{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T21:56:55Z","timestamp":1674165415636},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>Recently, smartphone technologies have evolved quickly and offered end users the computing power and networking capabilities required to perform useful network and multimedia applications. However, due to limited physical sizes and battery capacities, the current generation of smartphones cannot yet fulfill the requirements of sophisticated applications of which personal computers are capable. One way to solve this problem is to minimize the workload on a smartphone as much as possible by offloading portions of an application to a server. The solution is particularly attractive today as cloud computing provides the needed server resources at relatively low costs. This paper proposes a novel, lightweight application migration mechanism for the users of smartphones to suspend the execution of applications and offload them to the cloud. The authors also developed a framework to perform Android applications efficiently with virtual phones in the cloud with a virtual storage. This paper discusses the migration mechanism and evaluates its effectiveness on the Android smartphone. This approach may effectively offload workload for Android applications even with low-speed mobile network.<\/p>","DOI":"10.4018\/jghpc.2011040102","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:24:39Z","timestamp":1319041479000},"page":"14-28","source":"Crossref","is-referenced-by-count":6,"title":["Migrating Android Applications to the Cloud"],"prefix":"10.4018","volume":"3","author":[{"given":"Shih-Hao","family":"Hung","sequence":"first","affiliation":[{"name":"National Taiwan University, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeng-Peng","family":"Shieh","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen-Pang","family":"Lee","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"jghpc.2011040102-0","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2009). Above the clouds: A Berkeley view of cloud computing (Tech. Rep. No. UCB\/EECS-2009-28). Berkeley, CA: University of California."},{"key":"jghpc.2011040102-1","doi-asserted-by":"crossref","unstructured":"Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., & Yang, H.-I. (2002). The case for cyber foraging. In Proceedings of the 10th ACM SIGOPS European Workshop (pp. 87-92).","DOI":"10.1145\/1133373.1133390"},{"key":"jghpc.2011040102-2","doi-asserted-by":"publisher","DOI":"10.1145\/320141.320146"},{"key":"jghpc.2011040102-3","unstructured":"Bellard, F. (2005). QEMU, a fast and portable dynamic translator. In Proceedings of the Annual USENIX Technical Conference (pp. 41-46)."},{"key":"jghpc.2011040102-4","author":"P. A.Bernstein","year":"1987","journal-title":"Concurrency control and recovery in database systems"},{"key":"jghpc.2011040102-5","first-page":"305","article-title":"Protection of buffer overflow attacks via dynamic binary translation.","volume":"2","author":"C. C.Chen","year":"2010","journal-title":"Reliable and Autonomous Computational Science"},{"key":"jghpc.2011040102-6","unstructured":"Chun, P., & Maniatis, B. G. (2009). Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th Workshop on Hot Topics in Operating Systems (p. 8)."},{"key":"jghpc.2011040102-7","doi-asserted-by":"crossref","unstructured":"Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (pp. 49-62).","DOI":"10.1145\/1814433.1814441"},{"key":"jghpc.2011040102-8","doi-asserted-by":"crossref","unstructured":"Flinn, J., Narayanan, D., & Satyanarayanan, M. (2001). Self-tuned remote execution for pervasive computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (pp. 61-66).","DOI":"10.1109\/HOTOS.2001.990062"},{"key":"jghpc.2011040102-9","unstructured":"FUSE. (n. d.). Filesystem in userspace. Retrieved from http:\/\/fuse.sourceforge.net\/"},{"key":"jghpc.2011040102-10","unstructured":"Garfinkel, T., & Rosenblum, M. (2005). When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proceedings of the 10th Conference on Hot Topics in Operating Systems (Vol. 10)."},{"key":"jghpc.2011040102-11","unstructured":"Google Inc. (2011). Google code project. Retrieved from http:\/\/code.google.com\/"},{"key":"jghpc.2011040102-12","first-page":"181","article-title":"Granularity of locks and degrees of consistency in a shared data base","author":"J. N.Gray","year":"1994","journal-title":"Readings in database systems"},{"key":"jghpc.2011040102-13","unstructured":"Keir, C. C., Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., et al. (2005). Live migration of virtual machines. In Proceedings of the 2nd ACM\/USENIX Symposium on Networked Systems Design and Implementation (pp. 273-286)."},{"key":"jghpc.2011040102-14","unstructured":"Nath, P., Kozuch, M. A., O\u2019Hallaron, D. R., Harkes, J., Satyanarayanan, M., Tolia, N., et al. (2006). Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines. In Proceedings of the USENIX Annual Technical Conference (pp. 363-378)."},{"key":"jghpc.2011040102-15","doi-asserted-by":"crossref","unstructured":"Osman, S., Subhraveti, D., Su, G., & Nieh, J. (2002). The design and implementation of Zap: A system for migrating computing environments. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (pp. 361-376).","DOI":"10.1145\/844128.844162"},{"key":"jghpc.2011040102-16","unstructured":"Pfaff, B., Garfinkel, T., & Rosenblum, M. (2006). Virtualization aware file systems: Getting beyond the limitations of virtual disks. In Proceedings of the 3rd Symposium of Networked Systems Design and Implementation (pp. 353-366)."},{"key":"jghpc.2011040102-17","doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H. S., Zhou, Y., & Wu, Y. (2006). Lift: A lowoverhead practical information flow tracking system for detecting security attacks. In Proceedings of the 39th Annual IEEE\/ACM International Symposium on Microarchitecture (pp. 135-148).","DOI":"10.1109\/MICRO.2006.29"},{"key":"jghpc.2011040102-18","doi-asserted-by":"publisher","DOI":"10.1145\/584007.584008"},{"key":"jghpc.2011040102-19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.46"},{"key":"jghpc.2011040102-20","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Kuntze, N., & Kasper, M. (2008). On the deployment of mobile trusted modules. In Proceedings of the Wireless Communications and Networking Conference (pp. 3169-3174).","DOI":"10.1109\/WCNC.2008.553"},{"key":"jghpc.2011040102-21","doi-asserted-by":"crossref","unstructured":"Sevinc, P. E., Strasser, M., & Basin, D. (2007). Securing the distribution and storage of secrets with trusted platform modules. In Proceedings of the First IFIP TC6\/WG8.8 \/WG11.2 International Conference on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems (pp. 53-66).","DOI":"10.1007\/978-3-540-72354-7_5"},{"key":"jghpc.2011040102-22","author":"J.Smith","year":"2005","journal-title":"Virtual machines: Versatile platforms for systems and processes"},{"key":"jghpc.2011040102-23","unstructured":"TechCrunch. (2010). 100,000 android applications submitted to date, AndroLib claims. Retrieved from http:\/\/techcrunch.com\/2010\/07\/30\/android-market-100000\/"},{"key":"jghpc.2011040102-24","unstructured":"Wilander, J., & Kamkar, M. (2003). A comparison of publicly available tools for dynamic buffer overflow prevention. In Proceedings of the Network and Distributed System Security Symposium (pp. 4-15)."}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=54193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:59:01Z","timestamp":1654106341000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jghpc.2011040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jghpc.2011040102","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}