AppaaS: offering mobile applications as a cloud service

Journal of Internet Services and Applications - Tập 4 - Trang 1-12 - 2013
Khalid Elgazzar1, Ali Ejaz1, Hossam S Hassanein1
1School of Computing, Queen’s University, Kingston

Tóm tắt

With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user’s context. This paper proposes AppaaS, a context-aware platform that provides mobile applications as a service. AppaaS uses several types of context information including location information, user profile, device profile, user ratings, and time to provision the best relevant mobile applications to such a context. AppaaS supports state preservation, where user-specific data and application status are stored for the user’s future reference. Experimental validation demonstrates that AppaaS alleviates the burden on mobile users to find applications that work best for a particular situation. It also enables application providers to dynamically control access to the functionality of their applications. Performance evaluation results show that AppaaS can employ cloud elastic resource provisioning to offer flexible scalability, while satisfying certain QoS constraints. Experimental results also support a conclusion that with little overhead handling context information, AppaaS can bring remarkable benefits to provisioning mobile applications as a service.

Tài liệu tham khảo

Google Play Store . Accessed: February, 2013 https://play.google.com/store?hl=en . Accessed: February, 2013 Apple Store . Accessed: February, 2013 http://store.apple.com/ca . Accessed: February, 2013 Toutain F, Bouabdallah A, Zemek R, Daloz C: Interpersonal context-aware communication services. Commun Mag IEEE 2011, 49(1):68–74. Elgazzar K, Ejaz A, Hassanein HS: Appaas: Provisioning of context-aware mobile applications as a service. The IEEE International Conference on Communications (ICC) 2013. Elgazzar K, Hassanein H, Martin P: Effective web service discovery in mobile environments. P2MNETS, The 36th IEEE conference on Local Computer Networks (LCN) 2011, 697–705. Ahn C, Nah Y: Design of location-based web service framework for context-aware applications in ubiquitous environments. IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC) 2010, 426–433. Chatterjee L, Mukherjee S, Chattopadhyay M: A personalized mobile application using location based service. Advances in computer science and education applications 2011, 413–419. Junglas IA, Watson RT: Location-based services. Commun ACM 2008, 51(3):65–69. 10.1145/1325555.1325568 Mokbel MF, Levandoski JJ: Toward context and preference-aware location-based services. Proceedings of the 8th ACM international workshop on data engineering for wireless and mobile access 2009, 25–32. Husain W, Dih LY: A framework of a personalized location-based traveler recommendation system in mobile application. Int J Multimedia Ubiquitous Eng 2012, 7(3):11–18. Shi X, Sun T, Shen Y, Li K, Qu W: Tour-guide: providing location-based tourist information on mobile phones. The IEEE 10th international conference on computer and information technology 2010, 2397–2401. Stuedi P, Mohomed I, Terry D: Wherestore: location-based data storage for mobile devices interacting with the cloud. The 1st ACM workshop on mobile cloud computing and services: social networks and beyond, MCS’10, Co-located with ACM MobiSys 2010, 1–8. Chow CY, Mokbel MF, Liu X: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 2011, 15(2):351–380. 10.1007/s10707-009-0099-y Amoli A, Kharrazi M, Jalili R: 2ploc: preserving privacy in location-based services. The IEEE 2nd international conference on Social Computing (SocialCom) 2010, 707–712. Puttaswamy KPN, Zhao BY: Preserving privacy in location-based mobile social applications. HotMobile: The 11th workshop on mobile computing systems and applications 2010, 1–6. Quah JTS, Lim LR: Location based application distribution for android mobile devices. Proceedings of the IASTED international conference on wireless communications 2011, 118–123. Costa-Montenegro E, Barragáns-Martínez AB, Rey-López M, Mikic-Fonte F, Peleteiro-Ramallo A: Which app? A recommender system of applications in markets by monitoring users’ interaction. Proceedings of the IEEE International Conference on Consumer Electronics (ICCE) 2011, 353–354. Toye E, Sharp R, Madhavapeddy A, Scott D: Using smart phones to access site-specific services. IEEE Pervasive Comput 2005, 4(2):60–66. 10.1109/MPRV.2005.44 Dey AK: Understanding and using context. Pers Ubiquitous Comput 2001, 5: 4–7. 10.1007/s007790170019 Ahn J, Heo J, Lim S, Kim W: A study on the application of patient location data for ubiquitous healthcare system based on lbs. 10th international conference on advanced communication technology, vol. 3 2008, 2140–2143. Xin C: Location based service application in mobile phone serious game. International joint conference on artificial intelligence 2009, 50–52. Altintas B, Serif T: Indoor location detection with a rss-based short term memory technique (knn-stm). IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2012, 794–798. Diaz J, de A Maues R, Soares R, Nakamura E, Figueiredo C: Bluepass: an indoor bluetooth-based localization system for mobile applications. IEEE Symposium on Computers and Communications (ISCC) 2010, 778–83. Al-Masri E, Mahmoud QH: Mobieureka: an approach for enhancing the discovery of mobile web services. Pers Ubiquitous Comput 2010, 14: 609–620. 10.1007/s00779-009-0252-5 Biswas S, Neogy S: A mobility-based checkpointing protocol for mobile computing system. Int J Comput Sci Inf Technol 2010, 2(1):135–151. Tuli R, Kumar P: Analysis of recent checkpointing techniques for mobile computing systems. Int J Comput Sci Eng Surv 2011, 2(3):133–141. 10.5121/ijcses.2011.2310 Sevinç PE, Strasser M, Basin D: Securing the distribution and storage of secrets with trusted platform modules. In Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag; 2007:53–66. Hung SH, Shih CS, Shieh JP, Lee CP, Huang YH: Executing mobile applications on the cloud: framework and issues. Comput Math Appl 2012, 63(2):573–587. 10.1016/j.camwa.2011.10.044 Android APIs (Bundle) . Accessed: August, 2013 http://developer.android.com/reference/android/os/Bundle.html . Accessed: August, 2013 Android Activity Lifecycle . Accessed: February, 2013 http://developer.android.com/reference/android/app/Activity.html . Accessed: February, 2013 Android SDK . Accessed: February, 2013 http://developer.android.com/sdk/index.html . Accessed: February, 2013 MySQL Database Server . Accessed: February, 2013 http://www.mysql.com/ . Accessed: February, 2013 Amazon EC2 Instance Types . Accessed: August, 2013 http://aws.amazon.com/ec2/instance-types/ . Accessed: August, 2013 Web Application Testing (WAPT) . Accessed: February, 2013 http://www.loadtestingtool.com . Accessed: February, 2013