Optimizing Battery Utilization and Reducing Time Consumption in Smartphones Exploiting the Power of Cloud Computing

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 236)


Over the past few years, the usage and boost of handheld devices such as Personal Digital Assistants (PDAs) and smartphones have increased rapidly and estimates show that they will even exceed the number of Personal Computers (PCs) by 2013. Smartphones enable a rich, new, and ubiquitous user experience, but have limited hardware resources on computation and battery. In this paper, the focus has been made on enhancing the capabilities of smartphones by using cloud computing and virtualization techniques to shift the workload from merely a smartphone to a resource-rich computational cloud environment.


Cloud computing Smartphone Offloading 


  1. 1.
    Gartner: gartner research report. (2011)
  2. 2.
    Stanley: internet trends report (2010)Google Scholar
  3. 3.
    Portokalidis, P.H., Anagnostakis, H.B.: Paranoid android: versatile protection for smartphones, 26th annual computer security applications conference, pp. 347–356 (2010)Google Scholar
  4. 4.
    Chun, P.M: Augmented smartphone applications through clone cloud execution, 12th conference on hot topics in operating systems, pp. 8–8 (2009)Google Scholar
  5. 5.
    Chun, S.I., Manitis, M., Patti: Clonecloud: elastic execution between mobile device and cloud, 6th Conference on computer systems, pp. 301–314 (2011)Google Scholar
  6. 6.
    Zhao, Z.X., Chi, S.Z., Cao.: mirroring smartphones for good: a feasibility study, ZTE, communications (2011)Google Scholar
  7. 7.
    Wikipedia : android (Operating System) (2012)
  8. 8.
    Kepes: understanding the cloud computing stack SaaS, Paas, IaaS. diversity limited (2011)Google Scholar
  9. 9.
    Sengupta, V.K., Sharma: cloud computing security- trends and research directions, IEEE World Congr Serv, pp. 524–531 (2011)Google Scholar
  10. 10.
    Dillon, C.W., Chang: Cloud computing: issues and challenges, 24th IEEE international conference on advanced information networking and applications, pp. 27–33 (2010)Google Scholar
  11. 11.
    Singh, S.B.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(1), 85–92 (2007)Google Scholar
  12. 12.
    Singh, S.B.: Design of a framework for handling security issues in grids, international conference on information technology, ICIT’06, pp. 178–179 (2006)Google Scholar
  13. 13.
    Singh, S. B.: A framework for handling security issues in grid environment using web services security specifications, second international conference on semantics, knowledge and grid, 2006, SKG’06, Guilin, China, pp. 68 (2006)Google Scholar
  14. 14.
    Singh, S.B.: A privacy policy framework for grid and web services. Inform. Technol. J. (6), pp. 809–817 (2007)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentNITTTRChandigarhIndia

Personalised recommendations