scholarly journals Server-Aided Verification Signature with Privacy for Mobile Computing

2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Lingling Xu ◽  
Jin Li ◽  
Shaohua Tang ◽  
Joonsang Baek

With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

Author(s):  
Agustinus Borgy Waluyo ◽  
Bala Srinivasan ◽  
David Taniar

The development of wireless technology has led to mobile computing, a new era in data communication and processing (Barbara, 1999; Myers & Beigl, 2003). With this technology, people can now access information anytime and anywhere using a portable, wireless computer powered by battery (e.g., PDAs). These portable computers communicate with a central stationary server via a wireless channel. Mobile computing provides database applications with useful aspects of wireless technology known as mobile databases.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Mingliang Li ◽  
Jianmin Pang ◽  
Feng Yue ◽  
Fudong Liu ◽  
Jun Wang ◽  
...  

Dynamic binary translation (DBT) is gaining importance in mobile computing. Mobile Edge Computing (MEC) augments mobile devices with powerful servers, whereas edge servers and smartphones are usually based on heterogeneous architecture. To leverage high-performance resources on servers, code offloading is an ideal approach that relies on DBT. In addition, mobile devices equipped with multicore processors and GPU are becoming ubiquitous. Migrating x86_64 application binaries to mobile devices by using DBT can also make a contribution to providing various mobile applications, e.g., multimedia applications. However, the translation efficiency and overall performance of DBT for application migration are not satisfactory, because of runtime overhead and low quality of the translated code. Meanwhile, traditional DBT systems do not fully exploit the computational resources provided by multicore processors, especially when translating sequential guest applications. In this work, we focus on leveraging ubiquitous multicore processors to improve DBT performance by parallelizing sequential applications during translation. For that, we propose LLPEMU, a DBT framework that combines binary translation with polyhedral optimization. We investigate the obstacles of adapting existing polyhedral optimization in compilers to DBT and present a feasible method to overcome these issues. In addition, LLPEMU adopts static-dynamic combination to ensure that sequential binaries are parallelized while incurring low runtime overhead. Our evaluation results show that LLPEMU outperforms QEMU significantly on the PolyBench benchmark.


Author(s):  
Daniel C. Doolan ◽  
Sabin Tabirca ◽  
Laurence T. Yang

Today in the beginning of the 21st century, mobile devices are now ubiquitous. No matter where we go or what we do, we are touched by this new insatiable need for mobile computing. Mobile devices, especially mobile phones, have become the essential commodity item. In many countries the world over, mobile phone ownership is well above 100% market penetration. The main features predominantly used are text messaging and voice communications. The phones of today, however, have far more to offer than these interpersonal communication features. Many phones include components such as digital cameras, wireless data communication systems (Bluetooth), and music playback facilities. Some even include additional sensor technology such as accelerometers to detect motion. Java Virtual Machines (JVMs) are now shipped as standard with almost every phone that comes off the production line. This opens the door to a huge body of developers to create applications specifically directed to these small mobile computing devices. The area of mobile Java games is one area of growth, especially due to the ease of deployment. Mobiles are, however, capable of so much more. This chapter focuses on the computational abilities of these small portable computers. It provides a selection of concrete results that indicate that mobiles are more than capable of performing complex computational tasks; therefore, the future of computing is mobile.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2009 ◽  
pp. 2614-2626
Author(s):  
Michael J. O’Grady ◽  
Gregory M.P. O’Hare

In this chapter, the practical issue of realizing a necessary intelligence quotient for conceiving intelligent user interfaces (IUIs) on mobile devices is considered. Mobile computing scenarios differ radically from the normal fixed workstation environment that most people are familiar with. It is in this dynamicity and complexity that the key motivations for realizing IUIs on mobile devices may be found. Thus, the chapter initially motivates the need for the deployment of IUIs in mobile contexts by reflecting on the archetypical elements that comprise the average mobile user’s situation or context. A number of broad issues pertaining to the deployment of AI techniques on mobile devices are considered before a practical realisation of this objective through the intelligent agent paradigm is presented. It is the authors hope that a mature understanding of the mobile computing usage scenario, augmented with key insights into the practical deployment of AI in mobile scenarios, will aid software engineers and HCI professionals alike in the successful utilisation of intelligent techniques for a new generation of mobile services.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2015 ◽  
pp. 1933-1955
Author(s):  
Tolga Soyata ◽  
He Ba ◽  
Wendi Heinzelman ◽  
Minseok Kwon ◽  
Jiye Shi

With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today's mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to establish high-speed connections to vast computational resources located in the cloud. While the execution scheme based on this mobile-cloud collaboration opens the door to many applications that can tolerate response times on the order of seconds and minutes, it proves to be an inadequate platform for running applications demanding real-time response within a fraction of a second. In this chapter, the authors describe the state-of-the-art in mobile-cloud computing as well as the challenges faced by traditional approaches in terms of their latency and energy efficiency. They also introduce the use of cloudlets as an approach for extending the utility of mobile-cloud computing by providing compute and storage resources accessible at the edge of the network, both for end processing of applications as well as for managing the distribution of applications to other distributed compute resources.


Author(s):  
Parkavi R ◽  
Priyanka C ◽  
Sujitha S. ◽  
Sheik Abdullah A

Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry ring words and a major conversation thread in the IT world with an explosive development of the mobile applications and emerging of cloud computing idea, the MCC has become a possible technology for the mobile service users. The concepts of Cloud computing are naturally meshed with mobile devices to allow on-the-go functionalities and benefits. The mobile cloud computing is emerging as one of the most important branches of cloud computing and it is expected to expand the mobile ecosystems. As more mobile devices enter the market and evolve, certainly security issues will grow as well. Also, enormous growth in the variety of devices connected to the Internet will further drive security needs. MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment.


Author(s):  
Antonio Miguel Rosado da Cruz ◽  
Sara Paiva

Mobile computing and Cloud computing are two of the most growing technologies in number of users, practitioners and research projects. This chapter surveys mobile technologies and applications, along with cloud computing technologies and applications, presenting their evolution and characteristics. Then, building on mobile devices limitations and mobile apps increasing need of resources, and on the cloud computing ability to overcome those limitations, the chapter presents mobile cloud computing, and characterizes it by addressing approaches to augment mobile devices capabilities. The chapter is settled after some views about future research directions and some concluding remarks.


Author(s):  
Tim A. Majchrzak ◽  
Jan C. Dageförde ◽  
Jan Ernsting ◽  
Christoph Rieger ◽  
Tobias Reischmann

Applications for mobile devices – apps – have seen unprecedented growth in importance. Ever better apps keep propelling the proliferation of mobile computing. App development is rather easy, particularly if it is based on Web technology. However, implementing apps that are user friendly and useful in the long-run is cumbersome. Thereby, it typically is expensive for corporate developers. Nonetheless, business apps are embraced by enterprises. To overcome the overhead of developing separately for multiple platforms and to mitigate the problems of device fragmentation, cross-platform development approaches are employed. While many such approaches exist, few have found widespread usage. In this chapter, we argue what the path towards future solutions could look like. We thereby take a rather technological look, but always keep business-orientation in mind. Our findings suggest that much effort is needed to enable the next generations of business apps. However, such apps will provide many merits and possibilities. Moreover, they provide the chance to master several of today's challenges.


Sign in / Sign up

Export Citation Format

Share Document