Skip to main content

Mobile Computing in the Construction Industry: Main Challenges and Solutions

  • Conference paper
  • First Online:
Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy

Abstract

Cloud computing (CC) enables users to access application remotely, providing mobility and ubiquitous data access; this would be an advantage in construction management. In addition, mobile cloud computing (MCC) enables mobile devices to augment constrained resources such as processing, storage, and battery autonomy by using the cloud infrastructure. This paper is aimed at proposing solutions to some of the main challenges of the construction sector by adopting mobile cloud services. A literature review was performed highlighting the potential benefits and risks in the implementation of CC, infrastructure and execution of MCC, and main challenges in the construction industry. The main benefits of adopting cloud-based resources are cost reduction, system mobility, system flexibility, and system maintenance. While the main risks are information security, privileged user access, regulatory compliance, data location, availability, and disaster recovery. In terms of execution, cloud-based mobile applications present mostly benefits since they enable users to execute ubiquitously high-performance operations in mobile devices. The review of the literature provided enough information for this paper to suggest solutions to some of the main challenges in the construction sector, namely: design, materials, finance, management, and knowledge. The solutions are mainly based on providing mobility, ubiquitous data access, and improved cross-functional communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.

    Article  Google Scholar 

  • Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52–68.

    Article  Google Scholar 

  • CSA (2011). Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance.

    Google Scholar 

  • Ayarkwa, J., Agyekum, K., & Adinyira, E. (2011). Barriers to sustainable implementation of lean construction in the Ghanaian building industry (p. 67). Paper presented at the Sixth Built Environment Conference Johannesburg South Africa July 31–August 2, 2011.

    Google Scholar 

  • Ballagas, R. A., Kratz, S. G., Borchers, J., Yu, E., Walz, S. P., Fuhr, C. O., et al. (2007). REXplorer: A mobile, pervasive spell-casting game for tourists (pp. 1929–1934). Paper presented at the CHI’07 Extended Abstracts on Human Factors in Computing Systems.

    Google Scholar 

  • Box. (2014). The information economy: A study of five industries. Available: https://www.box.com/blog/mapping-the-information-economy-a-tale-offive-industries/.

  • Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726–733.

    Article  Google Scholar 

  • Cano, M., & Domenech-Asensi, G. (2011). A secure energy-efficient m-banking application for mobile devices. Journal of Systems and Software, 84(11), 1899–1909.

    Article  Google Scholar 

  • Carroll, M., Van Der Merwe, A., & Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls (pp. 1–9). Paper presented at the Information Security South Africa (ISSA), 2011.

    Google Scholar 

  • Cheng, J. C., & Kumar, B. (2012). Cloud computing support for construction collaboration. In Mobile and pervasive computing in construction (pp. 237–254).

    Google Scholar 

  • Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload (pp. 49–62). Paper presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services.

    Google Scholar 

  • European Network and Information Security Agency. (2009). Cloud computing: Benefits, risks and recommendations for information security. ENISA.

    Google Scholar 

  • Fink, A. (1998). Conducting research literature reviews: From paper to the internet. 1st ed. Los Angeles, United States: Thousand Oaks : Sage Publications.

    Google Scholar 

  • Häkkinen, T., & Belloni, K. (2011). Barriers and drivers for sustainable building. Building Research & Information, 39(3), 239–255.

    Article  Google Scholar 

  • Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner report.

    Google Scholar 

  • Hubbard, D., & Sutton, M. (2010). Top threats to cloud computing v1. 0. Cloud Security Alliance.

    Google Scholar 

  • ISACA, U. (2010). ISACA US IT risk/reward barometer survey. The Information Systems Audit and Control Association [Online]. Retrieved December 12, 2014, from http://www.Isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ISACA-US-IT-Risk-Reward-Barometer-Survey.Aspx

  • Jansen, W., & Hooks, C. (2011) Security and privacy issues in cloud computing system sciences (HICSS). Paper presented at the 2011 44th Hawaii International Conference on.

    Google Scholar 

  • Lenders, V., Wagner, J., & May, M. (2006). Analyzing the impact of mobility in ad hoc networks (pp. 39–46). Paper presented at the Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality.

    Google Scholar 

  • Marotta, M. A., Faganello, L. R., Schimuneck, M. A. K., Granville, L. Z., Rochol, J., & Both, C. B. (2015). Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks.

    Google Scholar 

  • Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. New York: Assoc Computing Machinery.

    Google Scholar 

  • Menken, I. (2012). An introduction to Cloud Computing. Emereo Publishing.

    Google Scholar 

  • Nazir, F., Ma, J., & Seneviratne, A. (2009). Time critical content delivery using predictable patterns in mobile social networks (Vol. 4, pp. 1066–1073). Paper presented at the International Conference on Computational Science and Engineering, 2009, CSE’09.

    Google Scholar 

  • Prakash, S. (2011). Risk management: Cloud computing considerations. Canadian Management Accounting.

    Google Scholar 

  • Proverbs, D.G., Holt, G.D. and Cheok, H.Y., 2000. Construction industry problems: the views of UK construction Directors, 16th Annual ARCOM Conference 2000, pp. 73–81.

    Google Scholar 

  • Rengaraju, P., Lung, C., Yu, F. R., & Srinivasan, A. (2012). On QoE monitoring and E2E service assurance in 4G wireless networks. IEEE Wireless Communications, 19(4), 89–96.

    Article  Google Scholar 

  • Rountree, D. and Castrillo, I., 2013. The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes.

    Google Scholar 

  • Shehu, Z., & Akintoye, A. (2010). Major challenges to the successful implementation and practice of programme management in the construction environment: A critical analysis. International Journal of Project Management, 28(1), 26–39.

    Article  Google Scholar 

  • Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109–116.

    Article  Google Scholar 

  • Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278.

    Article  Google Scholar 

  • Teuteberg, F., & Wittstruck, D. (2010). A systematic review of sustainable supply chain management. Multikonferenz Wirtschaftsinformatik, 2010, 203.

    Google Scholar 

  • Vaquero, L.M., Rodero-Merino, L., Caceres, J. and Lindner, M., 2009. A Break in the Clouds: Towards a Cloud Definition. New York: Assoc Computing Machinery.

    Google Scholar 

  • Vouk, M.A., 2008. Cloud computing - Issues, research and implementations, 2008, IEEE, pp. 31–40.

    Google Scholar 

  • Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.

    Article  Google Scholar 

  • Zhang, J., & Figueiredo, R. J. (2006). Application classification through monitoring and learning of resource consumption patterns (10 pp). Paper presented at the 20th International Parallel and Distributed Processing Symposium, 2006, IPDPS 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Renukappa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this paper

Cite this paper

Silverio, M., Renukappa, S., Suresh, S., Donastorg, A. (2017). Mobile Computing in the Construction Industry: Main Challenges and Solutions. In: Benlamri, R., Sparer, M. (eds) Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy. Springer Proceedings in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-319-43434-6_8

Download citation

Publish with us

Policies and ethics