floading platform called CAOS/CAOS D2D. Our ex-
periments show that encryption support may increase
the total offloading time up to 5.35% (±0.64%). But
they also show that the larger the offloading time, the
less the impact of encryption procedures. The encryp-
tion key size seems irrelevant compared with the in-
fluence of downloading and uploading times, so big-
ger keys should be used instead of weaker ones. Re-
garding energy consumption, our experiments show
that the encryption process consumes up to 878 mJ,
and the longer the encryption key and the bigger the
data to be transferred, the higher the energy consump-
tion. As future work, we intend to expand the ex-
perimentation and test a set of other mobile devices
leveraging different wireless technologies (e.g., 4G,
5G), besides using public cloud instances as remote
execution environments and test other cryptographic
algorithms.
ACKNOWLEDGMENTS
The authors would like to thank The Cear
´
a State
Foundation for the Support of Scientific and Tech-
nological Development (FUNCAP) for the financial
support (grant number 6945087/2019).
REFERENCES
Abbas, N., Zhang, Y., Taherkordi, A., and Skeie, T. (2018).
Mobile edge computing: A survey. IEEE Internet of
Things Journal, 5(1):450–465.
Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.,
and Simon, S. (2018). Recommendation for pair-wise
key-establishment using integer factorization cryptog-
raphy. Technical report, National Institute of Stan-
dards and Technology.
Bhatia, T. and Verma, A. (2017). Data security in mobile
cloud computing paradigm: a survey, taxonomy and
open research issues. The Journal of Supercomputing,
73(6):2558–2631.
Chen, M. and Hao, Y. (2018). Task offloading for mobile
edge computing in software defined ultra-dense net-
work. IEEE Journal on Selected Areas in Communi-
cations, 36(3):587–597.
Costa, P. B., Rego, P. A. L., Rocha, L. S., Trinta, F. A. M.,
and de Souza, J. N. (2015). Mpos: A multiplatform
offloading system. In Proceedings of the 30th An-
nual ACM Symposium on Applied Computing, SAC
’15, pages 577–584, New York, NY, USA. ACM.
Dinh, H. T., Lee, C., Niyato, D., and Wang, P. (2011). A
survey of mobile cloud computing: architecture, ap-
plications, and approaches. Wireless Communications
and Mobile Computing.
Diro, A. A., Chilamkurti, N., and Nam, Y. (2018). Analy-
sis of lightweight encryption scheme for fog-to-things
communication. IEEE Access, 6:26820–26830.
Donald, A. C. and Arockiam, L. (2015). A secure authen-
tication scheme for mobicloud. In 2015 International
Conference on Computer Communication and Infor-
matics (ICCCI), pages 1–6.
Dos Santos, G. B., Trinta, F. A., Rego, P. A., Silva, F. A.,
and De Souza, J. N. (2018). Performance and energy
consumption evaluation of computation offloading us-
ing caos d2d. In 2018 IEEE Global Communications
Conference (GLOBECOM), pages 1–7. IEEE.
Fernando, N., Loke, S. W., and Rahayu, W. (2013). Mo-
bile cloud computing: A survey. Future Generation
Computer Systems, 29(1):84 – 106.
Gomes, F., Viana, W., Rocha, L., and Trinta, F. (2017a). On
the evaluation of a contextual sensitive data offload-
ing service: the cop case. Journal of Information and
Data Management, 8(3):197.
Gomes, F. A., Rego, P. A., Rocha, L., de Souza, J. N., and
Trinta, F. (2017b). CAOS: A context acquisition and
offloading system. In 2017 IEEE 41st Annual Com-
puter Software and Applications Conference (COMP-
SAC), pages 957–966. IEEE.
Gupta, B. B., Yamaguchi, S., and Agrawal, D. P. (2018).
Advances in security and privacy of multimedia big
data in mobile and cloud computing. Multimedia
Tools and Applications, 77(7):9203–9208.
Mollah, M. B., Azad, M. A. K., and Vasilakos, A. (2017).
Security and privacy challenges in mobile cloud com-
puting: Survey and way ahead. Journal of Network
and Computer Applications, 84:38–54.
Padhi, S., Tiwary, M., Priyadarshini, R., Panigrahi, C. R.,
and Misra, R. (2016). Secomn: Improved security ap-
proach for opportunistic mobile networks using cyber
foraging. In 2016 3rd International Conference on
Recent Advances in Information Technology (RAIT),
pages 415–421.
Rego, P. A., Trinta, F. A., Hasan, M. Z., and de Souza,
J. N. (2019). Enhancing offloading systems with smart
decisions, adaptive monitoring, and mobility support.
Wireless Communications and Mobile Computing.
Rego, P. A. L., Costa, P. B., Coutinho, E. F., Rocha, L. S.,
Trinta, F. A., and de Souza, J. N. (2016). Performing
computation offloading on multiple platforms. Com-
puter Communications.
Sanaei, Z., Abolfazli, S., Gani, A., and Buyya, R. (2014).
Heterogeneity in mobile cloud computing: Taxonomy
and open challenges. Communications Surveys Tuto-
rials, IEEE, 16(1):369–392.
Satyanarayanan, M., Bahl, P., Caceres, R., and Davies, N.
(2009). The case for vm-based cloudlets in mobile
computing. Pervasive Computing, IEEE, 8(4):14–23.
Silva, B., Sabino, A., Junior, W., Oliveira, E., J
´
unior, F., and
Dias, K. (2017). Performance evaluation of cryptog-
raphy on middleware-based computational offloading.
In 2017 VII Brazilian Symposium on Computing Sys-
tems Engineering (SBESC), pages 205–210.
Varghese, B. and Buyya, R. (2018). Next generation cloud
computing: New trends and research directions. Fu-
ture Generation Computer Systems, 79:849–861.
Zhang, Y., Huang, G., Liu, X., Zhang, W., Mei, H., and
Yang, S. (2012). Refactoring android java code for
on-demand computation offloading. SIGPLAN Not.,
47(10):233–248.
A Study about the Impact of Encryption Support on a Mobile Cloud Computing Framework
407