Opportunistic resource sharing in mobile cloud computing

Wei Liu, Ryoichi Shinkuma, Tatsuro Takahashi

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


The mobile cloud computing (MCC) paradigm is aimed at integrating mobile devices with cloud computing. In the client-server architecture of MCC, mobile devices offload tasks to the cloud to utilize the computation and storage resources of data centers. However, due to the rapid increase in the traffic demand and complexity of mobile applications, service providers have to continuously upgrade their infrastructures at great expense. At the same time, modern mobile devices have greater resources (communication, computation, and sensing), and these resources are not always fully utilized by device users. Therefore, mobile devices, from time to time, encounter other devices that could provide resources to them. Because the amount of such resources has increased with the number of mobile devices, researchers have begun to consider making use of these resources, located at the "edge" of mobile networks, to increase the scalability of future information networks. This has led to a cooperation based architecture of MCC. This paper reports the concept and design of an resource sharing mechanism that utilize resources in mobile devices through opportunistic contacts between them. Theoretical models and formal definitions of problems are presented. The efficiency of the proposed mechanism is validated through formal proofs and extensive simulation.

Original languageEnglish
Pages (from-to)2668-2679
Number of pages12
JournalIEICE Transactions on Communications
Issue number12
Publication statusPublished - 2014 Dec 1
Externally publishedYes


  • Delay tolerant networks
  • Mobile cloud computing
  • Opportunistic networks
  • Resource sharing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Opportunistic resource sharing in mobile cloud computing'. Together they form a unique fingerprint.

Cite this