{"title":"Organizing and Steering Committees","authors":"","doi":"10.1109/mobilecloud48802.2020.00007","DOIUrl":"https://doi.org/10.1109/mobilecloud48802.2020.00007","url":null,"abstract":"","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Van-Giang Nguyen, Karl-Johan Grinnemo, Jun Cheng, J. Taheri, A. Brunström
{"title":"On the Use of a Virtualized 5G Core for Time Critical Communication in Smart Grid","authors":"Van-Giang Nguyen, Karl-Johan Grinnemo, Jun Cheng, J. Taheri, A. Brunström","doi":"10.1109/MobileCloud48802.2020.00009","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00009","url":null,"abstract":"Protection and automation in a smart grid environment often have stringent real-time communication requirements between devices within a substation, as well as between distantly located substations. The Generic Object Oriented Substation Event (GOOSE) protocol has been proposed to achieve this goal as it allows to transfer time-critical information within a few milliseconds. However, the transmission of GOOSE messages is often limited to a small Local Area Network (LAN). An earlier work has proposed to use the fifth generation of mobile networks (5G) as a means to transport IP-based GOOSE messages in a large-scale smart grid environment. On the basis of this work, this paper designs and implements an alternative solution for Ethernet-based GOOSE communication over a virtualized 5G core network that does not require any modification of the existing network protocol stack and thus is much easier to deploy. Our experimental results show that the delay introduced by the core network is in the order of sub milliseconds, while the one-way delay without a real radio access network, and without background traffic, is less than 1 ms. Moreover, these delays can be significantly reduced with a container-based deployment rather than a virtual machine-based one. Assuming a 1-ms delay budget for a 5G radio access network, our evaluation confirms that it is indeed feasible to use 5G for GOOSE transmission in IEC 61850 substation automation systems.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132621451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology","authors":"N. Naik, Paul Jenkins","doi":"10.1109/MobileCloud48802.2020.00021","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00021","url":null,"abstract":"Digital identity is one of the biggest challenges in cyberspace. This field has been evolving for many decades with a number of Identity Management (IDM) models being proposed and employed; however, few were able to solve the issue of sovereignty of an identity and storage-control of its associated personal and confidential data. Self-Sovereign Identity (SSI) was introduced to solve this crucial issue offering a user full sovereignty of their identity and storage-control of their associated personal and confidential data. Alongside ownership of an identity, it maintains all private information in a Digital Wallet which is owned and controlled by the user. However, SSI is an emerging IDM, therefore it requires careful evaluation of various aspects of SSI for it to become an operative IDM. This paper proposes several specifications to evaluate any SSI solution. Subsequently, it analyses two emerging SSI solutions uPort and Sovrin. Finally, an evaluation of uPort and Sovrin SSI is performed utilising the proposed specifications, highlighting their strengths and limitations.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arif Ahmed, Apoorve Mohan, G. Cooperman, G. Pierre
{"title":"Docker Container Deployment in Distributed Fog Infrastructures with Checkpoint/Restart","authors":"Arif Ahmed, Apoorve Mohan, G. Cooperman, G. Pierre","doi":"10.1109/MobileCloud48802.2020.00016","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00016","url":null,"abstract":"n fog computing environments container deployment is a frequent operation which often lies in the critical path of services being delivered to an end user. Although creating a container can be very fast, the container’s application needs to start before the container starts producing useful work. Depending on the application this startup process can be arbitrarily long. To speed up the application startup times we propose to snapshot the state of fully-deployed containers and restart future container instances from a pre-started application state. In our evaluations based on 14 real micro-service containers, this technique effectively reduces the startup phase with speedups between 1x (no speedup) and 60x.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133461354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards","authors":"Markku-Juhani O. Saarinen","doi":"10.1109/MobileCloud48802.2020.00012","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00012","url":null,"abstract":"Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round. The upcoming standards are intended to replace (or supplement) current RSA and Elliptic Curve Cryptography (ECC) on all targets, including lightweight, embedded, and mobile systems. We present an energy requirement analysis based on extensive measurements of PQC candidate algorithms on a Cortex M4 - based reference platform. We relate computational (energy) costs of PQC algorithms to their data transmission costs which are expected to increase with new types of public keys and ciphertext messages. The energy, bandwidth, and latency needs of PQC algorithms span several orders of magnitude, which is substantial enough to impact battery life, user experience, and application protocol design. We propose metrics and guidelines for PQC algorithm usage in IoT and mobile systems based on our findings. Our evidence supports the view that fast structured-lattice PQC schemes are the preferred choice for cloud-connected mobile devices in most use cases, even when per-bit data transmission energy cost is relatively high.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}