Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lo'ai Ali Tawalbeh is active.

Publication


Featured researches published by Lo'ai Ali Tawalbeh.


2015 Fifth International Conference on e-Learning (econf) | 2015

Resilience Mobile Cloud Computing: Features, Applications and Challenges

Lo'ai Ali Tawalbeh; Norah Alassaf; Waseem Bakheder; Alaa Tawalbeh

Mobile Cloud Computing is a very important trend nowadays. It merges the cloud computing technologies with mobile devices to overcome the limitations of these devices such as limited battery life time, limited processing and storage capabilities. The tasks that need massive computations can be performed on the cloud efficiently and the results will be sent back to the mobile device, this way, the mobile battery and resources will be saved. This Paper presents overview of Mobile Cloud Computing and efficient architectures and applications. Also, we will present several important features and challenges for mobile cloud computing systems including resilience, security, scalability and availability.


Procedia Computer Science | 2016

Studying the Energy Consumption in Mobile Devices

Mohammad Tawalbeh; Alan Eardley; Lo'ai Ali Tawalbeh

Abstract In the last few years, it is noticed that mobile smart devices are becoming very essential component of our daily life. The smart phones can do a variety of very useful jobs. In addition to make calls, they can be used to create and share multimedia files, run very useful applications and do data processing. But those devices suffer from some limitations including limited storage and processing capacity and short battery life time due to energy drain which is noticed to be increased when running applications that require intensive computations on the mobile devices. In this paper, the literature is searched for related work, and the power consumption is measured experimentally for different components of two common brands of smart phones, namely, Galaxy Note3 and Sony Xperia Z2. The measurements are done using applications that measures the power consumed in each component of the phone. The obtained results are presented to get more accurate understanding of how these components participate to the overall power consumption of the smart phone. Also, this work can be used in the future to propose better techniques to reduce the energy consumption by the smart phones.


2015 International Conference on Cloud and Autonomic Computing | 2015

Secure and Efficient Cloud Computing Framework

Lo'ai Ali Tawalbeh; Raad S. Al-Qassas; Nour S. Darwazeh; Yaser Jararweh; Fahd M. Al-Dosari

Cloud computing is a very useful solution to many individual users and organizations. It can provide many services based on different needs and requirements. However, there are many issues related to the user data that need to be addressed when using cloud computing. Among the most important issues are: data ownership, data privacy, and storage. The users might be satisfied by the services provided by the cloud computing service providers, since they need not worry about the maintenance and storage of their data. On the other hand, they might be worried about unauthorized access to their private data. Some solutions to these issues were proposed in the literature, but they mainly increase the cost and processing time since they depend on encrypting the whole data. In this paper, we are introducing a cloud computing framework that classifies the data based on their importance. In other words, more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted. This approach is very helpful in reducing the processing cost and complexity of data storage and manipulation since we do not need to apply the same sophisticated encryption techniques to the entire users data. The results of applying the proposed framework show improvement and efficiency over other existing frameworks.


international conference for internet technology and secured transactions | 2016

Towards secure communications: Review of side channel attacks and countermeasures on ECC

Lo'ai Ali Tawalbeh; Turki F. Somani; Hilal Houssain

There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.


acs/ieee international conference on computer systems and applications | 2016

Integrated sensors system based on IoT and mobile cloud computing

Majed AlOtaibi; Lo'ai Ali Tawalbeh; Yaser Jararweh

The advances in IT sector, cloud computing, the wide usage of sensors and mobile devices, and the Internet-of-Things (IoT) made our world looks like a small town. These rapid developments keep us connected all the day and seven days a week. Also, the IoT enables the connection of the devices around us (including different sensors) to the internet via different wireless and wired communication technologies. These networked sensors can be used to collect different types of data from different applications (healthcare, agriculture, civil and social life) and send it for processing and extraction of appropriate decisions. The mobile cloud computing technology is an efficient solution to process different types of collected data and respond with the required answer in real time situations where the quick response is very important. In this paper, we build a multipurpose integrated sensors system. This integrated system consists of networked sensors for different purposes and applications. For example, the sensors can be health sensors to measure the pulse and blood pressure of patients, or it can be sensors to measure the temperature to indicate a fire accident. The networked sensors will transfer the sensed data through wireless technologies to a Cloud for processing and notifying the listed users to take the proper action.


cooperative and human aspects of software engineering | 2016

A Mobile Cloud Computing Model Using the Cloudlet Scheme for Big Data Applications

Lo'ai Ali Tawalbeh; Waseem Bakheder; Houbing Song


Archive | 2018

Automated negotiated user profiling across distributed social mobile clouds for resource optimisation

Elhadj Benkhelifa; Thomas Welsh; Lo'ai Ali Tawalbeh; Yaser Jararweh


2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) | 2018

Power consumption experimental analysis in smart phones

Esraa Ahmadoh; Lo'ai Ali Tawalbeh


2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) | 2018

Feasibility study and requirements for mobile cloud healthcare systems in Saudi Arabia

Suhaila Habeeb; Lo'ai Ali Tawalbeh


conference on computer communications workshops | 2017

Intrusion and attacks over mobile networks and cloud health systems

Lo'ai Ali Tawalbeh; Hala Tawalbeh; Houbing Song; Yaser Jararweh

Collaboration


Dive into the Lo'ai Ali Tawalbeh's collaboration.

Top Co-Authors

Avatar

Yaser Jararweh

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Elhadj Benkhelifa

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hilal Houssain

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Hala Tawalbeh

Jordan University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge