Advertisement

Abstract

More and more applications and functionalities have been introduced to smartphones, but smartphones have limited resources on computation and battery. To enhance the capacity of smartphones, an interesting idea is to use Cloud Computing and virtualization techniques to shift the workload from smartphones to a computational infrastructure. In this paper, we propose a new framework which keeps a mirror for each smartphone on a computing infrastructure in the telecom network. With mirror, we can greatly reduce the workload and virtually expand the resources of smartphones. We show the feasibility of deploying such a framework in telecom networks by protocol design, synchronization study and scalability test. To show the benefit, we introduce two applications where both the computational workload on smartphones and network traffic in telecom networks can be significantly reduced by our techniques.

Keywords

Cloud Computing Virtual Machine Telecom Network Cache Service Home Subscriber Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing (2009)Google Scholar
  2. 2.
    Chun, B.-G., Maniatis, P.: Augmented smart phone applications through clone cloud execution. In: Proc. HotOS XII (2009)Google Scholar
  3. 3.
    Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proc. MobiVirt (2008)Google Scholar
  4. 4.
    Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing elastic applications on mobile devices for cloud computing. In: Proc. CCSW (2009)Google Scholar
  5. 5.
    Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: N-version antivirus in the network cloud. In: Proc. Security Symposium Conference, SS (2008)Google Scholar
  6. 6.
    3GPP Specification TS 23.107: Quality of Service (QoS) concept and architecture, Std., Rev. Rel. 8, http://www.3gpp.org
  7. 7.
    Zhao, B., Xu, Z., Chi, C., Zhu, S., Cao, G.: Mirroring smartphones for good: A feasibility study. Tech. Rep. (2010), www.cse.psu.edu/~bzhao/mirror_report.pdf
  8. 8.
    Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: Proc. IEEE INFOCOM (2009)Google Scholar
  9. 9.
    Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.: A chain reaction dos attack on 3G networks: Analysis and defenses. In: Proc. IEEE INFOCOM (2009)Google Scholar
  10. 10.
    Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based ”out-of-the-box” semantic view reconstruction. In: Proc. CCS (2007)Google Scholar
  11. 11.
  12. 12.
    Smobile virusguard for google android, http://www.smobilesystems.com

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Bo Zhao
    • 1
  • Zhi Xu
    • 1
  • Caixia Chi
    • 2
  • Sencun Zhu
    • 1
  • Guohong Cao
    • 1
  1. 1.Department of Computer Science and EngineeringThe Pennsylvania State UniversityUSA
  2. 2.Bell LaboratoriesAlcatel-Lucent TechnologiesFrance

Personalised recommendations