«Industrial Applications of Networking ( e.g., Remote Surgery, Robot Communication and Control» Essay Example

  • Category:
    Logic & Programming
  • Document type:
  • Level:
  • Page:
  • Words:



Authors Name/s per 1st Affiliation (Author)

line 1 (of Affiliation): dept. name of organization

line 2: name of organization, acronyms acceptable

line 3: City, Country

line 4: e-mail address if desired

Authors Name/s per 2nd Affiliation (Author)

line 1 (of Affiliation): dept. name of organization

line 2: name of organization, acronyms acceptable

line 3: City, Country

line 4: e-mail address if desired

I. Introduction

Over the years processes in the sector of application mobile based computing and network based computing has been initiated as an underlying technology for mobile services. It involves the composition of wireless networks and cloud computing to render high valuable computational facilities to mobile user’s network operators together with cloud computing providers. This is a new platform to bind cloud computing and mobile devices to come up with a better architecture.

It is an infrastructure where data processing and data storage can take place in an external environment to the mobile device. The clouds store a huge amount of data and do the heavy lifting of activities which are computing intensive. The fast advancement of mobile computing has emerged a powerful tool in the technological advancements.

As a result of major application model in the internet era, mobile vs. cloud computing has become a critical topic in the research of industrial and scientific communities. The applications of mobile cloud computing have been popularized day by day. Various applications grounded on mobile cloud computing have been established and extended to users like the google maps, mobile navigation systems, voice search and other application developed on the Android platform. This paper aims to answer two research questions:

RQ1. What challenges and issues in line with cloud computing have researchers been concentrating on over the past three years?

RQ2. How has the evolution of interest in various kinds of issues and challenges over these years?


For every item mentioned in the review, I have borrowed the following pieces of information:

  • Year of publication

  • The title

  • The kind of Contribution

  • The matters and challenges discussed in the contribution.

The articles used in the review were taken from scholarly articles into an excel sheet. The meta-data of the articles listed as described were skimmed one by one to get pieces of information not readily obtainable from the title like the challenges and the matters and the challenges discussed together with the topic they are categorizable in.

III. Data analysis

The raw results were analyzed using a multi-step analysis process to account for the criteria applied in choosing the articles. The following examination was conducted.

The topic consideration was done in the literature and the fraction of publications relevant to each of the topics;

  • The number of articles in each year over the period of interest and;

  • The transition in focus of articles over the term of interest;

  • The number of various items from different countries and;

  • The focus of items from various countries.


The initial articles involved 100 items. The list passed through the process and the outcome was 50. Considering the subjectivity of the choice of our data sources, query construction and also the use of inclusion and exclusion protocol, the article listed which were published before 2007 were excluded considering the time period of interest.


Analyzing the collected data, we have found ten categories of issues that have been focused on by researchers over the past three years:

Security and privacy, interoperability, economic challenges, data management, service management, legal issues, quality, software, trust, and application


After the analysis of the weightiest topic arose to be the mobile cloud computing and its security which could help solve much of the issues above when researched in depth.



  1. Hoang T. Dinh & Chonho Lee & Dusit Niyato & Ping Wang.A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches. Wireless Communications and Mobile Computing – WiLEY

  2. J.Oberheide & E. Cooke & F. Jahanian. (2008).»CloudAV: N-version antivirus in the network cloud». Processing of the 17th USENIX Security Symposium.

  3. J. Oberheide & E. Cooke & F. Jahanian. (2007).»Rethinking antivirus: Executable analysis in the network cloud». Proceedings of the 2nd USENIX workshop on hot topics in security (HOTSEC).

  4. AppLabs.» Testing the Cloud». White paper, Internet:http://www.applabs.com/html/TestingtheCloud_7 86.html

  5. Chow. R&J akobsson. M & Masuoka.R & Molina.J & Niu.Y & Shi.E& Song.Z.(2010). Authentication in the clouds: a framework and its application to mobile users. Proceedings. ACM Cloud Computing Security Workshop, CCSW ’10, Chicago, USA.

  6. B. Wrenn, CISSP, ISSEP. Unisys Secure «Cloud Addressing the Top Threats of Cloud Computing.» (white paper).Accessed 25th June.

  7. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.

  8. Huang, D., Zhou, Z., Xu, L., Xing, T., &Zhong, Y. 2011. Secure data processing framework for mobile cloud computing. In Computer Communications Workshops (INFOCOM wkshps), 2011 IEEE Conference on (pp. 614618). IEEE.

  9. Buyya, R., Broberg, J., &Goscinski, A. M. (Eds.). 2010. Cloud computing: Principles and paradigms (Vol. 87). John Wiley & Sons, 2010

  10. Liu, F., Shu, P., Jin, H., Ding, L., Yu, J., Niu, D., & Li, B. 2013. Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and

  11. W. Song and X. Su, “Review of Mobile Cloud Computing”, 3rd International Conference of Communication Software and Networks (ICCSN), IEEE, DOI: 10.1109/ICCSN.2011.6014374, (2011), pp. 1-4

  12. H. Singh, “Current Trends in Cloud Computing: A Survey of Cloud Computing Systems”, International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956., vol. 1, no 3, (2012), pp. 1214-1219

  13. M. Chen, Y. Wu and A. V. Vasilakos, “Advances in Mobile Cloud Computing”, Mobile Network Applications, no. 19, (2014), pp. 131-132

Vallina-Rodriguez, N., &Crowcroft, J. 2011. ErdOS: achieving energy savings in mobile OS. In Proceedings of the sixth international workshop on Khan and K. Ahirwar, “Mobile Cloud Computing As A Future Of Mobile Multimedia Database”, International Journal of Computer Science and Communication, vol. 2, no. 1, (2011) January-June, pp. 219-22

  1. MobiArch (pp. 37-42). ACM

  2. Marinelli, E. E. 2009. Hyrax: cloud computing on mobile devices using MapReduce (No. CMU-CS-09-164). Carnegie-mellonuniv Pittsburgh PA school of computer science, 2009.

  3. Chang, J., Balan, R. K., &Satyanarayanan, M. 2005. Exploiting rich mobile environments, 2005

  4. Sarah Perez, August 4, 2009, Why cloud computing is the future of mobile, http://www.readwriteweb.com/archives/why_cloud_com puting_is_the_future_of_mobile.php, Retrieved on February 2015

  5. Satyanarayanan, M. 2011. Mobile computing: the next decade. ACM SIGMOBILE Mobile Computing and Communications Review, 15(2), 2-10.

  6. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., &Buyya, R. 2014. Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. Communications Surveys & Tutorials, IEEE, 16(1), 337-368.

  7. Christensen, J. H. 2009. Using RESTful web-services and cloud computing to create next generation mobile applications. In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (pp. 627-634). ACM