Autonomous Computation Offloading Application for Android Phones Using Cloud

  • Mayank Arora
  • Mala Kalra
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 236)


The usage of smartphones has increased hastily over the past few years. The number of smartphones being sold is much more than the number of PC’s due to the smartphone’s mobile nature and good connectivity. However, they are still constrained by limited processing power, memory, and Battery. In this paper, we propose a framework for making the applications of these smartphones autonomous enough, to offload their compute intensive parts automatically from the smartphone to the virtual image of the smartphones on the cloud, thus using the unlimited resources of the cloud and enhancing the performance of the smartphones. By using this framework the application developers will be able to increase the capabilities of the smartphones making them even more feature rich.


Smartphone Offloading Cloud Android 


  1. 1.
    Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., Li, Q.: Comparison of several cloud computing platforms. In: Proceedings of IEEE international conference on Information Science and Engineering, 23–27 (2009)Google Scholar
  2. 2.
    National Institute of Science and Technology.: The NIST definition of cloud computing. (2010)
  3. 3.
    Buyya, R., Broberg, J., Goscinski, A.: Introduction to cloud computing. In: Cloud Computing: Principles and Paradigms. Wiley Press [Online]. 1–44. (2009)
  4. 4.
    SONG, W., SU, X..: Review of mobile cloud computing. In IEEE 3rd International Conference on Communication Software and Networks, 1–4 (2011)Google Scholar
  5. 5.
    Health and Wellness - Phone Apps. University of California.
  6. 6.
    Saarinen, A., Siekkinen, M., Xiao, Y., Nurminen, J.K., Kemppainen, M., Hui, P. Smartdiet: offloading popular apps to save energy. ACM SIGCOMM Conference, 297–298 (2012)Google Scholar
  7. 7.
    Android Open Source Project. Philosophy and Goals. Google. (2012)
  8. 8.
    Rudenko, A., Reiher, P., Popek, G.J., Kuenning, G.H.: Saving portable computer battery power through remote process execution. In: MCCR’98–ACM SIGMOBILE Mobile Computing and Communications Review Newsletter. Vol. 2, no. 1, 19–26 (1998)Google Scholar
  9. 9.
    Chun, B.G., Maniatis, P.: Augmented smartphone applications through Clone Cloud execution. In: Proceedings of 12th conference on Hot topics in operating systems, 8–8 (2009)Google Scholar
  10. 10.
    Chun, B.G., Ihm, S., Manitis, P., Naik M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of 6th Conference on Computer Systems, 301–314 (2011)Google Scholar
  11. 11.
    Chen, E.Y., Itoh, M.: Virtual smartphone over IP. In: Proceedings of IEEE international conference on World of Wireless Mobile and Multimedia Networks, 1–6 (2010)Google Scholar
  12. 12.
    Chen, E., Ogata, S., Horikava, K.: Offloading android applications to the cloud. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 788–793 (2012)Google Scholar
  13. 13.
    Portokalidis, G., Homburg, P., Anagnostakis K., Bos, H.: Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, 347–356 (2010)Google Scholar
  14. 14.
    Cuervo, E., Balasubramanian, A., Cho, D.K., Wolman, A., Saroiu, S., Chandra, R., Bahl,P.: MAUI: Making Smartphones Last Longer with Code Offload. In Proceedings of the 8th international conference on Mobile systems, applications, and services, 49–62 (2010)Google Scholar
  15. 15.
    Singh S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Inter. J. Comput. Sci. 2(1): 85–92 (2007)Google Scholar
  16. 16.
    Singh, S., Bawa, S.: A framework for handling security issues in grid environment using web services security specifications. In: Second International Conference on Semantics, Knowledge and Grid, : SKG’06, Guilin,China 68(2008), (2006)Google Scholar
  17. 17.
    Singh, G., Singh, S.: A comparative study of privacy mechanisms and a novel privacy mechanism [Short Paper]. In: ICICS’09 Proceedings of the 11th International Conference on Information and Communication Security, Beijing, China. 346–358 (2009)Google Scholar
  18. 18.
    Singh, S.: Trust based authorization framework for grid services. J. Emerg. Trends Comput. Inf. Sci. 2(3): 136–144 (2011)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentNITTTRChandigarhIndia

Personalised recommendations