This document proposes a secure mobile cloud computing infrastructure using a cloudlet model. It discusses how mobile cloud computing overcomes limitations of mobile devices like limited battery life and storage by processing data in the cloud. However, security and performance are key challenges for mobile cloud computing. The document then introduces a cloudlet-based model for mobile cloud computing that improves performance for interactive apps by reducing latency. It also describes employing a trust-based task assignment system to enhance security ratios and provide a high level of security for the mobile cloud computing architecture.
This document proposes a secure mobile cloud computing infrastructure using a cloudlet model. It discusses how mobile cloud computing overcomes limitations of mobile devices like limited battery life and storage by processing data in the cloud. However, security and performance are key challenges for mobile cloud computing. The document then introduces a cloudlet-based model for mobile cloud computing that improves performance for interactive apps by reducing latency. It also describes employing a trust-based task assignment system to enhance security ratios and provide a high level of security for the mobile cloud computing architecture.
This document proposes a secure mobile cloud computing infrastructure using a cloudlet model. It discusses how mobile cloud computing overcomes limitations of mobile devices like limited battery life and storage by processing data in the cloud. However, security and performance are key challenges for mobile cloud computing. The document then introduces a cloudlet-based model for mobile cloud computing that improves performance for interactive apps by reducing latency. It also describes employing a trust-based task assignment system to enhance security ratios and provide a high level of security for the mobile cloud computing architecture.
Muhammad Zulkifl Hasan Muhammad Zunnurain Hussain Nadeem Sarwar Faculty of Computer Science and Department of Computer Science Department of Computer Science, Bahria University Lahore Campus Bahria University Lahore Campus, Information Technology University of zunnurain.bulc@bahria.edu.pk Nadeem_srwr@yahoo.com Central Punjab zulkifl.hasan@ucp.edu.pk [0000-0002-6071-1029] [0000-0001-8681-6382] [0000-0002-2733-5527]
Zaka Ullah Intakhab Alam Asma Irshad
Department of Computer Science and Cyber Department of Information Technology School of Biochemistry and Security University of Sialkot, Biotechnology Air University Aerospace and Aviation Sialkot, Pakistan University of the Punjab, Campus Kamra, Pakistan Intakhab.alam@uskt.edu.pk Lahore, Pakistan zakaullah@aack.au.edu.pk asmairshad76@yahoo.com
infrastructure by creating applications to accomplish
Abstract— Nowadays, practically everyone has a limitless versatility, robotized on request from the IT smartphone with them. These smart devices store foundation. Programming as a service (SaaS), several types of personal information, such as images, platform as a service (PaaS), and foundation as a files, credit card pins, etc., and are used for service are examples of communication purposes. Consider the possibility that someone could gain access to it without our knowledge. How could they possibly use it? One of the most critical distributed computing administrations. Clients of CC security concerns is data and privacy in terms of stolen can be corporations, partnerships, or individuals. A data and malicious file behavior. However, private and few models exist for increasing distributed delicate data are required for these practical uses. computing, handling speed, and freeing up extra Similarly, connected phones’ other weak points are space. their limited battery life, slow processor speed, and unpatched vulnerabilities. To overcome such limitations, mobile cloud computing (MCC) is introduced, which Regardless, some difficulties still need to be solved, analyzes data in the cloud and returns the findings to the such as the battery's life span and execution. This smartphone. However, MCC increased the effectiveness impacts continuous intuitive apps that can't handle of several programs. MCC also considered several types delays caused by outsourcing work to the cloud, and of issues, such as real-time communication data results will be displayed after some time. Another confidentiality. Further, safety, speed, and customer satisfaction are the three fundamental parameters of demerit of using 3G or LTE is that it consumes a cell mobile cloud services that will be highlighted in this phone's battery a lot, which is relative to the time spent article. Finally, a model concept is also elaborate for going to the store and showing the errand. The more demonstration purposes to employ the trust-based efficient cloud-gathering arrangement allows for minor assignment system to enhance safety ratios, showing the delays and power consumption. Security and execution perfection of the five portable cloud computing are the other two challenges that cannot be isolated. architecture. The choice to use more intricate number juggling in safer encryption calculations is not determined by the Keywords— Smartphone, Vulnerabilities, Mobile Cloud exhibition level desired by the clients. In addition, Computing, Data Confidentiality more excellent security prerequisites suggest utilizing more mindboggling encryption calculations and I. INTRODUCTION calculations that disperse more power. The cloudlet Secure mobile cloud computing is the most common based MCC model solves the problems and issues tool for phone devices to access apps and services on discussed above. Cloudlet (CL) implementation the Internet, and it is a blend of mobile Web and improves the presentation for continuous intuitive cloud computing (CC). Because of the immense applications by reducing correspondence dormancy. In improvements in innovation currently, cell phones any event, the main point of data security is how to have become a fundamental part of our lives. Most of protect the client's data from others. In this study, we us use our sleek cell phones to check email, introduce the cloudlet MCC model and look at the communicate via virtual entertainment, shop online, types of administrative Quality of Service (QoS) receive instructions, and perform frequently. boundaries that this cloudlet model can provide. However, we must acknowledge that our astute Furthermore, considering trust assignment, safe frameworks and platforms, such as Microsoft Azure execution of the proposed MCC cloudlet-based model and MCC, use portable innovation and CC. The use is described to provide a high level of security. of distributed computing solved many problems with cell phones. For example, they have restricted assets (capacity, battery duration, and transfer speed). Now comes the advantage of cloud processing, a boundless innovation that offers helpful assistance in simple and easily accessible ways [1]. Besides, CC aids organizations to further develop the IT combines programming-defined capacity (SDStore) with programming-defined security (SDSec) to improve execution and maintain nearly equal security. Then again, energy utilization in MCC is a test since versatile gadgets experience the ill effects of short battery life because of the energy channel. As a result, we can conclude that improving energy efficiency in portable cloud frameworks is a critical requirement for achieving green MCC, as it affects the display and security of data kept on those frameworks. Elgendy et al. [6] described a novel paradigm for offloading expensive processing activities from mobile devices to the cloud. This system employs an optimization model to dynamically decide offloading decisions based on four major parameters: energy consumption, Central Processing Unit (CPU) utilization, execution time, and memory use. A new security layer is also offered to secure transmitted data in the cloud from any assault. The testing findings show that the framework FIGURE 1. Cloud Computing can pick an appropriate offloading option for various mobile application workloads while significantly II. BACKGROUND RESEARCH improving performance. In addition, unlike earlier solutions, the framework can safeguard application This section covers earlier MCC and cloudlet design data from danger. To support mobile computational work and related execution difficulties and clouds, Nawrocki et al. [7] created a new workflow applications. The work focuses on the MCC model that is security aware. The Filtration Algorithm innovation, which combines cell phones (portability and Prediction Module are two specialized algorithm feature) with cloud administration to overcome cell models we established to build the best safe system phone limitations [2]. The designers presented an architecture for processing tasks and data and ensure extremely broad cloudlet (a more modest cloud the best use of cloud resources and services. Analyses framework) model for the MCC arrangement. The based on experimental data have shown that our portable client can connect to the cloudlet via WiFi model performs well. Results of the tests demonstrate rather than 3G or Long-Term Evolution (LTE). Al- that, compared to a configuration where calculation Ayyoub et al. [2] discussed a productive MCC model time is the primary criterion for task processing based on the cloudlet concept. The approach explains optimization, our flow model dramatically improves how to optimally incorporate MCC for data collection the security level of computations. into large-scale enterprises. Jararweh et al. [3] III. LITERATURE REVIEW expanded the work of Al-Ayyoub et al. [2], presenting a new adaptable cloudlet structure for the MCC model. Through a current innovation in matrix The model explains the best way to involve MCC in processing, this distributed computing innovation information assortment in enormous-scale transmits a different paradigm for data and organizations. administration. CC, which allows assets to be shared via the Internet, allows broad organization access. The goal of the proposed flexible framework is to Furthermore, this innovation uses the Internet reduce power consumption and postpone the framework to communicate between client-side and arrangement of sight and sound applications while server-side assistance applications. Furthermore, using MCC [3]. However, the display issue in cloudspecialist organizations in distributed portable registration is almost as important as computing provide cloud stages for their clients to security and battery conservation. Lo’ai et al. [4] create and use web-based administrations. Sharing focused on the influence of using the cloudlet model hardware and software assets is possible in the cloud on the display of intelligent and versatile cloud with the web's assistance, typically overseen and applications. Their findings reveal that dormancy is maintained by an outside cloud specialist reduced and throughput is increased when the organization. These days, distributed computing has cloudlet portable cloud architecture is used. become one of the most significant and famous Information security is one of the main problems exploration regions in software engineering. Many faced by the distributed computing and portable open examination issues are available in distributed cloud industries. Information owners must ensure that computing, and analysts have also proposed excellent their critical and essential data is kept private and solutions by developing new procedures and protected from unauthorized access. Tawalbeh et al. productive calculations. This paper examines a [5] examined an information privacy system for nittygritty lesson about distributed computing, its distributed computing because of information order. fundamental ideas, history, virtualization method, and As such, important information gets more assurance cloud administration. by utilizing more grounded and safer encryption calculations. Tawalbeh et al. [5] used MCC Furthermore, research issues in distributed foundations to define efficient and secure computing are additionally examined [8]. Similarly, programming. The proposed designs take advantage communication elements make developing a trust of the strengths of the verified information ownership connection more difficult in a circulated and dynamic configuration used for asset-based cell phones and cloud climate. As of late, trust has been perceived as a the benefit of trust in thinking innovation. The significant variable in further developing cloud proposed system is a product-defined framework that security and has turned into an exploration area of server farms. These patterns have brought about the interest. In this paper, we propose a new staggered requirement for an assortment of new processing trust model to oversee cloud elements' relationships models that future cloud frameworks will present. from the perspective of a "virtual association subspace These designs are expected to impact connecting people and devices, information focused processing, the help element" and measure trust connections space, and self-learning frameworks [13]. mathematically. By continuing to refresh the trust data, the model can recognize different substance IV. MOBILE CLOUD COMPUTING WITH CLOUDLET- types and safeguard awful elements' ways of BASED ARCHITECTURE behaving, advancing asset portions. The results show In the non-cloudlet MCC model, cell phones are that this model can detect malevolent substances and connected to the cloud via 3G or 4G to communicate works on the proportion of administration that with the venture cloud, resulting in increased necessitates a response. So this model has excellent idleness. This is the main issue, particularly in mobile protection capacity and can provide an ideal, secure applications requiring a significant investment connection in a short time. The cloudlet MCC model cloud climate [9]. However, the researchers present a shown in Figure 1 is closer to the cell phone and meta-examination of distributed computing research interfaces through less expensive improvements (Wi- in data frameworks to check out their writing and their Fi or streak with LAN) and can complete similar related exploration structures, research philosophy, chores with better execution than the non-cloud topographical conveyance, level of examination, and model. Similarly, using the cloudlet MCC model patterns of these investigations over 7 years. A total of aims to improve QoS by increasing access to 285 articles from 67 friend survey diaries from 2009 information, increasing processing speed, to 2015 were utilized in the analysis. The discoveries maintaining battery life, and providing better QoS. demonstrate that surviving distributed computing will slant towards the mechanical aspect to the disadvantage of other underexploited elements, for example, business, conceptualization, and application space. While there has been a consistent expansion in distributed computing throughout recent years, a critical number of these examinations have not been supported by hypothetical structures and models. This study contributes to distributed computing research by providing in-depth experiences on topics, procedures, research systems, topographical attentiveness, and future research directions [10]. Another area of investigation is how CC is required for instructional regions, especially in colleges, to FIGURE 2. Using cloudlet, a mobile cloud computing paradigm facilitate all organization and knowledge admission. So, the foundation of distributed computing must be the college's point. In distributed computing, infrastructure The second diagram of QoS mainly applies to as a service (IaaS) has issues such as assets, security, most of the running applications and discusses three and money. This study follows the Kitchenham parameters of QoS used in Cloudlet model convention to investigate the difficulties in deliberately evaluation. Those three parameters used in the using cloud registration as a framework for cloudlet model are availability, performance, and administration for schooling field writing and then scalability. Availability is one of MCC's most inspecting their methods, which can involve all of the efficient QoS elements among all three cloudlet colleges in Indonesia. This study suggests that IaaS models. By requesting a service from the cloudlet administration should be viewed to achieve the best instead of the business cloud itself, the cloudlet results from distributed computing [11]. The various design lowers congestion that can arise when a lot of MCC solutions are qualitatively reviewed by Ahmed et users try to use the cloud service. This will spread the al. [12]. As a result, a taxonomy for MCC is offered, load and speed up service provision, reducing the taking into account key research areas, including energy possibility of failure. awareness, security, applications, and advancements in QoS awareness. Each of these topics is rigorously examined with comparisons that consider contemporary developments. The analysis of measurements and implementation settings used to assess the effectiveness of current strategies is provided. Finally, based on the critical and qualitative literature evaluation for researchers, some open research questions and future challenges are indicated. The CC landscape has fundamentally changed over the last ten years. Not only are many dealers and administration contributions grouped into the space, but cloud frameworks that were usually limited to single-supplier server farms are advancing. In this paper, we first describe the changing cloud framework, first and foremost, and we consider the use of the framework by numerous suppliers and the advantage of decentralizing registration away from FIGURE 4. SOAP Working
FIGURE 3. Categories of QoS
VI. MOBILE APPLICATIONS AND THE ADVANTAGE OF
CLOUD RESOURCES The third QoS criterion is efficiency, which is the time taken to complete a task and is determined by Here are a few examples of popular mobile CC response time and bandwidth. The cloudlet approach applications: avoids high latency caused by WAN connectivity to A. Digital Social Platforms the cloud and sophisticated management, resulting in Let's start with the most widely used application. improved performance. Another critical aspect of Mobile social networking allows users to save data QoS is scalability, which refers to the system's and share films in real time, so your friends and capacity to grow without compromising or followers won't have to wait for the latest kitten video. deteriorating the version of its operating applications. Everyone and their extended family appear on The cloudlet concept may be scaled up to a limited Facebook, Twitter, Instagram, TikTok, or other social number of customers at any moment with minimal media sites. effort and control. B. Webmail Service V. DEPLOYING THE RESILIENT CLOUDLET MCC Another general mobile cloud computing PARADIGM application. Those who check their emails presumably Users' privacy must still be safeguarded in our use applications like Outlook, Gmail, or Yahoo Mail. cloudlet paradigm when they use cloud resources or However, consumers appear more inclined to log into corporate cloud solutions. Two instances show the their social network accounts than examine their new need for this: the first instance occurs when the emails every morning. That is due to the never-ending cloudlet serves as an intermediary component spam deluge. So, if you're viewing your emails on a between the cloud platform and the portable internet. mobile device like a smartphone, you're utilizing In this instance, the cloudlet connects to the EC on mobile cloud technologies. the client's screen. As a result, some methods should C. Business and Financial Strategies be employed to verify the claimed user. The Do you use a banking app on your phone to keep following scenario is when a current job is still in track of your checking account balances? Similarly, do progress whenever a smartphone user switches from you shop on eBay or Amazon with your tablet? If so, the service area of cloud environment 1 (CL1) to that's mobile cloud computing at work with scalable cloudlet 2 (CL2). The responsibility is then handed processing power. off to CL2, who should contact CL1 and ask for the necessary information. In this situation, we must D. Medical and Health Sector confirm that the mobile user himself requested the While the general public does not widely use this CL2 request in the first place. Utilizing trust for program, it is critical for healthcare personnel. A delegation is the answer. The Trust Delegation specialist must review a patient's medical history and security mechanism provides a solution for the trust the reason for their referral [16]. Healthcare providers concerns discussed above. In this method, the mobile can rapidly access patient records, which is crucial user assigns tasks to the connected CL to interact for referrals. Vast amounts of data can be stored or with other CLs or the Enterprise Cloud (EC) on their accessed instantly using a mobile device due to cloud behalf. The message is split into two sections by the computing. Simple Object Access Protocol (SOAP) protocol. The E. Digital Learning Environment optional header contains the endpoints' addresses and other setup and security details [14]. A Security The purpose of installing these apps is to let Assertion Markup Language (SAML) 2.0 assertion is students understand how MCC should be developed used in the Uniform Interface to Compute Resources to supplement outdoor activities. A teaching tool (UNICORE) to encrypt secure data. Chain validation based on cloud computing is being developed to has two steps: the trust custodian (the root), the deliver a program for image and video creation. issuer's signature, and additional restrictions like the Using mobile phones, students may analyze and maximum trust chain length and type of permission assess various techniques utilized in mobile apps [15]. (such as binarizing, denoising, face recognition, and E. Fortifying Goals within MCC photo enhancement) [17]. Multiple goals must be taken into account and VII. ANALYSIS accomplished simultaneously in MCC. Energy A relatively modern technology known as "cloud consumption must also be considered for improved computing" enables customers to exchange their data MD performance when attaining efficient and online in cloud-based systems, distribute it with dependable job computing. As a result, a rigorous others, and view it from various devices. The use of examination of multi-objective optimization is the cloud is here to stay and will be for a very long required for increased MCC efficiency [18]. time. It is utilized by everybody, from small F. Boundaries of mobile device resources businesses to enormous corporations. It has many Despite ongoing improvements, mobile devices' benefits, and safety is just one of them. Files are not limited resources still pale in contrast to a conventional kept on your storage disk since they are kept in the computer. For instance, running programs that cloud instead. A hacker can access your information consume much energy on mobile devices are if he gains access to your machine. Your data is safe ineffective. Utilizing the cloud to execute apps and in the cloud backup if you lose your device. Because tasks, the computational offloading approach can of the several advantages they provide to overcome the difficulty of running mobile applications organizations, many corporations are now adopting [19]. cloud services. The cloud can offer a broader range of communication platforms, and many businesses G. Data reliability reportedly find an improvement in the effectiveness Users of mobile devices can access the MCC's of their collaboration. resources whenever and wherever they are. To resolve Nevertheless, it is well known that cloud data integrity, correctness, and consistency in MCC, computing services have unique qualities that could data integrity and recovery are therefore crucial, and call for risk evaluations in many places, including they need a consistent storage and management data recovery, data integrity, privacy, and a critical architecture [20–24]. review of specific legal challenges involving H. Transformation of services compliance requirements, monitoring, and e- MCC wants to provide mobile devices with access discovery. Customers of systems are encouraged to to PC-like services. The transition from wired to request openness and to shun suppliers who are secretive about their safety precautions. They should wireless data transfer and between fixed and mobile device characteristics makes service transformation challenge operations, programmers, legislators, equipment and devices, and hazard control processes. difficult. Such a transformation requires economic planning and pricing schemes to build eco-friendly You must be aware of the leading cloud issues: business and service models that coordinate with QoS and Service Level Agreements (SLAs). However, A. Trust Delegation Meets Internal Cloud: A further work is needed to address issues with service Secure Mix for MCC transition between various mobile devices and cloud storage [25–28]. The majority of businesses now prefer private cloud environments over public cloud services. Many I. Expanded secure storage for critical file think hiding this kind of cloud behind a barrier will systems boost security. This is untrue; companies must realize Customers of these services need to exercise that securing the cloud with a network does not caution when storing private data on the cloud. The ensure a secure solution. problem is where and how to decrypt encrypted data, B. Safety Risks Occur Due to Low Sight so the answer is to protect your data. It's advised never to keep the encoding key and encrypted files Since most cloud suppliers are anonymous, combined. The issue with many organizations is that companies may be at risk of security issues. Because they don't consider their genuine dangers and don't there will be no agency to handle potential hazards plausibly run their businesses. NAWAH chose to have linked with this activity, businesses should make an a network with no trace. No networks were involved; educated choice when shifting their data to the cloud. all users connected straight from their laptops to cloud- C. Exposed Digital Applications hosted or managed applications. This made it For a very long time, standard safety apps have unnecessary to safeguard our network, allowing us to garnered much interest. The program can be rewritten concentrate on troubleshooting. to offer a dependable installation for cloud services. The software applications will become more robust because of this decision. It is critical to understand VIII. ADOPTING CLOUD COMPUTING SECURITY that your cloud hosting will not assist you. MEASURES D. Resource Allocation in a Decentralized We must use a top-down risk assessment technique Manner to evaluate cloud technology's security. Examine the current international standards that detail security Due to the possibility of a single enormous task controls, such as Cloud Controls Matrix (CCM) v.3.0.1 having subtasks, more technical resource allocation (2014). It can be downloaded for free. After that, techniques for task scheduling, task migration, and research the control zones you want to simulate. There load balancing that consider both Mobile Devices are enough of them to draw them all. And you'll (MDs) and CC constraints need to be researched and probably conclude that there isn't a magical cure for developed for energy-efficient mobile computing cloud security. There are up to six references to security devices and cloud computing systems. A small amount standards, and almost any cloud security risk you can of study has been done [16]. imagine is listed there. Of course, there are some measures for which there are no standards, such as taxonomy and challenges," Journal of Computer Networks phone-to-cloud security, but this highlights the areas in and Communications, vol. 2020, 2020. [13] B. Varghese and R. Buyya, "Next generation cloud which there is room for fruitful study. computing: New trends and research directions," Future Generation Computer Systems, vol. 79, pp. 849-861, 2018. [14] L. a. Tawalbeh, Y. Haddad, O. Khamis, F. Aldosari, and E. Benkhelifa, "Efficient software-based mobile cloud IX. CONCLUSION computing framework," in 2015 IEEE International One of the most critical security concerns is data Conference on Cloud Engineering, 2015, pp. 317-322. privacy. The MCC concept is introduced, which [15] B. Kurdi, S. Lozano, and M. R. Banaji, “Introducing the provides data confidentiality and safe Open Affective Standardized Image Set (OASIS),” Behavior Research Methods, vol. 49, no. 2, pp. 457–470, Apr. 2017, communication. Smartphones, however, have a doi: 10.3758/s13428-016-0715-3. number of risks and limitations, and their data can be [16] Simplilearn. Mobile Cloud Computing: Definition, maliciously stolen or encrypted. Similarly, smart Advantages, and Applications. connected phones have limitations in terms of limited https://www.simplilearn.com/what-ismobile-cloud- battery life, slow processor speed, and unpatched computingarticle#mobile_cloud_computing_examples_and_a vulnerabilities. The paper also discussed the various pplications,(2022). [Retireved Online: 26 Oct 2022] [17] L. Tiyagaraja and I. Yusof, I. Future of Cloud Computing: MCC applications that are currently in use. Mobile Cloud Apps. “International Journal of Business and Furthermore, for the security aspect, different Technology Management,” 4(3), 256-262, 2022. parameters are also discussed for user awareness, [18] C. Xu, J. Ren, L. She, Y. Zhang, Z. Qin, and K. Ren, such as safety, speed, customer satisfaction, etc. “EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics,” IEEE Internet of However, these are primary challenges when Things Journal, vol. 6, no. 3, pp. 5140–5151, Feb. 2019, doi: considering mobile cloud services. Finally, the 10.1109/jiot.2019.2897005. mechanism is described to utilize cloud computing [19] W. Chen, B. Z. Tang, and K. Li, “Multi-User Multi-Task security, like topologies that must be supported by Computation Offloading in Green Mobile Edge Cloud your cloud provider, third-party adoption, and freely Computing,” IEEE Transactions on Services Computing, vol. accessible OpenVPN at basic-level access. Similarly, 12, no. 5, pp. 726–738, Sep. 2019, doi: 10.1109/tsc.2018.2826544. users may avoid using Amazon's security groups if [20] T. H. Noor, S. Zeadally, A. Alfazi, and Q. Z. Sheng, "Mobile such parameters are correctly considered. cloud computing: Challenges and future research directions," Journal of Network and Computer Applications, vol. 115, pp. REFERENCES 70-85, 2018. [1] Frankenfield, J. (2022) What is cloud computing? pros and [21] S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S. cons of different types of services, Investopedia. Available at: Shamshirband, "Survey of main challenges (security and https://www.investopedia.com/terms/c/cloud-computing.asp privacy) in wireless body area networks for healthcare (Accessed: 08 Mar 2022). applications," Egyptian Informatics Journal, vol. 18, pp. 113- [2] Alakberov, R.G. (2021) Clustering method of mobile cloud 122, 2017. computing according to ... - MECS press. Available at: [22] K. Saleem, I.S. Bajwa, N., Sarwar, W. Anwar and A. Ashraf. https://mecs-press.org/ijcnis/ijcnis-v14-n3/IJCNIS-V14-N3- IoT healthcare: intelligent and cost-effective sleep quality 6.pdf (Accessed: 18 June 2021). monitoring system design. Journal of Sensors, 2020 [3] S. Kumar, G. Stecher, M. Y. Li, C. Knyaz, and K. Tamura, [23] B. Sarwar, I.S. Bajwa, N. Jamil, S, Ramzan, and N. Sarwar. “MEGA X: Molecular Evolutionary Genetics Analysis across An intelligent fire warning application using IoT and an Computing Platforms,” Molecular Biology and Evolution, adaptive neuro-fuzzy inference system. Sensors, 19(14), vol. 35, no. 6, pp. 1547–1549, Jun. 2018, doi: 3150. (2019) 10.1093/molbev/msy096. [24] H. Sattar, I.S. Bajwa, R. U., Amin, N. Sarwar, N. Jamil, M., [4] K. Abualsaud et al., “A Survey on Mobile Crowd-Sensing Malik, A. Mahmood and U. Shafi, An IoT-based intelligent and Its Applications in the IoT Era,” IEEE Access, vol. 7, pp. wound monitoring system. IEEE Access, 7, 144500-144515. 3855–3881, Jan. 2019, doi: 10.1109/access.2018.2885918. (2019). [5] A. K. Singh and K. Chatterjee, “Cloud security issues and [25] K. Hameed, I.S Bajwa, N. Sarwar, W. Anwar, Z. Mushtaq, challenges: A survey,” Journal of Network and Computer and T. Rashid. Integration of 5G and block-chain Applications, vol. 79, pp. 88–115, Feb. 2017, doi: technologies in innovative telemedicine using IoT. Journal of 10.1016/j.jnca.2016.11.027. Healthcare Engineering, 2021. [6] I. A. Elgendy, W.-Z. Zhang, C.-Y. Liu, and C.-H. Hsu, "An [26] W. Rafique, M. Khan, N. Sarwar, and W. Dou. A security efficient and secured framework for mobile cloud framework to protect edge-supported software-defined computing," IEEE Transactions on Cloud Computing, vol. 9, Internet of Things infrastructure. In International Conference pp. 79-87, 2018. on Collaborative Computing: Networking, Applications and [7] P. Nawrocki, J. Pajor, B. Sniezynski, and J. Kolodziej, Work-sharing, 2019, pp. 71-88. Springer, Cham. "Security aware job allocation in mobile cloud computing," in [27] M.H. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir and N. 2021 IEEE/ACM 21st International Symposium on Cluster, Aslam. Cloud application importance and challenges: A Cloud, and Internet Computing (CCGrid), 2021, pp. 713-719. Systematic Review. In 2021 International Conference on [8] Sadeeq, M.M. et al. (2021) IOT and cloud computing issues, Innovative Computing (ICIC), 2021, pp. 1-6. IEEE. challenges and opportunities: A Review, Qubahan Academic [28] M.H. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir and N. Journal. Available at: Aslam. Code Vision: Learning Mobile Application. In 2021 https://journal.qubahan.com/index.php/qaj/article/view/36 International Conference on Innovative Computing (ICIC), (Accessed: 08 July 2021). 2021, pp. 1-7. IEEE. [9] M. Yang and L. Zhang, "Research of Cross-domain Cloud . Trust Model and its Defense Abilities Analysis," in Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City, 2019, pp. 94-97. [10] P. K. Senyo, E. Addae, and R. Boateng, "Cloud computing research: A review of research themes, frameworks, methods, and future research directions," International Journal of Information Management, vol. 38, pp. 128-139, 2018. [11] N. A. Wigati, A. Wibisono, and A. N. Hidayanto, "Challenges of Infrastructure in Cloud Computing for Education Field: A Systematic Literature Review," ICEIS (1), pp. 351-358, 2021. [12] A. Aliyu, A. H. Abdullah, O. Kaiwartya, S. H. Hussain Madni, U. M. Joda, A. Ado, et al., "Mobile cloud computing:
[Download pdf] An Archaeology Of Innovation Approaching Social And Technological Change In Human Society Social Archaeology And Material Worlds 1St Edition Frieman Catherine J online ebook all chapter pdf