Transcript ITEC1312

NETE4631
Mobile Cloud Computing
Lecture Notes #10
1
Security Mapping - Recap





Determine which resources you are planning to
move to the cloud
Determine the sensitivity of the resources to risk
Determine the risk associated with the particular
cloud deployment type (public, private, or hybrid
models) of a resource
Take into account the particular cloud service
model that you will be using
If you have selected a particular cloud provider,
you need to evaluate its system to understand
how data is transferred, where it is stored, and
2
how to move data both in and out of the cloud
Securing Approach – Recap (2)


Techniques for securing applications,
data, management, network, and
physical hardware
Comply to compliance standards
3
_aaS applications – Recap (3)

IDaaS (Identity as a Service )

CaaS (Compliance as a Service)
4
Lecture Outline



Mobile market
Adopting mobile cloud applications
Mobile web services


Service discovery
Push technology
5
Mobile Market
6
Number of Subscribers
7
Adopting Mobile Cloud Applications


One application on cloud can be accessed by
multiple types of clients.
Mobile cloud computing


A model where processing is done in the cloud,
data is stored in the cloud, mobiles device serves as
a presentation platform or a display
Advantage of cloud apps to mobile cloud


Thinner devices -> less processing, consume less
power, and have better battery life
Avoidance of vendor lock-in.
8
Adopting Mobile Cloud Applications (2)

Customized clients and GUIs for each
specific type of client. e.g.,



Featured phones with light weight
operating systems.
Smart phones with sophisticated operating
systems. e.g., iOS, Android, Windows
Mobile, Symbian.
Less processing power, memory and
storage but needs to be aware of
bandwidth and display resolutions.
9
Android Market
10
Apple Mobile Me
Picture from Alexandra Institute
11
iPhone Application Hosting by Amazon
Picture from Alexandra Institute
12
iAWS Manager
Picture from Alexandra Institute
13
Mobile Web Services


Mobile web service are those in which
information is transferred between
applications (browser) and services over
the internet.
Can make use of specific information
about the context of the device and its
users.


Physical context
Logical context
14
SOA Approach to processing requests
using contextual data from mobile users
15
Service Discovery


Web services are useful only if they can
be discovered by mobile devices and
accessed by mutually supported protocol.
WS-Discovery from OASIS Standard



WSDL (Web Service Description Language)
UDDI (Universal Description, Discovery, and
Integration)
SOAP (Simple Object Access Protocol)
16
Mobile Web Services (2)

Mobile interoperability needs to be
addressed in terms of




Variable screen size and resolution.
Slow network transmission.
Different methods of navigation through the
interface.
Vendor lock-in


Exclusion of support for certain file types such as
PDF, and cookies, and technologies such as
Adobe Flash.
Onerous transmission costs.
17
Homepage of New York Times
18
Push Technology

Can make use of push services for






Automated software updates and installations
Instant messaging
Email
RSS services
Performing synchronization of data with cloud
Can use SMS services in case of
unavailability of internet.
19
BlackBerry Push Service
20
References

Chapter 20, 21 of Course Book: Cloud
Computing Bible, 2011, Wiley Publishing
Inc.
21