Mobile Cloud Computing Applications and Challenges
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 4
Abstract
Mobile Cloud Computing (MCC) combines mobile computing and cloud computing. Cloud Computing includes application and services that run on distributed network using virtualized resources and excess by common internet protocol. Cloud services are having major impact on Mobile phone technology. Now days Cloud computing is spreading into mobile. That is why mobile cloud computing is becoming a new and fast growing technology today. We discussed the architecture of MCC (Mobile cloud computing) with the different services needed by the client and the server in MCC. This paper focus on Architecture, Applications and Challenges in MCC. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth) and security (e.g., reliability and privacy)
Authors and Affiliations
Prof. Shilpa M. Deshmukh, Prof. Ashwini M. Takale
Study on Alternative Materials-Expanded Polystyrene and Glass Powder for Construction
Expanded Polystyrene (EPS) that was used in the research work was in the form of ‘EPS Beads’ which were spherical in shape and size varied in between 6 mm to 8 mm in diameter. Beads were made up of pre-extended Polystyre...
Object Detection Using Convolutional Neural Networks: A Review
The amount of data on the Internet has increased dramatically as a result of the advent of intelligent devices and social media. Object detection has become a popular international study topic as an important element of...
Dynamic Security Implementation in MANETS
Security has become a primary concern in order to provide reliable communication between mobile nodes. Inherent characteristics of Mobile ad hoc networks like open peer-to-peer network architecture, shared wireless mediu...
Sentimental Analysis – Detecting Tweets on Twitter
As we all know social media is a growing industry in the current world. People of every age are using social media directly or indirectly. Millions of people are sharing their thoughts on Twitter day by day. Every tweet...
Securing and Secrete Image Sharing Using Visual Cryptography Scheme
To verify identity of person his /her physical or behavioural characteristics can be use,this strategy is called as Biometrics. Preservation of privacy of digital biometric data such as iris,face images etc. which stored...