Mobile Computing Application: A Review

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2018 by IJPTT Journal
Volume-8 Issue-1
Year of Publication : 2018
Authors : S.Shanmugapriya, Dr. K. Alagarsamy, A.Saranya
DOI :  10.14445/22492615/IJPTT-V8I1P402


S.Shanmugapriya, Dr. K. Alagarsamy, A.Saranya "Mobile Computing Application: A Review". International Journal of P2P Network Trends and Technology (IJPTT).V8:7-13 January to February 2018. ISSN:2249-2615. Published by Seventh Sense Research Group.


Mobile computing is one of the technologies necessary in today’s mobile atmosphere run by using mobile strategy in cloud atmosphere. It merges the features of both mobile computing and cloud computing, thereby provides best services to the users of mobile strategy. As MC is still at the early stage of improvement, it is essential to grab a methodical understanding of the knowledge in order to point out the way of future research for ever increasing field. As Mobile Computing is the most necessary fields with growing age of today’s fast internet using and mobile world along with its uses it has to faces some of the concern and dispute some of them are address in this paper. As the data is cloud computing and accessing it with mobile devices all the contract goes through the network so it is susceptible to attack. For keeping the use of this essential tool of steady in this advance world we are giving some of the solutions to this dispute to address in the field of Mobile Cloud Computing. The device that are essential to make it protected and use MCC, the solutions declare here for detecting and preventing from attack should be properly applied.


[1] M. Chen, Y. Wu and A. V. Vasilakos, “Advances in Mobile Cloud Computing”, Mobile Network Applications, no. 19, (2014), pp. 131-132.
[2] Y. Xu and S. Mao, “A Survey of Mobile Cloud Computing for Rich Media Applications”, IEEE Wireless Communications, (2013) June.
[3] A. Khan and K. Ahirwar, “Mobile Cloud Computing As A Future Of Mobile Multimedia Database”, International Journal of Computer Science and Communication, vol. 2, no. 1, (2011) January-June, pp. 219-221.
[4] M. Böhm, G. Koleva, S. Leimeister, C. Riedl and H. Krcmar, “Towards a Generic Value Network for Cloud Computing”, Springer, Lecture Notes in Computer Science, Economics of Grids, Clouds, Systems, and Services, vol. 6296, (2010), pp. 129-140.
[5] J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya and A. Qureshi, “Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions”, Journal of Network and Computer Applications, vol. 48, (2014), pp. 99-117.
[6] M. D. Islam, “Problems and prospects of the information services based on the mobile phone in Bangladesh”, International Journal of Library and Information Science, vol. 3, no. 6, (2012), pp. 104-114.
[7] Q. Khan, S. Naseem, F. Ahmad and M. S. Khan, “Usage & Issues of Cloud Computing Techniques in Small & medium Business Organizations”, International Journal of Scientific & Engineering Research, ISSN 2229-5518, vol. 3, no. 5, (2012) May 1.
[8] R. Buyya, C. Yeo and S. Venugopal, “Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering its Services as Computing Utilities”, 10th IEEE International Conference on High Performance Computing and Communications, ( HPCC’08), (2008), pp. 5-13.
[9] C. Hewitt, “Orgs for Scalable, Robust, Privacy-friendly Client Cloud Computing”, Internet Computing, IEEE, (2008), vol. 12, no. 5, (2008), pp. 96-99.
[10] H. Singh, “Current Trends in Cloud Computing: A Survey of Cloud Computing Systems”, International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956., vol. 1, no 3, (2012), pp. 1214-1219.
[11] W. Song and X. Su, “Review of Mobile Cloud Computing”, 3rd International Conference of Communication Software and Networks (ICCSN), IEEE, DOI: 10.1109/ICCSN.2011.6014374, (2011), pp. 1-4
[12] H. Qi and A. Gani, “Research on Mobile Cloud Computing: Review, Trend and Perspectives”, 2nd International Conference on Digital Information and Communication Technology and its Applications (DICTAP), DOI: 10.1109/DICTAP.2012.6215350, (2012), pp. 195-202.
[13] L. Youseff, M. Butrico and D. Da Silva, “Towards a Unified Ontology of Cloud Computing”, Grid Computing Environments Workshop (GCE 08), IEEE, (2008), pp. 1-10.
[14] Y. Chen, W. Ku, J. Feng, P. Liu and Z. Su, “Secure Distributed Data Storage in Cloud Computing”, Cloud Computing: Principles and Paradigms, John Wiley & Sons, Inc., available online at:, (2011).
[15] Z. Sanaei, S. Abolfazli, A. Gani and R. Buyya, “Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Provocations”, IEEE Communications Surveys & Tutorials, available online at:, (2013).
[16] D. K. Krishnappa, E. Lyons, D. Irwin and M. Zink, “CloudCast: Cloud Computing for Short-term Weather Forecasts”, IEEE Computing Science in Science & Engineering Magazine, vol. 15, no. 4, September (2013), pp. 30-37.
[17] M. L. Kiah, A. N. Khan, S. U. Khan and S. A. Madani, “Towards Secure Mobile Cloud Computing: A Survey”, Elsevier, available online at:, vol. 29, no. 5, July (2013), pp. 1278–1299.

Mobile Computing (MC), Smart Mobile Devices (SMD), Bandwidth, safety, Interoperability.