Towards a Distributed Platform for Resource-Constrained Devices
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Balancing Performance, Energy, and Quality in Pervasive Computing
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Email as spectroscopy: automated discovery of community structure within organizations
Communities and technologies
Tactics-based remote execution for mobile computing
Proceedings of the 1st international conference on Mobile systems, applications and services
A clean slate 4D approach to network control and management
ACM SIGCOMM Computer Communication Review
User experiences with sharing and access control
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Ethane: taking control of the enterprise
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
OpenFlow: enabling innovation in campus networks
ACM SIGCOMM Computer Communication Review
Leveraging smart phones to reduce mobility footprints
Proceedings of the 7th international conference on Mobile systems, applications, and services
The Case for VM-Based Cloudlets in Mobile Computing
IEEE Pervasive Computing
Energy consumption in mobile phones: a measurement study and implications for network applications
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Securing elastic applications on mobile devices for cloud computing
Proceedings of the 2009 ACM workshop on Cloud computing security
Detecting professional versus personal closeness using an enterprise social network site
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Dynamically partitioning applications between weak devices and clouds
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
MAUI: making smartphones last longer with code offload
Proceedings of the 8th international conference on Mobile systems, applications, and services
Augmented smartphone applications through clone cloud execution
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
CODES/ISSS '10 Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
CloneCloud: elastic execution between mobile device and cloud
Proceedings of the sixth conference on Computer systems
Tesseract: a 4D network control plane
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Distributed mobile application for crop farmers
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Reliable services composition for mobile consumption in mHealth
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
Offloading has emerged as a promising idea to allow resource-constrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks to make offloading amenable to adoption by enterprises: (i) ensuring privacy and trustworthiness of offload, (ii) decoupling offloading systems from their reliance on the availability of dedicated resources and (iii) accommodating offload at scale. We present the design and implementation of ECOS, an enterprise-centric offloading framework that leverages Software-Defined Networking to augment prior offloading proposals and address these limitations. ECOS functions as an application running at an enterprise-wide controller to allocate resources to mobile applications based on privacy and performance requirements, to ensure fairness, and to enforce security constraints. Experiments using a prototype based on Android and OpenFlow establish the effectiveness of our approach.