Resource management and security issues in mobile phone operating systems: A comparative analysis (original) (raw)

Effective Memory Management for Mobile operating Systems

ABSTRACT:As technology is progress day by day, a person who is not using a mobile phone is hardly discovered nowadays because the mobile phone is a device which helps people to ease their tasks. As mobile phone users, much concern about the high quality and much user experience in mobile applications, the mobile application needs more memory. So it has to keep several processes in memory to improve CPU Utilization and the speed of its response to users. So memory management is a key issue for mobile operating systems (OS). Mainly its memory is limited and not expandable, and efficient memory management is the only solution for these problems. Mostly when the memory is not enough to run the applications, mobile phones get stuck. So mobile operating systems use different techniques to manage memory in a proper way. In most of these techniques involved with terminating of applications forcefully when the device runs in low memory. But it does not consider whether it is a more usable application or an application that takes more time to launch. It is the most common issue in the OSs.There are many types of studies, various applications and approaches have been proposed in achieving the optimized use of memory in the mobile operating system. Still, there is no complete solution for this issue

Memory Management in Mobile OS

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

The mobile phones are increasing day by day and the usage is also increasing. Some of the phones have limited space or do not have much memory due to this user's face issue related to running mobile. For using memory effectively many of the techniques related to memory management are proposed. In this paper, we have reviewed memory management and its optimization techniques in various available mobile OSs, some of the basic techniques are discussed and comparison of various operating systems have been shown in the paper. Some of the details like which operating system is better and various information related to it is mentioned in the paper. Some of the basic solutions to optimize the memory in mobile OS are also mentioned in this paper.

Smartphones Platform Security a Comparison Study

Nowadays Smart phones and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. So, security aspect of those devices should be taken into account seriously since phone users access wide range of none secure wireless networks and download applications on free sources which may contain harmful viruses and/or malwares. The best way of securing mobile devices is to enforce good security policy through operating systems. This paper will walk around main necessary principles of security in mobile operating systems. Then will compare those principles for four main mobile operating systems such as Android from Google, BlackBerry from research motion, Windows mobile phone from Microsoft and iOS from Apple. Finally, this paper will provide some potential steps to achieve proper mobile security.

A Study on Smartphone based Operating System

International Journal of Computer Applications, 2015

At present there are many mobile phones operating systems available in the market but mobile phones with android OS have now become domestic product which was once extravagant product. The reason towards this change is attributed to its varied functionality, ease of use and utility. There are number of tasks performed on it like making call, sending or receiving SMS, music, billing, online shopping, online booking, playing games, web browsing, using different apps like whatsapp, facebook or Applock etc. Hence a large amount of user sensitive data is stored within the devices [1]. Increased usage of smartphone has led towards higher concerns about security of user-private data. Due to android as an open source mobile platform, user can easily install third party applications from markets and even from unreliable sources [2]. Thus, Android devices are a soft target for privacy intrusion. Whenever the user wants to install any application, firstly it's the description and the application screenshots which provides an insight into its utility. The user reviews the description as well as a list of permission requests before its installation. As the types and rate of malicious attacks increases, the difficulty of examining in advance whether an app is malicious or not through its descriptions has increased manifolds. In this paper we have reviewed and examined android software stack

Security Analysis of Smartphone Operating Systems

2014

This paper discusses the security threats and vulnerabilities in smartphone and compares the operating system on the basis of their strengths and weakness by keeping in mind the security. Our purpose is to evaluate how much protected these system are, what risks can make them vulnerable and how to make these platform more strenghtend. Our work cover four main Smartphone operating system those are android. iOS, symbiyan and blackberry and anatomize their security environment. This paper Analyze to decreases smartphone vulnerabilities, maintain secrecy, integrity and availability of smartphone basic applications. We address to explore their vulnerabilities, threats and security levels.

The Most Secure Smartphone Operating System: A Survey

2016

In the recent years, a fundamental revolution in the Mobile Phone technology from just being able to provide voice and short message services to becoming the most essential part of our lives by connecting to network and various app stores for downloading software apps of almost every activity related to our life from finding location to banking from getting news updates to downloading HD videos and so on. This progress in Smart Phone industry has modernized and transformed our way of living into a trouble-free world. The smart phone has become our personal computers with the addition of significant features such as multi core processors, multi-tasking, large storage space, bluetooth, WiFi, including large screen and cameras. With this evolution, the rise in the security threats have also been amplified. In Literature, different threats related to smart phones have been highlighted and various precautions and solutions have been proposed to keep the smart phone safe which carries all...

Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform

2010

Android is among the new breed of smartphone software stacks. It is powerful yet friendly enough to be widely adopted by both the end users and the developer community. This adoption has led to the creation of a large number of thirdparty applications that run on top of the software stack accessing device resources and data. Users installing third party applications are provided information about which resources an application might use but have no way of restricting access to these resources if they wish to use the application. All permissions have to be granted or the application fails to install. In this paper, we present a fine-grained usage control model for Android that allows users to specify exactly what resources an application should be allowed access to. These decisions might be based on runtime constraints such as time of day or location of the device or on application attributes such as the number of SMSs already sent by the application. We give details of our implementation and describe an extended installer that provides an easy-to-use interface to the users for setting their policies. Our architecture only requires a minimal change to the existing code base and is thus compatible with the existing security mechanism. As a result, it has a high potential for adoption by the Android community at large.

Mobile Application Security Platforms Survey

Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security.

Mobile OS Security

2015

the usage of smart phone is growing very fast. For that case security of data on mobiles is of keen importance. There are certain cases where OS needs to be customized in order to fulfill certain requirements. The "SecureOS" is a tool which has been compressed for the security reason. It acts as an optional formulation so that certain issue like data sharing through internet has been demolished. Additionally, there is a SecureMessaging app for encryption and decryption of messages which are sent and received within the closed group of OS users' .This app has been developed and installed in this customized OS. This feature has been provided in SecureMsg app been installed in SecureOS. In SecureOS the internet facility, camera, GPS, GPRS and Bluetooth etc. has been removed permanently. This could not be installed from USB or any external device.