The Community for Technology Leaders
RSS Icon
Issue No.04 - Oct.-Dec. (2013 vol.12)
pp: 40-49
Mahadev Satyanarayanan , Carnegie Mellon University
Grace Lewis , Software Engineering Institute
Edwin Morris , Software Engineering Institute
Soumya Simanta , Software Engineering Institute
Jeff Boleng , Software Engineering Institute
Kiryong Ha , Carnegie Mellon University
The convergence of mobile computing and cloud computing is predicated on a reliable, high-bandwidth end-to-end network. This basic requirement is hard to guarantee in hostile environments such as military operations and disaster recovery. In this article, the authors examine how VM-based cloudlets that are located in close proximity to associated mobile devices can overcome this challenge. This article is part of a special issue on the edge of the cloud.
Cloud computing, Mobile handsets, Mobile communication, Wireless communication, Wireless sensor networks, Mobile computing,virtual machines, mobile computing, cloud computing, fault tolerance, high availability, pervasive computing
Mahadev Satyanarayanan, Grace Lewis, Edwin Morris, Soumya Simanta, Jeff Boleng, Kiryong Ha, "The Role of Cloudlets in Hostile Environments", IEEE Pervasive Computing, vol.12, no. 4, pp. 40-49, Oct.-Dec. 2013, doi:10.1109/MPRV.2013.77
1. S. Brenner, Cyber Threats: The Emerging Fault Lines of the Nation State, Oxford Univ. Press, 2009.
2. A. Savvas, “, Firms Will Flee Cloud if Lessons from Siri and RIM Outages Not Learned,” CFO World, Nov. 2011; 3316907firms-will-flee-cloud-if-lessons-from-siri-and-rim-outages-not-learned .
3. D. Kucera, “Amazon Apologizes for Christmas Eve Outage Affecting Netflix,” Bloomberg Businessweek,31 Dec. 2012; .
4. M. Satyanarayanan et al., “The Case for VM-based Cloudlets in Mobile Computing,” IEEE Pervasive Computing, vol. 8, no. 4, 2009, pp. 14-23; doi: 10.1109/MPRV.2009.82.
5. J. Flinn., Cyber Foraging: Bridging Mobile and Cloud Computing via Opportunistic Offload, Morgan & Claypool, 2012.
6. J. Morris et al., “A Distributed Personal Computing Environment,” Comm. ACM, vol. 29, no. 3, 1986, pp. 184-201.
7. M. Satyanarayanan et al., “The ITC Distributed File System: Principles and Design,” Proc. 10th ACM Symp. Operating System Principles, ACM, 1985, pp. 35-50.
8. M.J. Zieniewicz et al., “The Evolution of Army Wearable Computers,” IEEE Pervasive Computing, vol. 1, no. 4, 2002, pp. 30-40; doi: 10.1109/MPRV.2002.1158276.
9. “Information Warfare: Evolving Offensive and Defensive Information Warfare Strategies in Mobile Networks,” white paper, Scalable Network Technologies, 2008.
10. J. Kong, X. Hong, and M. Gerla, “A New Set of Passive Routing Attacks in Mobile Ad Hoc Networks,” IEEE Military Communications Conf. (Milcom 03), IEEE, 2003; doi: 10.1109/MILCOM.2003.1290214.
11. R.R. Rao, J. Eisenberg, and T. Schmitt eds., , Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery, National Academies Press, 2007.
12. J.J. Kistler and M. Satyanarayanan, “Disconnected Operation in the Coda File System,” ACM Trans. Computer Systems, vol. 10, no. 1, 1992, pp. 3-25.
13. K. Ha et al., “Just-In-Time Provisioning for Cyber Foraging,” Proc. 11th Ann. Int’l Conf. Mobile Systems, Applications, and Service (MobSys 13), ACM, 2013, pp. 153-166.
14. M. Satyanarayanan, “The Evolution of Coda,” ACM Trans. Computer Systems, vol. 20, no. 2, 2002, pp. 85-124.
15. H.A. Simon, “The Architecture of Complexity,” Proc. Am. Philosophical Society, vol. 106, no. 6, 1962, pp. 467-482.
16. Y. Xiao et al., “Lowering the Barriers to Large-Scale Mobile Crowdsensing,” Proc. 14th Workshop Mobile Computing Systems and Applications (Hotmobile 13), ACM, 2013; doi: 10.1145/2444776.2444789.
17. R. Miller, “AOL Brings Micro Data Center Indoors, Adds Wheels,” Data Center Knowledge, Aug. 2012; 08/13aol-brings-micro-data-center-indoors-adds-wheels .
18. “IBM and Nokia Siemens Networks Developing Mobile Edge Computing Platform,” Cellular-News, Mar. 2013;
73 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool