Security in Mobile Computing

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Julie R. Mariga

This chapter introduces the enormous impact of mobile computing on both companies and individuals. Companies face many issues related to mobile computing. For example: which devices will be supported by the organization? which devices will fulfill the business objectives? which form factor will win? which features and networks will future devices offer? which operating systems will they run? what will all this cost? what are the security issues involved? what are the business drivers? This chapter will discuss the major business drivers in the mobile computing field, and provide an analysis of the top two operating systems that are currently running the majority of mobile devices. These platforms are the 1) Palm operating system (OS), and 2) Microsoft Windows CE operating system. The chapter will analyze the strengths and weaknesses of each operating system and discuss market share and future growth.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2006 ◽  
Vol 48 (6) ◽  
Author(s):  
Chris Mitchell

Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure ‘imprinting’ of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevance of trusted computing technology to mobile security issues.


Author(s):  
Lukáš Aron

This chapter contains basic introduction into security models of modern operating system like Android, iOS or Windows Phone. There are described the methods of attacks to the mobile devices. Such attacks consist of application based threats and vulnerabilities, network based attacks and internet browser vulnerabilities. The following section contains description of defensive strategies and steps for securing the device. There is also section about securing mobile device for enterprise environment. At the end of this chapter are discussed recommendations for security practices for mobile devices.


Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.


Author(s):  
Parkavi R ◽  
Priyanka C ◽  
Sujitha S. ◽  
Sheik Abdullah A

Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry ring words and a major conversation thread in the IT world with an explosive development of the mobile applications and emerging of cloud computing idea, the MCC has become a possible technology for the mobile service users. The concepts of Cloud computing are naturally meshed with mobile devices to allow on-the-go functionalities and benefits. The mobile cloud computing is emerging as one of the most important branches of cloud computing and it is expected to expand the mobile ecosystems. As more mobile devices enter the market and evolve, certainly security issues will grow as well. Also, enormous growth in the variety of devices connected to the Internet will further drive security needs. MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment.


2017 ◽  
Vol 5 ◽  
pp. 193-199
Author(s):  
Mateusz Dobrowolski ◽  
Michał Dobrowolski ◽  
Piotr Kopniak

This publication concentrate on the posibility of the use of sensors in mobile devices with modified operating systems. Presented research focuses on Android devices. The gyroscope, the accelerometer, the orientation sensor and the light sensor data was acquired with use of Physics Toolbox Sensor software. The research has been conducted on two mobile devices of Xiaomi under control of six different kinds of operating system. Measured values were compared to values recorded by very accurate, reference sensors


Author(s):  
Rajesh Keshavrao Deshmukh ◽  
Shilpa Markandey ◽  
Pooja Sahu

The Android is mobile platform. It is an open source and free operating system application, by Google it is developed and maintained. It was designed essentially for touch screen mobile devices, such as and tablet, computers, smart phones, watch television, cars etc. Android is one of the most widely used mobile OS. Android is a not only operating system but also key applications and middleware. Android is an open source operating system. It is developed by the open handset Alliance, led by Google, and other companies. Those are used to android studio 2.2.3 version and development the mobile application.


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


Sign in / Sign up

Export Citation Format

Share Document