An Approach to Improve Security on Clone of Mobile Device During Augmented Execution
Yash Dave1, Gordhan Jethava2
1Yash Dave, Assistant Professor, Department of Information Technology, Parul Institute of Engineering & Technology, India.
2Prof. G.B. Jethava, HOD, Department of Information Technology, Parul Institute of Engineering & Technology, India.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 169-171 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0578032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The goal of cloud computing is usage of cloud resource form anywhere i.e. mobility. Mobile cloud computing, new technology in the field of cloud computing enables cloud users to access cloud from their mobile devices (e.g. Laptops, PDA, Smartphone’s). Computation power and battery life is one of the major issues of these mobile devices. Now a day’s resource starved applications like online HD graphics games, multimedia, etc. needs more bandwidth and computation power that mobile device might not have. So to overcome this problem clones of mobile devices are created on cloud servers. This clone uses resources of the cloud servers. Using augmented execution all complex applications run in this clone and response is sent back to mobile device. This can save battery life for low configured mobile devices. This paper shows how to improve the synchronization between mobile device and clone to communicate more reliably in terms of improving security.
Keywords: Augmented Execution, Clone, Cloud Computing, Mobile Cloud Computing.
Scope of the Article: Mobile Computing and Applications