logo

Mobile App Security

   

Added on  2023-06-07

12 Pages3011 Words60 Views
Mobile App Security
Mobile Application Security
Student Name
University Name
Unit Code
1

Mobile App Security
Contents
Critical Evaluation: Mobile Applications Security..........................................................................2
References......................................................................................................................................12
2

Mobile App Security
Critical Evaluation: Mobile Applications Security
Yes, research question and problem is clearly stated as well as of significance. In this article,
Mahmood, Amen, and Mala Nabi, (2016) Cloud Computing has been described as an innovative
new, rapidly developing and accepted method to provide good and more effective applications
for the mobile devices. This provides users of mobile with data storage as well as processing
services on the cloud computing stage. Authors basically discuss two main points addressed for
the implementation of any technology. One "How do we implement it?" And another "what will
be the consequences?" Or "what challenges will be faced for successful implementation." The
first implementation problem is to be divided into mobile devices while considering cloud
computing in mobile devices, how to create a cloud for mobile devices in two ways, and how the
mobile cloud accesses mobile for other data and application processes.
On the other hand, Stieglitz, Lattemann and Brockmann, (2015) said that mobile applications and
computing are currently gaining a high speed and playing an important role in improving the
computing structure of the Internet. Additionally, mobile devices furthermore their applications
are very technical in terms of services and are growing rapidly. Mobile-based cloud computing is
simply expected to create more innovations through multiple applications. Mobile-based
computing includes mobile communications, mobile hardware or mobile software and presently
has numerous mobile cloud applications.
Yes, both journal article researches adequately cover the applicable existing research
literature for research.
3

Mobile App Security
1. Has continuous authentication coupled with pattern recognition techniques given a lasting
solution to mobile security?
2. How to measure Entropy and Uncertainty in Mobile Security?
The implementation of the cloud computing in the mobile applications will be a future trend
because it adds mobile computing and cloud computing benefits to provide the best service for
mobile users. According to recent research, more than 10,000 mobile applications security will
be implemented by cloud computing at the end of 2013. This traction will bring mobile cloud
computing revenue to $3.4 billion in this article authors outline the definition of cloud
computing, components (that is cloud applications and cloud platform), and finally, authors
discuss the challenges and their possible solutions to the implementation of cloud computing in
mobile applications. Along with new security issues and security problems, the mobile platform
is already being released by many features of the Smartphone (Mahmood, Amen, and Mala Nabi,
2016). Every mobile platform has a serious solution to the security issue to protect user's security
and mobile device security. Unlike the Android app platform, the iOS app platform has a
recurring process for every new app that was published in the app store. There is a difference
between PC windows or mobile platforms, for example, integration into IT architecture along
with third-party security and privacy products. In both cases, the PC is considered safer than the
mobile platform. As a result, many mobile platform infrastructures have applied several
important strategies and procedures for example authorization to give a secure platform against
authentication and threats. Authors also discussed that sensitive users are a major issue in
allowing access to devices and the sensitive information or data stored on mobile devices, which
must be impacted by mobile enterprise threats.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Impact of Cloud Platform on Mobile Application Development and User Experience
|9
|2842
|315

Cloud Computing for Emerging Mobile Cloud Apps
|8
|2126
|55

Cloud Computing In Mobile Application
|5
|1709
|77

Statistical Data Collection and Interpretation
|17
|5735
|49

Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms
|13
|15213
|488

Cloud Computing and Cloud Migration: A Survey of Research and Challenges
|10
|3605
|288