We take the example of performing content-
based image retrieval (CBIR) on a collection of
images captured by a mobile phone. Here we
consider that the total amount of data is 15 MB. We
set the energy consumption (0.9
) when
computed entirely in mobile phones as benchmark 1
and that (2.578571) using Kumar and Lu’s
model as benchmark 2 (for numerical assumptions
see Table 2). With respect to benchmark 1, our
framework leads to decreased energy consumption
for computations using only public (percentage
improvement 99.79%) or only private (99.79%) or
mixed (32.07%) for Scenario 2 and for all types of
data (single or mixed) in Scenario 3 (99.79% both).
With respect to benchmark 2, there has been
decrease in energy consumption in all scenarios. The
least energy consumption occurs in scenario 3 where
no data is ever uploaded/downloaded during
computation and the mobile phone need not perform
any security related computation for computations in
the cloud. The energy consumption for scenario 1 is
relatively more (as compared to that for scenario 3)
because all types of data must be uploaded/
downloaded and proper security computations
relevant to the data have to be performed by the
mobile phone whenever the computation uses such
data.
The meanings of symbols used are presented in
Table 2 and details of the model under different
5 FUTURE SCOPE
People and processes are an integral part of every
organization. Without the cooperation from people,
processes can hardly be a success. In the era of
BYOD (bring your own device), there is a thin line
between enterprise provided infrastructure and
personal devices. This immediately leads to some
very interesting extension of our work for the
enterprise scenario. 1) Automatic identification and
classification of organization specified sensitive data
as outlined in policy 2) Identifying additional
sensitive data and auto-protection overriding any
user-imposed possible information leakage channels;
To better address energy efficiency vs. security
issue we wish to look at cost and energy efficiency
of offloading 1) when computing with real-time
data; 2) assured deletion of data and preventing
threats on control data (account-related data, battery
consumption data etc). The framework has been
proposed for mobile devices for energy efficiency.
Security considerations and setup will be equally
applicable for any computing device for end-users
that needs protection from data leakage.
REFERENCES
Zhang, X., Schiffman, J.,Gibbs, S., Kunjithapam, A.,
Jeong, S.,2009. Securing Elastic Applications on
Mobile Devices for Cloud Computing. In CCSW’09,
Proceedings of the 2009 ACM Workshop on Cloud
Computing Security, pp. 127-134.ACM.
Kosta, S., Aucinas, A.,Hui, P., Mortier, R., Zhang,
X.,2011. Unleashing the Power of Mobile Cloud
Computing using ThinkAir. In arXiv:1105.3232.
arXiv.org.
Chun, B., Ihm, S., Maniatis, P.,Naik, M., Patti, A.,2011.
CloneCloud: Elastic Execution between Mobile
Device and Cloud. In EuroSys’11, Proceedings of the
6
th
conference on Computer systems, pp. 301-314.
ACM.
Zhou, Z., Huang, D., 2011. Efficient and Secure Data
Storage Operations for Mobile Cloud Computing.In
IACR Cryptology ePrint Archive 2011: 185(2011).
IACR.
Kumar, K., Lu, Y., 2010. Cloud Computing for Mobile
Users: Can Offloading Computation Save Energy? In
Computer Vol. 43, No. 4, pp. 51-56. IEEE Computer
Society.
Cuervo, E., Balasubramanian, A., Cho, D., Wolman,
A.,Saroiu, S.,Chandra, R., Bahl, P.,2010. MAUI:
Making Smartphones Last Longer with Code Offload.
In MobiSys’10, Proceedings of the 8
th
International
Conference on Mobile Systems, Applications and
Services, pp. 49-62. ACM.
Kamara, S., Raykova, M., 2011. Secure Outsourced
Computation in Multi-tenant Cloud. In WCSC’11,
Proceedings of the Workshop on Cryptography and
Security in Clouds. IBM.
Paczkowski, J., 2009.iPhone Owners Would Like to
Replace Battery. In AllThingsD.com, August 21, 2009.
Dow Jones.
Luo, X., 2009. From Augmented Reality to Augmented
Computing: A Look at Cloud Mobile Convergence. In
ISUVR’09, Proceedings of the 2009 International
Symposium on Ubiquitous Virtual Reality, pp. 29-32.
IEEE Computer Society.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., Neugebauer, R., Pratt, I., Warfield, A.,2003.
Xen and the Art of Virtualization. In SOSP’03,
Proceedings of the 19
th
ACM Symposium on Operating
systems principles, pp. 164-177. ACM.
Goldreich, O., 2004. Foundations of Cryptography
Volume II Basic Applications. Cambridge University
Press.
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
474