2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)最新文献

筛选
英文 中文
Model-Driven Approach to Hadoop Deployment in Cloud 模型驱动的Hadoop云部署方法
Zheyi Chen, Tao Xiang, Xing Chen
{"title":"Model-Driven Approach to Hadoop Deployment in Cloud","authors":"Zheyi Chen, Tao Xiang, Xing Chen","doi":"10.1109/MobileCloud.2017.10","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.10","url":null,"abstract":"Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches lie in environment configuration and parameter setting of deployment, they do not take into account diversification of infrastructure and scalability issues in cloud. In order to quickly customize, deploy and expand Hadoop services according to the demand, a model-driven approach to Hadoop deployment is proposed in the paper. Firstly, Hadoop demand and deployment models are presented. Secondly, the transformation method from the demand model to the deployment model is proposed. Thirdly, the bidirectional synchronization between Hadoop deployment model and running system is realized based on runtime model.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131586674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modular Approach for Smart Home System Architectures Based on Android Applications 基于Android应用的智能家居系统架构模块化方法
Markus Schinle, Johannes Schneider, T. Bloecher, Jochen Zimmermann, S. Chiriac, W. Stork
{"title":"A Modular Approach for Smart Home System Architectures Based on Android Applications","authors":"Markus Schinle, Johannes Schneider, T. Bloecher, Jochen Zimmermann, S. Chiriac, W. Stork","doi":"10.1109/MobileCloud.2017.20","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.20","url":null,"abstract":"European market size for smart home systems is expected to grow by 20% to over 4.3 billion USD by 2017. This growth is mainly due to the development of luxury and premium markets towards a mass market. In 2014, more than one billion mobile devices with Google's operating system Android were sold, which resulted in a market share of more than 80%. Thus, mobile devices have already reached the mass market. The main idea behind this work is the reuse of mobile devices as smart home systems to reduce market entry barrier for end users and to contribute to a more holistic use of mobile devices. Therefore, we developed a modular architecture concept for smart home systems based on Android devices. In order to ensure the usefulness of this concept, the characteristics of existing systems and the potential of mobile devices were taken into account. Our primary goal was the development of a generic software architecture for various smart home applications. Therefore, we present a plugin framework concept that allows modular system design. Our framework is implemented by using components without modifying the Android operating system itself.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sensing Interpolation Strategies for a Mobile Crowdsensing Platform 移动众测平台的传感插值策略
M. Girolami, S. Chessa, G. Adami, M. Dragone, L. Foschini
{"title":"Sensing Interpolation Strategies for a Mobile Crowdsensing Platform","authors":"M. Girolami, S. Chessa, G. Adami, M. Dragone, L. Foschini","doi":"10.1109/MobileCloud.2017.8","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.8","url":null,"abstract":"Mobile Crowd Sensing (MCS) allows an efficient collection of heterogeneous data over large areas, leveraging on the cooperation of MCS subscribers that offer services on their smartphones to this purpose. However, the coverage that a MCS platform can provide for a given area depends on the availability of subscribers and on their mobility in that area. To guarantee a better coverage, a MCS platform may employ a combination of static and mobile sensors and interpolation strategies that may provide meaningful data for all the area under observation. We discuss how two mechanisms (mixing static and mobile sensors and interpolation) can be combined together by using the large-scale mobility datasets of ParticipAct and the Weather Underground dataset.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social Media Intermediation Robot for Elderly People Using External Cloud-Based Services 使用外部云服务的老年人社交媒体中介机器人
Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai
{"title":"Social Media Intermediation Robot for Elderly People Using External Cloud-Based Services","authors":"Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai","doi":"10.1109/MobileCloud.2017.18","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.18","url":null,"abstract":"Most of the existing elderly people watching services are belonging to the service category of a confirmation of elderly people's safety based on one-way communication from elderly people. Therefore, we propose a Social Media Intermediation Robot used for the interactive communication between elderly people and younger generation via existing social media. This robot system has been implemented on a single board computer embedded in a human-type robot, which is equipped with a microphone, camera, speaker, sensors, and network access function, so that elderly people can retrieve and transmit information by voice via social media without using smart phones. We made clear a human interaction-type user interface, which enables elderly people to have communication just like talking with a receptionist. We also designed the Social Media Intermediation Robot based on the service-oriented architecture that enables us easily to use open innovation like external cloud-based services. We developed the prototype system. Then, we confirmed the effectiveness of the prototype system in the viewpoints of user interface and system availability from the perspective of the total system performance including external cloud-based services.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mobile Cloud Computing: Security Analysis 移动云计算:安全分析
Amina Gamlo, Ning Zhang, O. Bamasag
{"title":"Mobile Cloud Computing: Security Analysis","authors":"Amina Gamlo, Ning Zhang, O. Bamasag","doi":"10.1109/MobileCloud.2017.27","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.27","url":null,"abstract":"This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one Client. The two scenarios focus on Authentication. Based on the use-case scenarios, the paper presents a generic model for M2C with a description of entities and interactions among them. Based on this model, the paper analyzes potential security threats, in order to specify a set of general security requirements, with an emphasis on Authentication. These requirements could provide guidance to future security solutions or Authentication solutions for M2C communication and/or risk assessment.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Augmented Resource Allocation Framework for Disaster Response Coordination in Mobile Cloud Environments 移动云环境中灾害响应协调的增强资源分配框架
Luke M. Guerdan, Olivia Apperson, P. Calyam
{"title":"Augmented Resource Allocation Framework for Disaster Response Coordination in Mobile Cloud Environments","authors":"Luke M. Guerdan, Olivia Apperson, P. Calyam","doi":"10.1109/MobileCloud.2017.34","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.34","url":null,"abstract":"In disaster scenarios requiring real-time response to multiple incidents in a limited period of time, the importance of efficient allocation of resources such as paramedics and supplies becomes crucial. Yet, this need is often complicated by the dynamic nature of emergencies, with differing levels of patient priority and accessibility, unknown degrees of communication and computation infrastructure damage, and varying numbers of available responders all contributing to the complexity of the situation. We present Augmented Resource Allocation (ARA), a new framework for efficiently managing responders, supplies, and resources during disaster scenarios within a mobile cloud environment. Our framework leverages human knowledge of the situation, existing dynamic routing algorithms, and centralized information storage at the mobile edge network to augment disaster response coordination. Finally, we apply our ARA methodology in a real-world mobile cloud computing application viz., Panacea's Cloud, and use experiments and simulations to show how we streamline information flows for disaster response coordination.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113947283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things HSC-IoT:一种基于软硬件协同验证的物联网认证方案
M. Hossain, S. Noor, Ragib Hasan
{"title":"HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things","authors":"M. Hossain, S. Noor, Ragib Hasan","doi":"10.1109/MobileCloud.2017.35","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.35","url":null,"abstract":"The Internet of Things (IoT) have become popular in diverse domains because of their accessibility and mobility as well as cost-efficient manufacturing, deployment, and maintenance process. The widespread deployment of IoT devices makes them an attractive target for an attacker trying to gain unauthorized access to an IoT-based system. An adversary clones a real hardware device or compromises embedded software to impersonate a legitimate device, and thus gains unauthorized access to sensitive information and performs security-critical operations. The existing security schemes for the mobile systems cannot be applied directly to an IoT-enabled infrastructure since devices are resource constrained regarding storage, processing power, and communication bandwidth. Additionally, the current security approaches for the IoT systems are unable to identify physically compromised IoT devices. In this paper, we propose HSC-IoT, a resource-efficient Physical Unclonable Function (PUF)-based security protocol that ensures both software and hardware integrity of IoT devices. HSC-IoT also provides a lightweight mutual authentication scheme for the resource-limited devices based on Elliptic Curve Cryptography. We present a detailed analysis of the security strength of HSC-IoT. We implemented a prototype of HSC-IoT on IoT devices powered by Contiki OS and provided an extensive comparative analysis of HSC-IoT with contemporary IoT security protocols.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems 面向物联网系统的移动云分层信任管理协议
Jia Guo, I. Chen, J. Tsai
{"title":"A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems","authors":"Jia Guo, I. Chen, J. Tsai","doi":"10.1109/MobileCloud.2017.13","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.13","url":null,"abstract":"We propose and analyze a 3-tier cloud-cloudlet-device hierarchical trust management protocol called IoT-HiTrust for large-scale IoT systems. Our mobile cloud hierarchical trust management protocol allows an IoT device to report its service experiences and query the trustworthiness of another IoT device for service composition and selection following a simple localized report-and-query paradigm. We verify IoT-HiTrust's conver-gence, accuracy, and resiliency properties against self-promotion, discriminatory, bad-mouthing, ballot-stuffing, and opportunistic service attacks despite intermittent network disconnection to the cloud.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Mobile-Based Location Tracking without Internet Connectivity Using Cloud Computing Environment 基于云计算环境的移动位置跟踪
Q. B. Hani, Julius P. Ditcher
{"title":"Mobile-Based Location Tracking without Internet Connectivity Using Cloud Computing Environment","authors":"Q. B. Hani, Julius P. Ditcher","doi":"10.1109/MobileCloud.2017.29","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.29","url":null,"abstract":"With emergence of the smartphone, peoplegain access to several applications that make their workeasier. Likewise, one of the top trended app searcheswhich we do is location tracking or accessing location ofthe other user in the cloud computing environment. Inrecent past, these accesses are done without user'sknowledge and accord. In this paper, we present thestudy about runtime location access of users in the cloudcomputing environment. With this, we have thepossibility of the location accessibility of users both viaonline as well as offline. Our main goal is to get users'location for safety purpose. Through the online, we haveseveral apps which show the user's location but not mucheffective. We introduce the novel Mobile-Based LocationTracking without Internet (MLTWI). Our approachtracks the location of the user by applying latitude andlongitude information. The latitude and longitudeinformation are collected using our designed latitude andlongitude (LL) algorithm. Based on the realexperimental tests and simulation results, we validatedthat our scheme outperforms to known approaches.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132727453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An iBeacon Training App for Indoor Fingerprinting iBeacon室内指纹识别培训应用
G. H. Flores, Thomas D. Griffin, D. Jadav
{"title":"An iBeacon Training App for Indoor Fingerprinting","authors":"G. H. Flores, Thomas D. Griffin, D. Jadav","doi":"10.1109/MobileCloud.2017.33","DOIUrl":"https://doi.org/10.1109/MobileCloud.2017.33","url":null,"abstract":"Indoor positioning systems have become widely available due to the increased number of wireless technologies available today. A type of wireless device that has become very popular in the past years has been the Bluetooth Low Energy (BLE) beacon. This compact, battery-powered device can enable location-based and proximity services across in-door spaces. Several indoor positioning techniques have been explored to achieve indoor localization using these wireless devices. One of these techniques is the fingerprinting technique, which requires careful collection of training data at known locations. We developed an app to facilitate and expedite the process of collecting training data with iOS devices. The training data is collected by our app and saved in the cloud for future retrieval. We collected training data from different floor maps, performed initial analysis on this data, and tested a fingerprinting algorithm in order to provide indoor localization. We developed several tools to evaluate and visualize the training data and tested our indoor localization algorithm in a real-time scenario.","PeriodicalId":106143,"journal":{"name":"2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信