Bibliography

[1] KVM, available at https://www.linux-kvm.org/page/Main_Page.

[2] VMware ESXi, available at https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_0#open_source.

[3] GPL V2, available at https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html.

[4] Apache License Version 2.0, available at https://www.apache.org/licenses/LICENSE-2.0.html.

[5] Linux Containers, available at https://linuxcontainers.org/.

[6] Linux VServer, available at http://linux-vserver.org/.

[7] Understanding and Configuring VLANs, available at http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vlans.html.

[8] Xvisor, available at http://xhypervisor.org/.

[9] Amazon EC2, https://aws.amazon.com/ec2/.

[10] Apache jena, https://jena.apache.org/index.html.

[11] Chroot, available at https://en.wikipedia.org/wiki/Chroot.

[12] Facebook Caffe2, available at https://research.fb.com/downloads/caffe2/.

[13] Family educational rights and privacy act (FERPA), website is available at http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html.

[14] Federal information security management act (FISMA) implementation project, website is available at http://csrc.nist.gov/groups/SMA/fisma/.

[15] Health insurance portability and accountability act, website is available at https://www.whitehouse.gov/administration/eop/ostp.

[16] Incommon, website is available at https://www.incommon.org/.

[17] Iot-lite ontology, https://www.w3.org/Submission/iot-lite/.

[18] ISO/IEC DIS 20248: Information technology – Automatic identification and data capture techniques – Data structures – Digital signature meta structure.

[19] Lguest, available at http://lguest.ozlabs.org/.

[20] Linaro Networking Group (LNG), available at https://www.linaro.org/groups/lng/.

[21] Linux Run Project, available at https://en.wikipedia.org/wiki/Lxrun.

[22] lm-sensors, https://github.com/groeck/lm-sensors.

[23] Mayo clinic, available at http://www.mayoclinic.org/.

[24] OAuth 2.0, the industry-standard protocol for authorization, available at https://oauth.net/2/.

[25] Open Fog Consortium, available at https://www.openfogconsortium.org/.

[26] Open Virtual Format (OVF), available at https://www.dmtf.org/standards/ovf.

[27] Parrotcode: Parrot documentation, available at http://www.parrot.org/ access in 2017.

[28] Potassco, the Potsdam answer set solving collection, http://potassco.sourceforge.net/.

[29] QEMU CPU Emulator, available at http://www.qemu-project.org/ and accessed in 2017.

[30] RabbitMQ, https://www.rabbitmq.com/.

[31] Ruby on Rails, available at http://rubyonrails.org/.

[32] Semantic markup for web services, https://www.w3.org/Submission/OWL-S/.

[33] Semantic sensor network ontology, https://www.w3.org/TR/vocab-ssn/.

[34] The translational genomics research institute (TGen), available at https://tgen.org/.

[35] Virtual Open Systems, available at http://www.virtualopensystems.com/.

[36] VMware Workstation Player, available at https://my.vmware.com/web/vmware/free#desktop_end_user_computing/vmware_workstation_player/12_0.

[37] Web service modeling ontology, https://www.w3.org/Submission/WSMO/.

[38] Weka: data mining software in java, http://www.cs.waikato.ac.nz/ml/weka/.

[39] Wine Project, available at https://www.winehq.org.

[40] Withings API developer documentation, http://oauth.withings.com/api.

[41] Withings body, https://www.withings.com/us/en/products/body.

[42] Xtremelabs Speedtest, available at http://xtremelabs-speedtest.en.aptoide.com/?store_name=apps&app_id=2172058.

[43] SPARQL query language for RDF, [Online]. Available: http://www.w3.org/TR/rdf-sparql-query/; 2008.

[44] News Blog, available at https://searchenginewatch.com/sew/opinion/2353616/mobile-now-exceeds-pc-the-biggest-shift-since-the-internet-began; 2014.

[45] OMAP 5432, available at https://www.isee.biz/products/igep-processor-boards/igepv5-omap5432 visited May 2017.

[46] Samsung-Exynos-5250, available at https://www.notebookcheck.net/Samsung-Exynos-5250-Dual-SoC.86886.0.html visited May 2017.

[47] E. Abebe, C. Ryan, A hybrid granularity graph for improving adaptive application partitioning efficacy in mobile computing environments, 10th IEEE International Symposium on Network Computing and Applications (NCA). IEEE; 2011:59–66.

[48] E. Abebe, C. Ryan, Adaptive application offloading using distributed abstract class graphs in mobile environments, Journal of Systems and Software 2012;85(12):2755–2769.

[49] L. Allison, O. Tatsuaki, S. Amit, T. Katsuyuki, W. Brent, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, Theory and Applications of Cryptographic Techniques. Springer-Verlag; 2010:62–91.

[50] D. Aloni, Cooperative linux, Proceedings of the Linux Symposium, vol. 2. 2004:23–31.

[51] A. Alshalan, S. Pisharody, D. Huang, A survey of mobile VPN technologies, IEEE Communications Surveys & Tutorials 2016;18(2):1177–1196.

[52] Apache Felix, [Online]. Available: http://felix.apache.org/site/index.html.

[53] Apache felix framework and google android, Apache Felix. [Online]. Available: http://felix.apache.org/site/apache-felix-framework-and-google-android.html.

[54] Apache Groovy, available at http://groovy-lang.org/.

[55] Arduino, Arduino UNO, http://www.arduino.cc/en/Main/ArduinoBoardUno; 2011.

[56] ARM, ARM® Architecture Reference Manual ARM® v7-A and ARM® v7-R. ARM Inc., 2013, ch. A1.1.

[57] J. Arnold, OpenStack Swift: Using, Administering, and Developing for Swift Object Storage. O'Reilly Media, Inc.; 2014.

[58] J. Barbier, J. Bradley, J. Macaulay, R. Medcalf, C. Reberger, BYOD and virtualization: top 10 insights from Cisco IBSG horizons study, Viitattu 2012;8:2016.

[59] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield, Xen and the art of virtualization, ACM SIGOPS Operating Systems Review 2003;37(5):164–177.

[60] B. Baron, P. Spathis, M.D. de Amorim, M. Ammar, Cloud storage for mobile users using pre-positioned storage facilities, Proceedings of the 2nd Workshop on Experiences in the Design and Implementation of Smart Objects. ACM; 2016:11–16.

[61] S. Bechhofer, F.v. Harmelen, J. Hendler, I. Horrocks, D.L. McGuinness, P.F. Patel-Schneider, L.A. Stein, Owl web ontology language reference, [Online]. Available: http://www.w3.org/TR/owl-ref/; 2004.

[62] F. Bellard, QEMU, a fast and portable dynamic translator, USENIX Annual Technical Conference, FREENIX Track. 2005:41–46.

[63] J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy. Washington, DC, USA. 2007:321–334.

[64] R. Biswas, K. Chowdhury, D. Agrawal, Attribute allocation and retrieval scheme for large-scale sensor networks, International Journal of Wireless Information Networks 2006.

[65] A. Boldyreva, V. Goyal, V. Kumar, Identity-based encryption with efficient revocation, Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM; 2008:417–426.

[66] D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK. 2001:213–229.

[67] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM; 2012:13–16.

[68] E. Borgia, The internet of things vision: key features, applications and open issues, Computer Communications 2014;54:1–31.

[69] T. Bray, J. Paoli, C.M. Sperberg-McQueen, E. Maler, F. Yergeau, Extensible markup language (XML), World Wide Web Journal 1997;2(4):27–66.

[70] B. Butzin, F. Golatowski, D. Timmermann, Microservices approach for the internet of things, Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on. IEEE; 2016:1–6.

[71] A. Carzaniga, M. Rutherford, A. Wolf, A routing scheme for content-based networking, Proceedings of the IEEE International Conference on Computer Communications, ser. INFOCOM. 2004.

[72] J. Chakareski, Adaptive multiview video streaming: challenges and opportunities, Communications Magazine, IEEE 2013;51(5):94–100.

[73] J. Che, C. Shi, Y. Yu, W. Lin, A synthetical performance evaluation of OpenVZ, Xen and KVM, Services Computing Conference (APSCC), 2010 IEEE Asia-Pacific. IEEE; 2010:587–594.

[74] J. Chen, H.W. Lim, S. Ling, H. Wang, K. Nguyen, Revocable identity-based encryption from lattices, Information Security and Privacy. Springer; 2012:390–403.

[75] M. Chen, Y. Zhang, Y. Li, S. Mao, V. Leung, EMC: emotion-aware mobile cloud computing in 5G, IEEE Network 2015;29(2):32–38.

[76] M. Chen, J. Chen, T. Chang, Android/OSGi-based vehicular network management system, Computer Communications 2011;34:169–183.

[77] L. Cheung, C. Newport, Provably secure ciphertext policy ABE, Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM; 2007:456–465.

[78] M. Chiang, T. Zhang, Fog and IoT: an overview of research opportunities, IEEE Internet of Things Journal 2016;3(6):854–864.

[79] S.N.T.-c. Chiueh, S. Brook, A survey on virtualization technologies, RPE Report 2005:1–42.

[80] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, A. Patti, CloneCloud: elastic execution between mobile device and cloud, Proceedings of the Sixth Conference on Computer Systems. ACM; 2011:301–314.

[81] C.J. Chung, H. Wu, Y. Deng, V-lab report for fall 2013. [Tech. Rep.] Arizona State University; 2013.

[82] Cisco, Cisco visual networking index: forecast and methodology, 2014–2019, [Online]. Available: http://tinyurl.com/mev32z8; 2015.

[83] C.V.N.I. Cisco, Global mobile data traffic forecast update, 2015–2020 white paper, 2016.

[84] CloudStack, Apache CloudStack, available at https://cloudstack.apache.org/.

[85] A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real case based on OpenStack Cloud, Future Generation Computer Systems 2014;32:118–127.

[86] B. Costa, P.F. Pires, F.C. Delicato, P. Merson, Evaluating a representational state transfer (rest) architecture: What is the impact of rest in my architecture? 2014 IEEE/IFIP Conference on Software Architecture (WICSA). 2014:105–114.

[87] A. Covert, Google Drive, iCloud, Dropbox and more compared: what's the best cloud option? Technical Review. 2012.

[88] D. Crockford, The application/json media type for javascript object notation (JSON), 2006.

[89] E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, P. Bahl, MAUI: making smartphones last longer with code offload, Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM; 2010:49–62.

[90] C. Dall, J. Nieh, KVM/ARM: experiences building the Linux ARM hypervisor. [Tech. Rep. CUCS-010-13] Department of Computer Science, Columbia University; 2013.

[91] C. Dall, J. Nieh, KVM/ARM: the design and implementation of the Linux ARM hypervisor, ACM SIGPLAN Notices 2014;49(4):333–348.

[92] C. Dall, J. Nieh, KVM for ARM, Proceedings of the 12th Annual Linux Symposium. 2010.

[93] C. Dall, J. Nieh, Supporting KVM on the ARM architecture, lwn.net; 2013.

[94] C. Dall, J. Nieh, The design and implementation of the Linux ARM hypervisor, Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems. 2014.

[95] C. Dannewitz, J. Golic, B. Ohlman, B. Ahlgren, Secure naming for a network of information, Proceedings of the IEEE International Conference on Computer Communications, ser. INFOCOM. 2010.

[96] A. Davies, A. Orsaria, Scale out with GlusterFS, Linux Journal 2013;2013(235):1.

[97] V. Daza, J. Herranz, P. Morillo, C. Ràfols, Extended access structures and their cryptographic applications, IACR Cryptology ePrint Archive 2008;2008:502.

[98] J. Dike, A user-mode port of the Linux kernel, Annual Linux Showcase & Conference. 2000.

[99] N. Doshi, D. Jinwala, Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext, Advanced Computing, Networking and Security. Springer-Verlag; 2012:515–523.

[100] N. Dragoni, S. Giallorenzo, A.L. Lafuente, M. Mazzara, F. Montesi, R. Mustafin, L. Safina, Microservices: yesterday, today, and tomorrow, arXiv preprint arXiv:1606.04036; 2016.

[101] DroneCode, Ardu pilot, http://ardupilot.com/; 2014.

[102] B. Eckel, Thinking in Java. 4th ed. Prentice Hall; 2006.

[103] P. Emmerich, D. Raumer, F. Wohlfart, G. Carle, Performance characteristics of virtual switching, Cloud Networking (CloudNet) 2014 IEEE 3rd International Conference. 2014.

[104] K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, Information Security Practice and Experience. Xi'an, China. 2009:13–23.

[105] R. Fakoor, M. Raj, A. Nazi, M.D. Francesco, S.K. Das, An integrated cloud-based framework for mobile phone sensing, Proceedings of the ACM SIGCOMM MCC Workshop. 2012.

[106] D. Farinacci, P. Traina, S. Hanks, T. Li, Generic routing encapsulation (GRE), 1994.

[107] N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a survey, Future Generation Computer Systems 2013;29(1):84–106.

[108] R.T. Fielding, R.N. Taylor, Principled design of the modern web architecture, ACM Transactions on Internet Technology (TOIT) 2002;2(2):115–150.

[109] S. Flur, K.E. Gray, C. Pulte, S. Sarkar, A. Sezgin, L. Maranget, W. Deacon, P. Sewell, Modelling the ARMv8 architecture, operationally: concurrency and ISA, ACM SIGPLAN Notices 2016;51(1):608–621.

[110] N. Fotiou, G.F. Marias, G.C. Polyzos, Access control enforcement delegation for information-centric networking architectures, Proceedings of the ICN Workshop on Information-centric Networking, ser. ICN. 2012.

[111] N. Fotiou, P. Nikander, D. Trossen, G. Polyzos, Developing information networking further: from PSIRP to PURSUIT, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 2012.

[112] K. Frikken, M. Atallah, J. Li, Attribute-based access control with hidden policies and hidden credentials, IEEE Transactions on Computers Oct. 2006;55:1259–1270.

[113] Market Trends: Cloud-Based Security Services Market, Worldwide, https://www.gartner.com/doc/.

[114] M. Gerla, Vehicular cloud computing, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net). 2012:152–155.

[115] A. Ghosh, P.K. Gajar, S. Rai, Bring your own device (BYOD): security risks and mitigating strategies, Journal of Global Research in Computer Science 2013;4(4):62–70.

[116] I. Giurgiu, O. Riva, G. Alonso, Dynamic software deployment from clouds to mobile devices, Middleware. Springer; 2012:394–414.

[117] I. Giurgiu, O. Riva, D. Juric, I. Krivulev, G. Alonso, Calling the cloud: enabling mobile phones as interfaces to cloud applications, Middleware. Springer; 2009:83–102.

[118] J. Goodacre, A. Cambridge, The evolution of the ARM architecture towards big data and the data-centre, 8th Workshop on Virtualization in High-Performance Cloud Computing. 2013.

[119] Google Inc., http://www.google.com/wallet.

[120] V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA. 2006:89–98.

[121] G. Gruman, Android for work brings container security to google play apps, Infoworld Feb 25, 2015.

[122] R.P. Guidance, A.E.-I. Credentials, Federal identity, credential, and access management trust framework solutions.

[123] K. Ha, M. Satyanarayanan, OpenStack++ for cloudlet deployment, School of Computer Science Carnegie Mellon University Pittsburgh, 2015.

[124] K. Habak, M. Ammar, K.A. Harras, E. Zegura, Femto clouds: leveraging mobile devices to provide cloud service at the edge, Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on. IEEE; 2015:9–16.

[125] R. Hall, K. Pauls, S. McCulloch, D. Savage, OSGi in Action: Creating Modular Applications in Java. Manning Publications Co.; 2011.

[126] B. Han, V. Gopalakrishnan, L. Ji, S. Lee, Network function virtualization: challenges and opportunities for innovations, IEEE Communications Magazine 2015;53(2):90–97.

[127] D. Hardt, The OAuth 2.0 authorization framework, 2012.

[128] J. Herranz, F. Laguillaumie, C. Ràfols, Constant size ciphertexts in threshold attribute-based encryption, Practice and Theory in Public Key Cryptography. Paris, France. 2010:19–34.

[129] J. Hildebrand, P. Millard, R. Eatmon, P. Saint-Andre, XEP-0030: Service Discovery, XMPP Standards Foundation (XSF), http://xmpp.org/extensions/xep-0030.html; 2008.

[130] J. Honeycutt, Microsoft virtual PC 2004 technical overview, Microsoft, Nov, 2003.

[131] C.-Y. Hsu, C.-S. Yang, L.-C. Yu, C.-F. Lin, H.-H. Yao, D.-Y. Chen, K.R. Lai, P.-C. Chang, Development of a cloud-based service framework for energy conservation in a sustainable intelligent transportation system, International Journal of Production Economics 2014.

[132] Samsung Exynos 5250 Dual, http://www.notebookcheck.net/Samsung-Exynos-5250-Dual-SoC.86886.0.html; 2013.

[133] V. Hu, D.F. Ferraiolo, D.R. Kuhn, R.N. Kacker, Y. Lei, Implementing and managing policy rules in attribute based access control, Information Reuse and Integration (IRI), 2015 IEEE International Conference on. IEEE; 2015:518–525.

[134] V.C. Hu, D. Ferraiolo, D.R. Kuhn, Assessment of access control systems, US Department of Commerce, National Institute of Standards and Technology, 2006.

[135] V.C. Hu, D. Ferraiolo, R. Kuhn, A.R. Friedman, A.J. Lang, M.M. Cogdell, A. Schnitzer, K. Sandlin, R. Miller, K. Scarfone, et al., Guide to attribute based access control (ABAC) definition and considerations (draft), NIST Special Publication 2013;800(162).

[136] V.C. Hu, D.R. Kuhn, D.F. Ferraiolo, Attribute-based access control, Computer 2015;48(2):85–88.

[137] D. Huang, Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks, International Journal of Security and Networks 2007;2(3):272–283.

[138] D. Huang, Mobile cloud computing, IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter October 2011;6(10):27–31.

[139] D. Huang, M. Verma, ASPE: attribute based secure policy enforcement for data access control in vehicular ad hoc networks, Ad Hoc Networks Journal (Special Issue of Privacy & Security in WSNs) 2009.

[140] D. Huang, T. Xing, H. Wu, Mobile cloud computing service models: a user-centric approach, IEEE Network 2013;27(5):6–11.

[141] D. Huang, X. Zhang, M. Kang, J. Luo, MobiCloud: building secure cloud framework for mobile computing and communication, Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). 2010:27–34.

[142] D. Huang, Z. Zhou, Z. Yan, Gradual identity exposure using attribute-based encryption, IEEE Conference on Social Computing (SocialCom). Aug. 2010:881–888.

[143] D. Huang, Z. Zhou, Y. Zhu, Gradual identity exposure using attribute-based encryption, Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). 2010.

[144] J. Hughes, E. Maler, Security assertion markup language (SAML) v2.0 technical overview, OASIS SSTC Working Draft sstc-saml-tech-overview-2.0-draft-08, 2005, pp. 29–38.

[145] J. Hur, D.K. Noh, Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Transactions on Parallel and Distributed Systems 2011;22(7):1214–1221.

[146] IEEE, IEEE Std 802.1Q-1998, IEEE standard, available at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6080; 1998.

[147] A. Inc., Juno ARM development platform, http://www.arm.com/products/tools/development-boards/versatile-express/juno-arm-development-platform.php; 2014.

[148] K. Initiative, et al., Identity assurance framework, 2013.

[149] Intel Corporation, Intel DPDK vSwitch, available at https://github.com/01org/dpdk-ovs visited May 2017.

[150] S. Jahid, P. Mittal, N. Borisov, EASiER: encryption-based access control in social networks with efficient revocation, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM; 2011:411–415.

[151] L.P. Jain, W.J. Scheirer, T.E. Boult, Quality of experience, IEEE Multimedia. Citeseer; 2004.

[152] D. Jaramillo, N. Katz, B. Bodin, W. Tworek, R. Smart, T. Cook, Cooperative solutions for bring your own device (BYOD), IBM Journal of Research and Development 2013;57(6).

[153] W. Jung, C. Kang, C. Yoon, D. Kim, H. Cha, Devscope: a nonintrusive and online power analysis tool for smartphone hardware components, Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM; 2012:353–362.

[154] P.-H. Kamp, R.N. Watson, Jails: confining the omnipotent root, Proceedings of the 2nd International SANE Conference, vol. 43. 2000:116.

[155] G. Kane, MIPS RISC Architecture. Prentice-Hall; 1988.

[156] H. Kang, M. Le, S. Tao, Container and microservice driven design for cloud infrastructure DevOps, Cloud Engineering (IC2E), 2016 IEEE International Conference on. IEEE; 2016:202–211.

[157] D. Karaboga, B. Akay, A comparative study of artificial bee colony algorithm, Applied Mathematics and Computation 2009;214(1):108–132.

[158] J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Proc. of EUROCRYPT 2008. Springer-Verlag; 2008:146–162.

[159] S. Kaur, J. Singh, N.S. Ghumman, Network programmability using POX controller, ICCCS International Conference on Communication, Computing & Systems, IEEE. 2014:138.

[160] R. Kemp, N. Palmer, T. Kielmann, H. Bal, Cuckoo: a computation offloading framework for smartphones, Mobile Computing, Applications, and Services. Springer; 2012:59–79.

[161] S. Keshav, R. Sharma, S. Chuang, Dynamically modifying the resources of a virtual server, 2006, US Patent 6,985,937.

[162] A.R. Khan, M. Othman, S.A. Madani, S.U. Khan, A survey of mobile cloud computing application models, Communications Surveys & Tutorials, IEEE 2014;16(1):393–413.

[163] H. Kim, N. Feamster, Improving network management with software defined networking, IEEE Communications Magazine 2013;51(2):114–119.

[164] A. Kivity, Y. Kamay, D. Laor, U. Lublin, A. Liguori, KVM: the Linux virtual machine monitor, Proceedings of the Linux Symposium, vol. 1. 2007:225–230.

[165] M.B. Kjærgaard, J. Langdal, T. Godsk, T. Toftkjær, EnTracked: energy-efficient robust position tracking for mobile devices, Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. ACM; 2009:221–234.

[166] J. Kjeldskov, Mobile interactions in context: a designerly way toward digital ecology, Synthesis Lectures on Human-Centered Informatics 2014;7(1):1–119.

[167] T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, I. Stoica, A data-oriented (and beyond) network architecture, Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2007.

[168] S. Kosta, A. Aucinas, P. Hui, R. Mortier, X. Zhang, Unleashing the power of mobile cloud computing using ThinkAir, arXiv preprint arXiv:1105.3232; 2011.

[169] S. Kosta, A. Aucinas, P. Hui, R. Mortier, X. Zhang, ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code offloading, 2012 Proceedings IEEE INFOCOM. 2012:945–953.

[170] D. Kovachev, Framework for computation offloading in mobile cloud computing, IJIMAI 2012;1(7):6–15.

[171] D. Kovachev, T. Yu, R. Klamma, Adaptive computation offloading from mobile devices into the cloud, Parallel and Distributed Processing with Applications (ISPA), 2012 IEEE 10th International Symposium on. IEEE; 2012:784–791.

[172] A. Krylovskiy, M. Jahn, E. Patti, Designing a smart city internet of things platform with microservice architecture, Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on. IEEE; 2015:25–30.

[173] M. Lasserre, V. Kompella, Virtual private lan service (VPLS) using label distribution protocol (LDP) signaling, 2007.

[174] K. Lawton, Plex86 x86 virtual machine project, Software Package 2003;2004:47.

[175] K. Lawton, B. Denney, N.D. Guarneri, V. Ruppert, C. Bothamy, M. Calabrese, Bochs x86 PC emulator users manual, 2003.

[176] L. Xu, L. Li, V. Nagarajan, D. Huang, W.-T. Tsai, Secure web referral services for mobile cloud computing, IEEE 7th International Symposium on Service-Oriented System Engineering. 2013.

[177] E. Lee, E.-K. Lee, M. Gerla, S.Y. Oh, Vehicular cloud networking: architecture and design principles, IEEE Communications Magazine 2014;52(2):148–155.

[178] S.-J. Lee, M. Gerla, Dynamic load-aware routing in ad hoc networks, Communications, 2001. ICC 2001. IEEE International Conference on, vol. 10. IEEE; 2001:3206–3210.

[179] J. Lewis, M. Fowler, Microservices – a definition of this new architectural term, 2014.

[180] A. Lewko, A. Sahai, B. Waters, Revocation systems with very small private keys, Security and Privacy (SP), 2010 IEEE Symposium on. IEEE; 2010:273–285.

[181] A. Lewko, B. Waters, Decentralizing attribute-based encryption, Advances in Cryptology–EUROCRYPT 2011. 2011:568–588.

[182] B. Li, D. Huang, Z. Wang, Y. Zhu, Attribute-based access control for ICN naming scheme, IEEE Transactions on Dependable and Secure Computing 2016.

[183] B. Li, A.P. Verleker, D. Huang, Z. Wang, Y. Zhu, Attribute-based access control for ICN naming scheme, Proceedings of the 17th ACM Conference on Computer and Communications Security. IEEE; 2014.

[184] B. Li, Z. Wang, D. Huang, An efficient and anonymous attribute-based group setup scheme, Global Communications Conference (GLOBECOM), 2013 IEEE. IEEE; 2013:861–866.

[185] B. Libert, D. Vergnaud, Adaptive-id secure revocable identity-based encryption, Topics in Cryptology – CT-RSA 2009. Springer; 2009:1–15.

[186] Z.S. Lim, Setting up KVM, https://wiki.linaro.org/ZiShenLim/sandbox/SettingUpKVM; 2013.

[187] J. Lin, C. Dyer, Data-intensive text processing with MapReduce, Synthesis Lectures on Human Language Technologies 2010;3(1):1–177.

[188] K. Liu, Applied Markov Decision Processes. Tsinghua University Press; 2004.

[189] Y. Liu, An energy-efficient multisite offloading algorithm for mobile devices, International Journal of Distributed Sensor Networks 2013;2013.

[190] D. Lu, Z. Li, D. Huang, X. Lu, Y. Deng, A. Chowdhary, B. Li, VC-bots: a vehicular cloud computing testbed with mobile robots, Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet. ACM; 2016:31–36.

[191] L. Lynch, Inside the identity management game, IEEE Internet Computing 2011;15(5):78–82.

[192] B. Lynn, The pairing-based cryptography library, [Online]. Available: https://crypto.stanford.edu/pbc/; 2006.

[193] B. Lynn, Type A internals, [Online]. Available: http://tinyurl.com/gs9s8y9; 2006.

[194] Mark Walshy, Gartner: mobile to outpace desktop web by 2013, Online Media Daily, 2010.

[195] E. McCluskey, Minimization of Boolean functions, Bell System Technical Journal 1956;35(5):1417–1444.

[196] J.C. McCullough, Y. Agarwal, J. Chandrashekar, S. Kuppuswamy, A.C. Snoeren, R.K. Gupta, Evaluating the effectiveness of model-based power characterization, USENIX Annual Technical Conf.. 2011.

[197] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turner, OpenFlow: enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review 2008;38(2):69–74.

[198] M. McLarty, Learn from SOA: 5 lessons for the microservices era, InfoWorld, available at http://www.infoworld.com/article/3080611/application-development/learning-from-soa-5-lessons-for-the-microservices-era.html; 2016.

[199] J. Medved, R. Varga, A. Tkacik, K. Gray, OpenDaylight: towards a model-driven SDN controller architecture, A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on. IEEE; 2014:1–6.

[200] P. Mell, T. Grance, The NIST definition of cloud computing, 2011.

[201] D. Merkel, Docker: lightweight Linux containers for consistent development and deployment, Linux Journal 2014;2014(239):2.

[202] Microsoft, Microsoft Hyper-V, available at www.microsoft.com/HyperV.

[203] Microsoft, Microsoft Hyper-V downloading site, available at https://www.microsoft.com/en-us/evalcenter/evaluate-hyper-v-server-2012-r2.

[204] P. Millard, P. Saint-Andre, R. Meijer, XEP-0060: Publish-Subscribe, XMPP Standards Foundation (XSF) http://xmpp.org/extensions/xep-0060.html; 2010.

[205] J.S. Miller, S. Ragsdale, The Common Language Infrastructure Annotated Standard. Addison-Wesley Professional; 2004.

[206] R. Mittal, A. Kansal, R. Chandra, Empowering developers to estimate app energy consumption, Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. ACM; 2012:317–328.

[207] F. Montesi, J. Weber, Circuit breakers, discovery, and API gateways in microservices, arXiv preprint arXiv:1609.05830; 2016.

[208] A. Mtibaa, A. Fahim, K.A. Harras, M.H. Ammar, Towards resource sharing in mobile device clouds: power balancing across mobile devices, ACM SIGCOMM Computer Communication Review 2013;43(4):51–56.

[209] A. Mtibaa, K.A. Harras, K. Habak, M. Ammar, E.W. Zegura, Towards mobile opportunistic computing, Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on. IEEE; 2015:1111–1114.

[210] M. Nabeel, E. Bertino, Attribute based group key management. [Technical Report CERIAS TR 2010] Purdue University; 2010.

[211] Named data ndn-cxx: NDN C++ library with experimental extensions 0.3.1-6-ga76bbc9 documentation, [Online]. Available: http://named-data.net/doc/ndn-cxx/current/; 2015.

[212] Named data project NFD – named data networking forwarding Daemon 0.3.1 documentation, [Online]. Available: http://named-data.net/doc/NFD/current/; 2015.

[213] D. Neumann, C. Bodenstein, O.F. Rana, R. Krishnaswamy, STACEE: enhancing storage clouds using edge devices, Proceedings of the 1st ACM/IEEE Workshop on Autonomic Computing in Economics. 2010.

[214] S. Newman, Building Microservices. O'Reilly Media, Inc.; 2015.

[215] Nike Inc., http://www.nike.com.

[216] T. Nishide, K. Yoneyama, K. Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Applied Cryptography and Network Security, ser. ACNS'08. New York, NY, USA. 2008:111–129.

[217] J. Niu, W. Song, M. Atiquzzaman, Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications, Journal of Network and Computer Applications 2014;37:334–347.

[218] J. Oberheide, E. Cooke, F. Jahanian, CloudAV: N-version antivirus in the network cloud, Proceedings of the 17th USENIX Security Symposium. San Jose, CA. July 2008.

[219] J. Oltsik, A multitude of mobile security issues, 2010.

[220] OpenStack, available at https://www.openstack.org/.

[221] Oracle VirtualBox, VirtualBox, available at https://www.virtualbox.org/.

[222] Open Services Gateway initiative (OSGi), available at http://www.osgi.org/Main/HomePage Open Source.

[223] OSGi Core Release 5, OSGi Alliance, http://www.osgi.org/Release5/HomePage; March 2012.

[224] S. Ou, Y. Wu, K. Yang, B. Zhou, Performance analysis of fault-tolerant offloading systems for pervasive services in mobile wireless environments, IEEE International Conference on Communications (ICC). IEEE; 2008:1856–1860.

[225] I. Parallels, An introduction to OS virtualization and parallels virtuozzo containers, Parallels, Inc., Tech. Rep., 2010.

[226] C. Pautasso, O. Zimmermann, F. Leymann, Restful web services vs. “big” web services: making the right architectural decision, Proceedings of the 17th International Conference on World Wide Web. ACM; 2008:805–814.

[227] B. Pfaff, J. Pettit, T. Koponen, E.J. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, et al., The design and implementation of open vSwitch, NSDI. 2015:117–130.

[228] T. Pham-Gia, N. Turkkan, System availability in a gamma alternating renewal process, Naval Research Logistics (NRL) 1999;46(7):822–844.

[229] T.C. Project, Sandbox, Last accessed February 2017.

[230] I. Psaras, W.K. Chai, G. Pavlou, Probabilistic in-network caching for information-centric networks, Proceedings of the ICN Workshop on Information-centric Networking, ser. ICN. 2012.

[231] M.-R. Ra, B. Priyantha, A. Kansal, J. Liu, Improving energy efficiency of personal sensing applications with heterogeneous multi-processors, Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM; 2012:1–10.

[232] D. Recordon, D. Reed, OpenID 2.0: a platform for user-centric identity management, Proceedings of the Second ACM Workshop on Digital Identity Management. 2006:16.

[233] M. Rosenblum, VMwares virtual platform, Proceedings of Hot Chips, vol. 1999. 1999:185–196.

[234] M. Ryden, K. Oh, A. Chandra, J. Weissman, Nebula: distributed edge cloud for data intensive computing, Cloud Engineering (IC2E), 2014 IEEE International Conference on. IEEE; 2014:57–66.

[235] A. Sahai, B. Waters, Fuzzy identity-based encryption, 2005, pp. 457–473.

[236] K.M. Saipullah, A. Anuar, N.A. Ismail, Y. Soo, Measuring power consumption for image processing on android smartphone, American Journal of Applied Sciences 2012;9(12):2052.

[237] M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, The case for VM-based cloudlets in mobile computing, Pervasive Computing, IEEE 2009;8(4):14–23.

[238] M. Satyanarayanan, Elijah: Cloudlet-based Mobile Computing, http://elijah.cs.cmu.edu/ [Online].

[239] D. Seal, ARM Architecture Reference Manual. Pearson Education; 2001.

[240] N. Shang, M. Nabeel, F. Paci, E. Bertino, A privacy-preserving approach to policy-based content dissemination, Data Engineering (ICDE), 2010 IEEE 26th International Conference on. IEEE; 2010:944–955.

[241] S. Sheikholeslam, C.A. Desoer, Longitudinal control of a platoon of vehicles, American Control Conference, 1990. IEEE; 1990:291–296.

[242] Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (COAP), 2014.

[243] C. Shi, M.H. Ammar, E.W. Zegura, M. Naik, Computing in cirrus clouds: the challenge of intermittent connectivity, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM; 2012:23–28.

[244] C. Shi, P. Pandurangan, K. Ni, J. Yang, M. Ammar, M. Naik, E. Zegura, IC-cloud: computation offloading to an intermittently-connected cloud. [Tech. Rep.] Georgia Institute of Technology; 2013.

[245] D. Shin, K. Kim, N. Chang, W. Lee, Y. Wang, Q. Xie, M. Pedram, Online estimation of the remaining energy capacity in mobile systems considering system-wide power consumption and battery characteristics, 18th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE; 2013:59–64.

[246] M.-K. Shin, K.-H. Nam, H.-J. Kim, Software-defined networking (SDN): a reference architecture and open APIs, ICT Convergence (ICTC), 2012 International Conference on. IEEE; 2012:360–361.

[247] V. Shoup, Lower bounds for discrete logarithms and related problems, Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, ser. EUROCRYPT. 1997.

[248] S. Singh, A trust based approach for secure access control in information centric network, International Journal of Information and Network Security 2012.

[249] K. Sinha, M. Kulkarni, Techniques for fine-grained, multi-site computation offloading, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE; 2011:184–194.

[250] M. Smit, M. Shtern, B. Simmons, M. Litoiu, Partitioning applications for hybrid and federated clouds, Proceedings of the 2012 Conference of the Center for Advanced Studies on Collaborative Research. IBM Corp.; 2012:27–41.

[251] A. Scarfo, New security perspectives around BYOD, Seventh International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA). 2012.

[252] Springsource Bundle Repository, SpringSource. [Online]. Available: http://ebr.springsource.com/repository/app/.

[253] O. Standard, OASIS advanced message queuing protocol (AMQP) version 1.0, 2012.

[254] O. Standard, MQTT version 3.1.1, [Online]. Available: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.html; 2015.

[255] Stanford Open Flow Team, OpenFlow Switch Specification, version 1.0.0, http://www.openflowswitch.org/documents/openflow-spec-v1.0.0.pdf; 2010.

[256] S.R. Steinhubl, E.D. Muse, E.J. Topol, Can mobile health technologies transform health care? JAMA 2013;310(22):2395–2396.

[257] P. Stued, I. Mohomed, D. Terry, WhereStore: location-based data storage for mobile devices interacting with the cloud, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. 2010.

[258] Y. Sun, S.K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M.A. Kaafar, S. Uhlig, Trace-driven analysis of ICN caching algorithms on video-on-demand workloads, Proceedings of the ACM International Conference on Emerging Networking Experiments and Technologies. 2014.

[259] V.O. Systems, Virtual open systems, http://www.virtualopensystems.com; 2013.

[260] M. Technology, Bring your own device, 2012.

[261] J. Thönes, Microservices, IEEE Software 2015;32(1):113–116.

[262] S. Tilkov, The modern cloud-based platform, IEEE Software 2015;32(2):113–116.

[263] A. Tootoonchian, Y. Ganjali, HyperFlow: a distributed control plane for OpenFlow, INM/WREN'10 Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking. 2010.

[264] W. Tsai, C. Fan, Y. Chen, R. Paul, J.-Y. Chung, Architecture classification for SOA-based applications, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing, 2006. (ISORC 2006). April 2006.

[265] J. Turnbull, The Docker Book: Containerization is the New Virtualization. 2014.

[266] T. Verbelen, T. Stevens, F. De Turck, B. Dhoedt, Graph partitioning algorithms for optimizing software deployment in mobile cloud computing, Future Generation Computer Systems 2013;29(2):451–459.

[267] O. vSwitch, KVM on open vSwitch, http://git.openvswitch.org/cgi-bin/gitweb.cgi?p=openvswitch;a=blob_plain;f=INSTALL.KVM;hb=HEAD; 2013.

[268] L. Wang, Y. Cui, I. Stojmenovic, X. Ma, J. Song, Energy efficiency on location based applications in mobile cloud computing: a survey, Computing 2014;96(7):569–585.

[269] Y. Wang, X. Lin, M. Pedram, A nested two stage game-based optimization framework in mobile cloud computing system, SOSE. 2013:494–502.

[270] Z. Wang, D. Huang, Y. Zhu, B. Li, C.-J. Chung, Efficient attribute-based comparable data access control, IEEE Transactions on Computers 2015;64(12):3430–3443.

[271] B. Waters, Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, Public Key Cryptography – PKC 2011. Springer-Verlag; 2011:53–70.

[272] S.A. Weil, S.A. Brandt, E.L. Miller, D.D. Long, C. Maltzahn, Ceph: a scalable, high-performance distributed file system, Proceedings of the 7th Symposium on Operating Systems Design and Implementation USENIX Association. 2006:307–320.

[273] A. Whitaker, M. Shaw, S.D. Gribble, et al., Denali: lightweight virtual machines for distributed and networked applications. [Technical Report 02-02-01] University of Washington; 2002.

[274] R. Wolski, S. Gurun, C. Krintz, D. Nurmi, Using bandwidth data to make computation offloading decisions, IEEE International Symposium on Parallel and Distributed Processing (IPDPS). IEEE; 2008:1–8.

[275] H. Wu, D. Huang, Modeling multi-factor multi-site risk-based offloading for mobile cloud computing, 10th International Conference on Network and Service Management (CNSM). IEEE; 2014:230–235.

[276] H. Wu, D. Huang, MoSeC: mobile-cloud service composition, 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). IEEE; 2015.

[277] H. Wu, D. Huang, S. Bouzefrane, Making offloading decisions resistant to network unavailability for mobile cloud collaboration, 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). IEEE; 2013:168–177.

[278] H. Wu, D. Huang, Y. Zhu, Establishing a personal on-demand execution environment for mobile cloud applications, Mobile Networks and Applications 2015;20(3):297–307.

[279] www.arndaleboard.org, Arndale board manual, Arndale, Tech. Rep., 2013.

[280] xen.org, Xen Hypervisor, available at http://www.xen.org/.

[281] C. Xian, Y.-H. Lu, Z. Li, Adaptive computation offloading for energy conservation on battery-powered systems, International Conference on Parallel and Distributed Systems, vol. 2. IEEE; 2007:1–8.

[282] Extensible Messaging and Presence Protocol (XMPP), available at http://xmpp.org/ Open Source.

[283] Z. Yan, H. Hongxin, A. Gail-Joon, H. Dijiang, W. Shanbiao, Towards temporal access control in cloud computing, INFOCOM. March 2012:2576–2580.

[284] K. Yang, X. Jia, K. Ren, Attribute-based fine-grained access control with efficient revocation in cloud storage systems, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM; 2013:523–528.

[285] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, A. Chan, A framework for partitioning and execution of data stream applications in mobile cloud computing, ACM SIGMETRICS Performance Evaluation Review 2013;40(4):23–32.

[286] C. Yoon, D. Kim, W. Jung, C. Kang, H. Cha, AppScope: application energy metering framework for android smartphone using kernel activity monitoring, USENIX ATC. 2012.

[287] S. Yu, K. Ren, W. Lou, Attribute-based on-demand multicast group setup with membership anonymity, Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York, NY, USA: ACM; 2008.

[288] S. Yu, K. Ren, W. Lou, Attribute-based on-demand multicast group setup with membership anonymity, Computer Networks 2010;54(3):377–386.

[289] L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R.P. Dick, Z.M. Mao, L. Yang, Accurate online power estimation and automatic battery behavior based power model generation for smartphones, Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM; 2010:105–114.

[290] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley, C. Papadopoulos, L. Wang, B. Zhang, et al., Named data networking, ACM SIGCOMM Computer Communication Review 2014;44(3):66–73.

[291] X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, S. Jeong, Securing elastic applications on mobile devices for cloud computing, Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 2009:127–134.

[292] X. Zhang, A. Kunjithapatham, S. Jeong, S. Gibbs, Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing, Mobile Networks and Applications 2011;16(3):270–284.

[293] Z. Zhou, D. Huang, On efficient ciphertext-policy attribute based encryption and broadcast encryption, Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM; 2010:753–755.

[294] Z. Zhou, D. Huang, Efficient and secure data storage operations for mobile cloud computing, IACR Cryptology ePrint Archive 2011;2011:185.

[295] Z. Zhou, D. Huang, Gradual identity exposure using attribute-based encryption, International Journal of Information Privacy, Security and Integrity 2012;1(2):278–297.

[296] Z. Zhou, D. Huang, Z. Wang, Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption, Computers, IEEE Transactions on 2013;64(1):126–138.

[297] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, H. Zhao, Comparison-based encryption for fine-grained access control in clouds, Proceedings of the ACM Conference on Data and Application Security and Privacy, ser. CODASPY. 2012.

[298] Y. Zhu, D. Ma, C.-J. Hu, D. Huang, How to use attribute-based encryption to implement role-based access control in the cloud, Proceedings of the 2013 International Workshop on Security in Cloud Computing. ACM; 2013:33–40.

[299] Y. Zhu, D. Ma, D. Huang, C. Hu, Enabling secure location-based services in mobile cloud computing, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing. ACM; 2013:27–32.

[300] ZScaler Cloud Security, http://www.zscaler.com/; 2011.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset