon Simple Storage Service which
underpins document stockpiling
administration. Another precedent is
Image Trade which uses the huge storage
room in mists for portable clients.
Issues highlighted by the authors
The mobile communication applications
are faced different kinds of challenges for
example; lose bandwidth, less secure
computer networks, complexity of mobile
servers, and lack of security. To reduce all
these issues information technology was
developed new technology which is called
as cloud computing [12]. Therefore, this
technique improved overall efficiency of
mobile networks and it also helped to
increase productivity of an organization.
The main issue occur with cloud
computing is that it is very limited
technology by which all users will not able
to adopt this process.
Conclusion
In this modern generation cloud computing
is very famous technology because it
reduces issue of flexibility and cyber-
attacks. Mobile cloud computing is
growing very fast due to which many users
move towards the smart phones and the
Document Page
CLOUD COMPUTING
5
rate of cloud service is increased by 30%.
There are many third party organizations
which provide this type of services such as
Google, and Microsoft, and Amazon. This
report explained the importance of cloud in
the sector of mobile communication and
their strength and weakness. Therefore,
consumers should adopt biometric
recognition system to reduce cyber-attacks
and security risks associated with this
technology. Organizations should use their
private cloud network by which they can
enhance their privacy and employees
should use backup plan for their personal
data or information.
Document Page
CLOUD COMPUTING
6
References
1. M., Ali, S.U. Khan and, A.V.,
Vasilakos. “Security in cloud
computing: Opportunities and
challenges.” Information
sciences, 305, pp.357-383, 2015.
2. M.G., Avram. “Advantages and
challenges of adopting cloud
computing from an enterprise
perspective.” Procedia
Technology, 12, pp.529-534, 2014.
3. A., Botta, W., Donato, V. Persico
and, A., Pescapé. “Integration of
cloud computing and internet of
things: a survey.” Future
Generation Computer Systems, 56,
pp.684-700, 2016.
4. X., Chen. “Decentralized
computation offloading game for
mobile cloud computing.” IEEE
Transactions on Parallel and
Distributed Systems, 26(4), pp.974-
983, 2015.
5. X., Chen, L., Jiao, W. Li and, X.,
Fu. “Efficient multi-user
computation offloading for mobile-
edge cloud
computing.” IEEE/ACM
Transactions on Networking, (5),
pp.2795-2808, 2016.
6. K., Gai, M., Qiu, H., Zhao, L. Tao
and, Z., Zong. “Dynamic energy-
aware cloudlet-based mobile cloud
computing model for green
computing.” Journal of Network
and Computer Applications, 59,
pp.46-54, 2016.
7. H., Dinh, C., Lee, D., Niyato, and
P. Wang. “A survey of mobile
cloud computing: architecture,
applications, and approaches.”
WIRELESS COMMUNICATIONS
AND MOBILE COMPUTING,
15(2), pp. 1587-1611, 2011.
8. I.A.T., Hashem, I., Yaqoob, N.B.,
Anuar, S., Mokhtar, A. Gani and,
S.U., Khan. “The rise of “big data”
on cloud computing: Review and
open research issues.” Information
Systems, 47, pp.98-115, 2015.
9. J., Li, J., Li, X., Chen, C. Jia and,
W., Lou. “Identity-based
encryption with outsourced
revocation in cloud
computing.” Ieee Transactions on
computers, 64(2), pp.425-437,
2015.
10. Z., Sanaei, S., Abolfazli, A. Gani
and, R., Buyya. “Heterogeneity in
mobile cloud computing: taxonomy
and open challenges.” IEEE
Communications Surveys &
Tutorials, 16(1), pp.369-392, 2014.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD COMPUTING
7
11. Z., Xia, X., Wang, L., Zhang, Z.,
Qin, X. Sun and, K., Ren. “A
privacy-preserving and copy-
deterrence content-based image
retrieval scheme in cloud
computing.” IEEE Transactions on
Information Forensics and
Security, 11(11), pp.2594-2608,
2016.
12. Q., Yan, F.R., Yu, Q. Gong and J.,
Li. “Software-defined networking
(SDN) and distributed denial of
service (DDoS) attacks in cloud
computing environments: A
survey, some research issues, and
challenges.” IEEE
Communications Surveys &
Tutorials, 18(1), pp.602-622, 2016.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]