Samrtphone Security - Running head CLOUD COMPUTING Cloud...

This preview shows page 1 - 5 out of 15 pages.

Running head: CLOUD COMPUTING 1 Cloud Computing Deepika Medisetti Webster University
Image of page 1

Subscribe to view the full document.

Running head: CLOUD COMPUTING 2 Abstract Recent developments in mobile technologies have produced a new kind of device, a programmable mobile phone, and the smartphone. Generally, smartphone users can program any application, which is customized for needs. Furthermore, they can share these applications in online market. Therefore, the smartphone and its application are now most popular keywords in mobile technology. However, to provide these customized services, smartphone needs more private information and this can cause security vulnerabilities. Therefore, in this work, we analyze security of smartphone based on its environments and describe countermeasures. Keywords : Smartphone, Smartphone security, Security analysis, Security mechanism.
Image of page 2
Running head: CLOUD COMPUTING 3 Introduction A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Smartphones and feature phones may be thought of as handheld computers integrated within a mobile telephone, but while most feature phones are able to run applications based on platforms such as Java ME, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. Based on this feature, smartphone users can develop programs, which are customized for specific needs. This is a most powerful advantage of a smartphone. For example, a smartphone user can search for the most popular restaurant, or nearest bus stop. Furthermore, a smartphone user can trade their assets like stocks or use banking service with a wireless network. Smartphone users can send or receive e-mails, too. However, to provide these services, a smartphone needs more private information than feature phone, thus, it is very important to keep the smartphone secure. If a smartphone user lost his/her smart phone, for example, all information like address, e-mail, log data in web browser, SMS (Short Message Service), MMS (Multi Message Service) or others, can be exposed if there is no appropriate security solutions. At present, there is much research on smartphone security, but there is a lack of effort to analyze all security threats. This work is needed to design a security solution to prevent potential vulnerabilities in a smartphone. Therefore, in this paper, we analyze security of smartphones and suggest countermeasures. This paper consists of five sections. In section
Image of page 3

Subscribe to view the full document.

Running head: CLOUD COMPUTING 4 two, we analyze the smartphone environment and its assets. In section three, we analyze security of a smartphone and derive vulnerabilities and threats. In Section 4, we describe applicable security mechanisms for smartphones, and finally, in section 5, we end with a conclusion.
Image of page 4
Image of page 5
  • Spring '14
  • Abeln,Mic
  • Personal digital assistant

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern