scholarly journals Comparison of the security mechanisms of popular operating systems for mobile devices

2017 ◽  
Vol 4 ◽  
pp. 87-91
Author(s):  
Michał Buryta ◽  
Piotr Kopniak

The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer.

2021 ◽  
Vol 2022 (1) ◽  
pp. 586-607
Author(s):  
Maximilian Zinkus ◽  
Tushar M. Jois ◽  
Matthew Green

Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.


Author(s):  
Uma Rathore Bhatt ◽  
Nitin Chouhan ◽  
Antim Bala Marmat ◽  
Raksha Upadhyay

: In the present scenario, increasing bandwidth demand and data-hungry applications require every network to be equipped with cloud services, as a huge amount of storages, processing power and miraculous speed available with it. Cloud integrated Wireless Optical Broadband Access Network (CIW) is one of the suitable choices to fulfil these requirements. CIW can be realized by deploying Cloud Components (CCs) or thin servers either at optical back-end or at wireless front-end of the (Wireless Optical Broadband Access Network) WOBAN. In the present work, we integrate cloud components at wireless front-end of the CIW. Integration of CCs at front-end offloads traffic associated with cloud services from wireless front-end and diverts it towards CCs, which results in a reduction in bandwidth usage of the wireless front-end of WOBAN. We introduce a novel approach known as cluster-based optimization of network components in CIW. The proposed algorithm eliminates redundant Optical Network Units (ONUs) and optimizes a number of CCs while ensuring network connectivity and cloud services to all users. Simulation results validate that the proposed algorithm offers suitable candidature to deploy cost-efficient CIW.


Author(s):  
Su-Zhen Huang ◽  
◽  
Min Wu ◽  
Yong-Hua Xiong

Mobile devices have emerged as an indispensable part of our daily life, one that has resulted in an increased demand for mobile devices to be able to access the Internet and obtain a variety of network services. However, mobile devices are often constrained by limited storage, huge power consumption, and low processing capability. This paper presents a new computing mode, mobile transparent computing (MTC), which combines ubiquitous mobile networks with transparent computing, to address the above challenges and possibly to enable a new world of ubiquitous operating systems (OSes) and applications with the following characteristics: (1) Mobile devices with no OSes pre-installed are able to load and boot multiple OSes on demand through a transparent network; (2) All resources, including the operating system (OS), applications, and user data, are stored on a transparent server (TS) rather than a mobile terminal, and can be streamed to be executed on mobile devices in small execution blocks; (3) All the personalized services (applications and data) can be synchronized to any other devices with the same user credential. Specifically, we propose a Pre OS technique, which can achieve feature (1) in the MTC model by initializing the mobile device and driving a network interface card (NIC) prior to OS loading, thereby transferring the needed OS streaming block to the mobile device. Experimental results conducted on the tablet demo-board with the model OK6410 based on the ARM11 architecture demonstrate that the Pre OS is able to support remote boot and streaming execution for both Android and Linux OS with satisfactory performance.


Author(s):  
Blaž Denko ◽  
Špela Pečnik ◽  
Iztok Fister Jr.

The number of users of smart mobile devices is growing every day. Because of the popularity of using mobile devices, it is important for business stakeholders to develop mobile applications targeting all mobile platforms in order to ensure that the number of users is as large as possible. One possible solution is the creation of hybrid mobile applications. These are applications that combine the properties of web and native mobile applications, and their main advantage is compatibility with multiple mobile operating systems. This paper presents the results of very comprehensive experiments that involved the use of various hybrid mobile development frameworks that were tested under different scenarios. Experiments revealed that the performance of hybrid applications in different scenarios varies considerably, although the results of these applications were comparable to those that were achieved in the experiment with the native application.


2018 ◽  
Vol 2018 ◽  
pp. 1-19
Author(s):  
Hyunsoon Kim ◽  
Mungyu Bae ◽  
Woonghee Lee ◽  
Hwangnam Kim

Today’s mobile devices mostly contain more than one wireless interface for Internet connection. Smartphones mostly have both LTE and Wi-Fi for data communication through Internet. Although the availability of Wi-Fi is incomparable to that of cellular network, its strength lies in the low cost and high data rate due to continuous PHY and MAC advancement of 802.11 protocol extensions. In this paper, we propose a device-centric system that performs cost-effective network connectivity to the mobile device by selectively activating Wi-Fi communication according to the device mobility and corresponding history of Wi-Fi usage. By analyzing the device mobility using attached sensors, the system selects appropriate Wi-Fi that has been often used in that mobility state. The system was implemented in actual mobile devices that were used to several experiments we designed to prove high performance of the system.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2020 ◽  
Author(s):  
D. Winseck

This report examines the development of the media economy over the past thirty-five years. Since beginning this project a decade ago, we have focused on analyzing a comprehensive as possible selection of the biggest telecoms, Internet and media industries (based on revenue) in Canada, including: mobile wireless and wireline telecoms; Internet access; cable, satellite & IPTV; broadcast television, specialty and pay television services as well as Internet-based video subscription and download services; radio; newspapers; magazines; music; Internet advertising; social media; operating systems; browsers, etc.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Olawale Surajudeen Adebayo ◽  
Normaziah Abdul Aziz

The usefulness of mobile phones nowadays has gone beyond making calls and sending text messages. In fact, most of applications available on desktop computer are presently easily accessible on mobile devices, especially smartphone based on Androids, iOS, and Windows phone platforms. However, at the same time, malware is increasingly becoming pervasive on a mobile platform for financial, social and political exploitation. This chapter examines the trends of mobile malware and different efforts of anti-malware writers and researchers in addressing mobile malware on smartphones.


Sign in / Sign up

Export Citation Format

Share Document