Secure Opportunistic Mobile Application Offload for Enterprise Networks Aaron Gember and Aditya Akella University of Wisconsin – Madison Abstract Application-independent.

Slides:



Advertisements
Similar presentations
David Shepherd Pre Sales Director (EMEA)
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
The case for VM based Cloudlets in Mobile Computing
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
ECOS: Leveraging Software-Defined Networks to Support Mobile Application Offloading Aaron Gember, Christopher Dragga, Aditya Akella University of Wisconsin-Madison.
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Purdue University.
Xavier León PhD defense
NOT FOR PUBLIC DISTRIBUTION State of Minnesota Technology Summary February 24, 2011.
Caching for Mobile Devices Kinsen Choy. Purpose Reduce network related costs for mobile devices. Different needs than desktop machines. – Limited energy.
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
by Evolve IP Managed Services
CloudMoV: Cloud-based Mobile Social TV
Plan Introduction What is Cloud Computing?
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Resource Allocation in Virtual Desktop Clouds: VMLab-GENI Experiment Rohit Patali, Prasad Calyam, Mukundan Sridharan, Alex Berryman The Ohio State University,
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
Large Enterprise with Multiple Locations Source: Avaya.
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
MOBILE CLOUD COMPUTING
Computation Offloading
MobSched: An Optimizable Scheduler for Mobile Cloud Computing S. SindiaS. GaoB. Black A.LimV. D. AgrawalP. Agrawal Auburn University, Auburn, AL 45 th.
Trooper Security, Inc. Security Solutions Center.
4.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 4 Chapter IT Infrastructure: Hardware and Software.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
1 ©2009 Desktone, Inc. All rights reserved. Desktops in the Cloud: It’s not Virtual Desktop Infrastructure (VDI) Danny Allan, Chief Solution Architect.
Improving Network I/O Virtualization for Cloud Computing.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Master Thesis Defense Jan Fiedler 04/17/98
Assessing the Sensitivity of WiMAX Parameters to MAC-level DoS Attacks Juan Deng and Richard Brooks* Clemson University Abstract The research community.
GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim.
GENI Experiments in Optimizing Network Environments using XSP Ezra Kissel and Martin Swany University of Delaware Abstract Our proposal is to build, deploy.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
Net-Centric Software and Systems I/UCRC A Framework for QoS and Power Management for Mobile Devices in Service Clouds Project Lead: I-Ling Yen, Farokh.
The Performance Evaluation of Intra-domain Bandwidth Allocation and Inter-domain Routing Algorithms for a QoS-guaranteed Routing Path Discovery Bo Li,
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Technology for Social Justice Enhancing community sector service delivery Stefanie Kechayas – Senior Consultant 17 November 2015 SharePoint Connect and.
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University IEEE Software, 2010.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Application-Aware Traffic Scheduling for Workload Offloading in Mobile Clouds Liang Tong, Wei Gao University of Tennessee – Knoxville IEEE INFOCOM
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
Enterprise | education | public printing locations PrinterOn for Manufacturing.
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Dynamic Mobile Cloud Computing: Ad Hoc and Opportunistic Job Sharing.
A Hierarchical Edge Cloud Architecture for Mobile Computing IEEE INFOCOM 2016 Liang Tong, Yong Li and Wei Gao University of Tennessee – Knoxville 1.
Edge Computing ——vision, challenges and promise. 物联网云计算.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
MED-V - Managing virtual PCs for IT Pros
TECHNOLOGY GUIDE THREE
VPS – Dedicated Server Web Hosting Provider In Greece
Mobile Device Management
Cloud Computing By P.Mahesh
Powerful Microsoft Azure Platform Hosts the Cloud-Based Student Portal Built on Office 365 “Microsoft Azure has revolutionized our software and our offering.
In the Cloud, Inspection Checklists and Auditing Can Be Managed with a Smartphone or Tablet MINI-CASE STUDY “We needed the ability to be able to host our.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
MetTel Cloud Connect Seamlessly Secure Your Path to Cloud Providers
Cloud Computing LegalRun Solutions Why It’s Right for You!
Progress Report 2012/11/28.
Progress Report 2012/12/20.
TECHNOLOGY GUIDE THREE
Presentation transcript:

Secure Opportunistic Mobile Application Offload for Enterprise Networks Aaron Gember and Aditya Akella University of Wisconsin – Madison Abstract Application-independent offloading is a promising approach to allow resource-limited mobile devices to access intensive applications more frequently without performance or energy costs. Offloading migrates part of a running mobile application and executes it on an available desktop or server. Existing approaches have not been widely adopted because: 1) No mechanisms are in place to maintain the security and privacy of data used by an offload application; 2) The focus is on what to offload instead of where to offload, and prior systems assume dedicated local resources are available for offloading. SOON is our mobile application offloading system designed to opportunistically leverage available resources and offer security guarantees and latency/energy improvements to smartphones. Expanding SOON beyond an enterprise network to utilize cloud resources requires careful decisions to ensure privacy and performance are preserved. Research Objectives Preserve data privacy by appropriately securing execution state transfers and selecting offloading resources with sufficient trust Provide latency improvements, energy savings, or both to smartphone users by opportunistically leveraging compute resources with sufficient capacity and network overhead Identify network services required in the enterprise, cloud, or WAN to ensure security is preserved and benefits exceed overheard SOON setup for a small enterprise Current and Proposed Publications Conference / Journal Papers A. Gember, C. Dragga, A. Akella. Secure Opportunistic Mobile Application Offloading for Enterprise Networks. Submitted to MobiSys Use of Glab/GENI Infrastructure The completed experiments use the GENI infrastructure at the University of Wisconsin – Madison, namely our OpenFlow network. Future experiments will utilize EmuLab and OpenFlow networks at other campuses, to represent remote enterprise sites and commercial clouds. Furthermore, PlanetLab sites will be used to explore SOONs performance and feasibility when smartphone users are external to the enterprise. Future Work Measure the latency improvements and energy savings using compute resources in a remote “cloud” Analyze the feasibility of SOON’s central controller and offloading decision process when smartphone users are external to the enterprise Identify enterprise services that could utilize the same model as SOON but offload execution from data center servers to the cloud Experiments SOON has been evaluated in a small enterprise setting using the University of Wisconsin – Madison OpenFlow network. We run two different applications (chess and speech recognition) on12 Google Android phones with varying privacy levels and objectives. We use 4-6 desktops for offloaded execution. SOON provides significant latency improvements to all phones, but applications desiring energy savings run 50 – 60% slower than latency seeking applications. Phone energy usage also decreases by 24 – 44%, with more savings for phones seeking energy savings. Some phones (P10) are unable to offload due to trust requirements and resulting contention with only 4 desktops. Increasing the available resources to 6 desktops alleviates the issue and provides further latency and energy benefits to all phones. 1 st DFG/GENI Doctoral Consortium, San Juan, PR March 13 th -15 th, 2011 Method name; Arguments; Objects Return value; Changed Objects Comparison of execution times Comparison of energy usage PhoneApplicationGoalTrusted Resources P1,P2,P3ChessLatencyAll P4,P5,P6ChessEnergyAll P7Speech RecognitionLatencyD1,D2,D6 P8Speech RecognitionLatencyD2,D3,D6 P9Speech RecognitionLatencyD1,D3,D6 P10Speech RecognitionEnergyD1,D2,D6 P11Speech RecognitionEnergyD2,D3,D6 P12Speech RecognitionEnergyD1,D3,D6 Configuration for phones