{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:27:54Z","timestamp":1685107674995},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13677-017-0079-y","type":"journal-article","created":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T09:12:15Z","timestamp":1492506735000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Energy-efficient service-oriented architecture for mobile cloud handover"],"prefix":"10.1186","volume":"6","author":[{"given":"Qassim","family":"Bani Hani","sequence":"first","affiliation":[]},{"given":"Julius P.","family":"Dichter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"79_CR1","first-page":"375","volume-title":"Green Computing Conference, 2010 International","author":"H Yuan","year":"2010","unstructured":"Yuan H, Kuo C-CJ, Ishfaq A (2010) Energy efficiency in data centers and cloud-based multimedia services: An overview and future directions. In: Green Computing Conference, 2010 International., pp 375\u2013382"},{"key":"79_CR2","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/SURV.2012.111412.00045","volume":"3","author":"M Shiraz","year":"2013","unstructured":"Shiraz M, Abdullah G, Rashid Hafeez K, Rajkumar B (2013) A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. Communications Surveys & Tutorials, IEEE 15 3:1294\u20131313","journal-title":"Communications Surveys & Tutorials, IEEE 15"},{"key":"79_CR3","doi-asserted-by":"crossref","unstructured":"Rizvi S, Razaque A, Katie C (2015) Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. In: Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference., pp 31\u201336","DOI":"10.1109\/CSCloud.2015.87"},{"key":"79_CR4","doi-asserted-by":"crossref","unstructured":"Razaque, Abdul, Syed S. Rizvi, Meer J. Khan, Hani QB, Dichter JP, Parizi RM (2017) \"Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.\" Computers & Security 66:169-184","DOI":"10.1016\/j.cose.2017.01.006"},{"key":"79_CR5","first-page":"393","volume":"1","author":"M Othman","year":"2014","unstructured":"Othman M, Sajjad Ahmad M, Samee Ullah K (2014) A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials 16 1:393\u2013413","journal-title":"IEEE Communications Surveys & Tutorials 16"},{"issue":"4","key":"79_CR6","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TMM.2013.2240674","volume":"15","author":"S Wang","year":"2013","unstructured":"Wang S, Dey S (2013) Adaptive mobile cloud computing to enable rich mobile multimedia applications. IEEE Transactions on Multimedia 15(4):870\u2013883","journal-title":"IEEE Transactions on Multimedia"},{"key":"79_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2258056.2258058","volume-title":"Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access","author":"S Shekhar","year":"2012","unstructured":"Shekhar S, Viswanath G, Michael RE, KwangSoo Y (2012) Spatial big-data challenges intersecting mobility and cloud computing. In: Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access., pp 1\u20136"},{"issue":"1","key":"79_CR8","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/SURV.2013.050113.00090","volume":"16","author":"Z Sanaei","year":"2014","unstructured":"Sanaei Z, Abolfazli S, Gani A, Buyya R (2014) Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials 16(1):369\u2013392","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"79_CR9","first-page":"92","volume":"3","author":"H Zhang","year":"2015","unstructured":"Zhang H, Chunxiao J, Julian C, Victor CM L (2015) Cooperative interference mitigation and handover management for heterogeneous cloud small cell networks. IEEE Wireless Communications 22 3:92\u201399","journal-title":"IEEE Wireless Communications 22"},{"key":"79_CR10","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.jnca.2014.04.009","volume":"43","author":"A Gani","year":"2014","unstructured":"Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, Khan S (2014) A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J Netw Comput Appl 43:84\u2013102","journal-title":"J Netw Comput Appl"},{"key":"79_CR11","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1002\/dac.1189","volume":"6","author":"K\u2010L Chiu","year":"2011","unstructured":"Chiu K\u2010L, Yuh\u2010Shyan C, Ren\u2010Hung H (2011) Seamless session mobility scheme in heterogeneous wireless networks. International Journal of Communication Systems 24 6:789\u2013809","journal-title":"International Journal of Communication Systems 24"},{"key":"79_CR12","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/CLOUD.2010.16","volume-title":"Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference","author":"S Ferretti","year":"2010","unstructured":"Ferretti S, Vittorio G, Fabio P, Elisa T (2010) Seamless support of multimedia distributed applications through a cloud. In: Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference., pp 548\u2013549"},{"key":"79_CR13","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1002\/wcm.844","volume":"4","author":"Y\u2010S Chen","year":"2011","unstructured":"Chen Y\u2010S, Kun\u2010Lin W (2011) A cross\u2010layer partner\u2010assisted handoff scheme for hierarchical mobile IPv6 in IEEE 802.16 esystems. Wireless Communications and Mobile Computing 11 4:522\u2013541","journal-title":"Wireless Communications and Mobile Computing 11"},{"key":"79_CR14","doi-asserted-by":"crossref","unstructured":"Razaque A, Rizvi SS (2017) Privacy preserving model: a new scheme for auditing cloud stakeholders. J Cloud Comput 6:1\u20137.","DOI":"10.1186\/s13677-017-0076-1"},{"issue":"2","key":"79_CR15","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1007\/s11227-010-0459-2","volume":"59","author":"S Ryu","year":"2012","unstructured":"Ryu S, Lee K, Mun Y (2012) Optimized fast handover scheme in Mobile IPv6 networks to support mobile users for cloud computing. J Supercomput 59(2):658\u2013675","journal-title":"J Supercomput"},{"key":"79_CR16","unstructured":"Keke G, Qiu M, Zhao H, Tao L, Zong Z (2016) Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J Netw Comput Appl 5:46\u201354"},{"key":"79_CR17","doi-asserted-by":"crossref","unstructured":"Rakpong K, Niyato D, Wang P, Hossain E (2013) \"A framework for cooperative resource management in mobile cloud computing.\" IEEE J Sel Areas Commun 31;(12):2685\u20132700.","DOI":"10.1109\/JSAC.2013.131209"},{"issue":"4","key":"79_CR18","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1007\/s10586-013-0249-8","volume":"16","author":"D Lee","year":"2013","unstructured":"Lee D, Lee H, Park D, Jeong Y-S (2013) Proxy based seamless connection management method in mobile cloud computing. Clust Comput 16(4):733\u2013744","journal-title":"Clust Comput"},{"issue":"8","key":"79_CR19","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1049\/iet-com.2013.1142","volume":"8","author":"Q Qi","year":"2014","unstructured":"Qi Q, Liao J, Cao Y (2014) Cloud service-aware location update in mobile cloud computing. Communications, IET 8(8):1417\u20131424","journal-title":"Communications, IET"},{"key":"79_CR20","first-page":"195","volume-title":"Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference","author":"H Qi","year":"2012","unstructured":"Qi H, Abdullah G (2012) Research on mobile cloud computing: Review, trend and perspectives. In: Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference., pp 195\u2013202"},{"issue":"4","key":"79_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijitcs.2014.4401","volume":"4","author":"K Mayuri","year":"2014","unstructured":"Mayuri K, Ranjith KS (2014) A Novel secure handover mechansim in PMIPV6 networks. International Journal of Information Technology Convergence and Services 4(4):1","journal-title":"International Journal of Information Technology Convergence and Services"},{"key":"79_CR22","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1109\/ICEEOT.2016.7755020","volume-title":"Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference","author":"A Razaque","year":"2016","unstructured":"Razaque A, Saty Siva Varma N, Suharsha V, Dinesh Kumar A, Dammannagari Nayani R, Poojitha A, Divya V, Vamsee Sai M (2016) Secure data sharing in multi-clouds. In: Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference., pp 1909\u20131913"},{"key":"79_CR23","first-page":"1361","volume-title":"High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference","author":"S Rizvi","year":"2015","unstructured":"Rizvi S, Razaque A, Cover K (2015) Cloud Data Integrity Using a Designated Public Verifier. In: High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference., pp 1361\u20131366"},{"key":"79_CR24","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/IWCMC.2013.6583635","volume-title":"Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International","author":"H Suo","year":"2013","unstructured":"Suo H, Zhuohua L, Jiafu W, Keliang Z (2013) Security and privacy in mobile cloud computing. In: Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International., pp 655\u2013659"},{"issue":"1","key":"79_CR25","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/SURV.2013.070813.00285","volume":"16","author":"S Abolfazli","year":"2014","unstructured":"Abolfazli S, Sanaei Z, Ahmed E, Gani A, Buyya R (2014) Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials 16(1):337\u2013368","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"79_CR26","first-page":"9","volume":"2014","author":"Y Jiang","year":"2014","unstructured":"Jiang Y, Hu X, Sen W (2014) Transformation Matrix for Time Discretization Based on Tustin\u2019s Method. Math Probl Eng 2014:9","journal-title":"Math Probl Eng"},{"issue":"8","key":"79_CR27","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1016\/j.comcom.2010.11.010","volume":"34","author":"J M\u00e1rquez-Barja","year":"2011","unstructured":"M\u00e1rquez-Barja J, Calafate CT, Cano J-C, Manzoni P (2011) An overview of vertical handover techniques:Algorithms, protocols and tools. Comput Commun 34(8):985\u2013997","journal-title":"Comput Commun"},{"key":"79_CR28","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/ICCCW.2012.6316481","volume-title":"Communications in China Workshops (ICCC), 2012 1st IEEE International Conference","author":"S Abolfazli","year":"2012","unstructured":"Abolfazli S, Zohreh S, Muhammad S, Abdullah G (2012) MOMCC: market-oriented architecture for mobile cloud computing based on service oriented architecture. In: Communications in China Workshops (ICCC), 2012 1st IEEE International Conference., pp 8\u201313"},{"key":"79_CR29","first-page":"1","volume-title":"Kaleidoscope 2011: The Fully Networked Human?-Innovations for Future Networks and Services (K-2011), Proceedings of ITU","author":"M Gutierrez","year":"2011","unstructured":"Gutierrez M, Andres F, Neco V (2011) Mobile Cloud Computing based on service oriented architecture: Embracing network as a service for 3 RD party application service providers. In: Kaleidoscope 2011: The Fully Networked Human?-Innovations for Future Networks and Services (K-2011), Proceedings of ITU., pp 1\u20137"},{"key":"79_CR30","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2492348.2492354","volume-title":"Proceedings of the first international workshop on Mobile cloud computing & networking","author":"T Nishio","year":"2013","unstructured":"Nishio T, Ryoichi S, Tatsuro T, NarayanB M (2013) Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In: Proceedings of the first international workshop on Mobile cloud computing & networking., pp 19\u201326"},{"key":"79_CR31","first-page":"59","volume":"1","author":"KY Yee","year":"2011","unstructured":"Yee KY, Yilun C, Flora ST, Ang Wee T, Rajaraman K (2011) Cloud-based semantic service-oriented content provisioning architecture for mobile learning. Journal of Internet Services and Information Security 1 1:59\u201369","journal-title":"Journal of Internet Services and Information Security 1"},{"key":"79_CR32","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/ICCCW.2012.6316466","volume-title":"Communications in China Workshops (ICCC), 2012 1st IEEE International Conference","author":"Z Sanaei","year":"2012","unstructured":"Sanaei Z, Saeid A, Abdullah G, Muhammad S (2012) SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing. In: Communications in China Workshops (ICCC), 2012 1st IEEE International Conference., pp 14\u201319"},{"key":"79_CR33","doi-asserted-by":"crossref","unstructured":"Rizvi S, Karpinski K, Razaque A (2015) Novel architecture of self-organized mobile wireless sensor networks. J Comput Sci Eng 9(4):163\u2013176","DOI":"10.5626\/JCSE.2015.9.4.163"},{"issue":"3","key":"79_CR34","doi-asserted-by":"crossref","first-page":"5074","DOI":"10.3390\/s140305074","volume":"14","author":"A Razaque","year":"2014","unstructured":"Razaque A, Elleithy KM (2014) Energy-efficient boarder node medium access control protocol for wireless sensor networks. Sensors 14(3):5074\u20135117","journal-title":"Sensors"},{"key":"79_CR35","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/ICIS.2011.67","volume-title":"Computer and Information Science (ICIS), 2011 IEEE\/ACIS 10th International Conference","author":"L Guan","year":"2011","unstructured":"Guan L, Xu K, Meina S, Junde S (2011) A survey of research on mobile cloud computing. In: Computer and Information Science (ICIS), 2011 IEEE\/ACIS 10th International Conference., pp 387\u2013392"},{"issue":"4","key":"79_CR36","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2010.98","volume":"43","author":"K Kumar","year":"2010","unstructured":"Kumar K, Yung-Hsiang L (2010) Cloud computing for mobile users: Can offloading computation save energy? Computer 43(4):51\u201356","journal-title":"Computer"},{"key":"79_CR37","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2015.10.005","volume":"61","author":"M Alizadeh","year":"2016","unstructured":"Alizadeh M, Saeid A, Mazdak Z, Sabariah B, Kouichi S (2016) Authentication in mobile cloud computing: A survey. J Netw Comput Appl 61:59\u201380","journal-title":"J Netw Comput Appl"},{"key":"79_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1866835.1866837","volume-title":"Proceedings of the 2010 ACM workshop on Cloud computing security workshop","author":"R Chow","year":"2010","unstructured":"Chow R, Markus J, Ryusuke M, Jesus M, Yuan N, Elaine S, Zhexuan S (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop., pp 1\u20136"},{"key":"79_CR39","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.cose.2016.08.006","volume":"62","author":"A Razaque","year":"2016","unstructured":"Razaque A, Rizvi SS (2016) Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Computers & Security 62:328\u2013347","journal-title":"Computers & Security"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0079-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-017-0079-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0079-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T05:17:55Z","timestamp":1494393475000},"score":1,"resource":{"primary":{"URL":"http:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-017-0079-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1186\/s13677-017-0079-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,18]]},"article-number":"9"}}