SMCACC: Developing an Efficient Dynamic Secure Framework for Mobile Capabilities Augmentation Using Cloud Computing

Faculty Computer Science Year: 2019
Type of Publication: ZU Hosted Pages: 120214 - 120237
Authors:
Journal: IEEE ACCESS IEEE Volume: 7
Keywords : SMCACC: Developing , Efficient Dynamic Secure Framework    
Abstract:
Mobile capability development increases with the need to use it. However, mobile devices still lack computational resources. Mobile cloud computing is the solution to overcome these challenges. Extensive research has been conducted to solve these problems, and a large number of new techniques were developed. Many of these researches solve the resource problem by partitioning and offloading applications to the cloud to tap its full computational and storage availability. Other methods involve offloading part of the applications while retaining the rest for processing on the smartphone - the decision making in these techniques based on metrics such as power and CPU consumption. Also, small numbers of available solutions consider security issues. This paper proposed a new elastic framework named secure framework for mobile capabilities augmentation using cloud computing (SMCACC) that enables transparent use of cloud resources to augment the capabilities of resource-constrained mobile devices. A significant feature of this framework is the partition of a single application into multiple components. Mobile apps can be executed on the mobile device itself or offloaded to the cloud clone for execution. Thus, the elastic application can augment the capabilities of a mobile device to save energy for a mobile device. Besides, a hybrid cryptography method is used to secure data and take energy consumption in the considerations. The new proposed security protocols use a combination of both symmetric and asymmetric cryptographic techniques to avoids the disadvantages of the existing hybrid protocols. These methods help to protect users by securing data that offloaded to the cloud. The results of this framework without security show the resources consumed for executing the application on mobile and cloud are decreased approximately to half of the memory consumed for running app on the mobile-only. According to the security framework, the resources consumed for executing the application on mobile still decreased.
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet