Lo'ai Ali Tawalbeh
Umm al-Qura University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Lo'ai Ali Tawalbeh.
2015 Fifth International Conference on e-Learning (econf) | 2015
Lo'ai Ali Tawalbeh; Norah Alassaf; Waseem Bakheder; Alaa Tawalbeh
Mobile Cloud Computing is a very important trend nowadays. It merges the cloud computing technologies with mobile devices to overcome the limitations of these devices such as limited battery life time, limited processing and storage capabilities. The tasks that need massive computations can be performed on the cloud efficiently and the results will be sent back to the mobile device, this way, the mobile battery and resources will be saved. This Paper presents overview of Mobile Cloud Computing and efficient architectures and applications. Also, we will present several important features and challenges for mobile cloud computing systems including resilience, security, scalability and availability.
Procedia Computer Science | 2016
Mohammad Tawalbeh; Alan Eardley; Lo'ai Ali Tawalbeh
Abstract In the last few years, it is noticed that mobile smart devices are becoming very essential component of our daily life. The smart phones can do a variety of very useful jobs. In addition to make calls, they can be used to create and share multimedia files, run very useful applications and do data processing. But those devices suffer from some limitations including limited storage and processing capacity and short battery life time due to energy drain which is noticed to be increased when running applications that require intensive computations on the mobile devices. In this paper, the literature is searched for related work, and the power consumption is measured experimentally for different components of two common brands of smart phones, namely, Galaxy Note3 and Sony Xperia Z2. The measurements are done using applications that measures the power consumed in each component of the phone. The obtained results are presented to get more accurate understanding of how these components participate to the overall power consumption of the smart phone. Also, this work can be used in the future to propose better techniques to reduce the energy consumption by the smart phones.
2015 International Conference on Cloud and Autonomic Computing | 2015
Lo'ai Ali Tawalbeh; Raad S. Al-Qassas; Nour S. Darwazeh; Yaser Jararweh; Fahd M. Al-Dosari
Cloud computing is a very useful solution to many individual users and organizations. It can provide many services based on different needs and requirements. However, there are many issues related to the user data that need to be addressed when using cloud computing. Among the most important issues are: data ownership, data privacy, and storage. The users might be satisfied by the services provided by the cloud computing service providers, since they need not worry about the maintenance and storage of their data. On the other hand, they might be worried about unauthorized access to their private data. Some solutions to these issues were proposed in the literature, but they mainly increase the cost and processing time since they depend on encrypting the whole data. In this paper, we are introducing a cloud computing framework that classifies the data based on their importance. In other words, more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted. This approach is very helpful in reducing the processing cost and complexity of data storage and manipulation since we do not need to apply the same sophisticated encryption techniques to the entire users data. The results of applying the proposed framework show improvement and efficiency over other existing frameworks.
international conference for internet technology and secured transactions | 2016
Lo'ai Ali Tawalbeh; Turki F. Somani; Hilal Houssain
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.
acs/ieee international conference on computer systems and applications | 2016
Majed AlOtaibi; Lo'ai Ali Tawalbeh; Yaser Jararweh
The advances in IT sector, cloud computing, the wide usage of sensors and mobile devices, and the Internet-of-Things (IoT) made our world looks like a small town. These rapid developments keep us connected all the day and seven days a week. Also, the IoT enables the connection of the devices around us (including different sensors) to the internet via different wireless and wired communication technologies. These networked sensors can be used to collect different types of data from different applications (healthcare, agriculture, civil and social life) and send it for processing and extraction of appropriate decisions. The mobile cloud computing technology is an efficient solution to process different types of collected data and respond with the required answer in real time situations where the quick response is very important. In this paper, we build a multipurpose integrated sensors system. This integrated system consists of networked sensors for different purposes and applications. For example, the sensors can be health sensors to measure the pulse and blood pressure of patients, or it can be sensors to measure the temperature to indicate a fire accident. The networked sensors will transfer the sensed data through wireless technologies to a Cloud for processing and notifying the listed users to take the proper action.
cooperative and human aspects of software engineering | 2016
Lo'ai Ali Tawalbeh; Waseem Bakheder; Houbing Song
Archive | 2018
Elhadj Benkhelifa; Thomas Welsh; Lo'ai Ali Tawalbeh; Yaser Jararweh
2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) | 2018
Esraa Ahmadoh; Lo'ai Ali Tawalbeh
2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) | 2018
Suhaila Habeeb; Lo'ai Ali Tawalbeh
conference on computer communications workshops | 2017
Lo'ai Ali Tawalbeh; Hala Tawalbeh; Houbing Song; Yaser Jararweh