logo

Security in Mobile Computing

Complete a literature review and research method proposal for a selected research project.

40 Pages7574 Words294 Views
   

Added on  2022-11-11

About This Document

This report discusses security issues in mobile computing, including data security, virtualization, mobile cloud application, mobile devices security, and privacy issues. It also recommends security techniques such as encryption, network access control, and compliance and standards to overcome these issues.

Security in Mobile Computing

Complete a literature review and research method proposal for a selected research project.

   Added on 2022-11-11

ShareRelated Documents
Running head: SECURITY IN MOBILE COMPUTING
Security in Mobile Computing
Name of the Student:
Name of the University:
Security in Mobile Computing_1
1SECURITY IN MOBILE COMPUTING
Abstract
The report is based on security in the mobile computing by using personal computer as well as
Smartphone which enables the users to implement security controls as well as bring improved
flexibility. In this study, there is evaluation of various tasks which are conducted to see how the
users can behave in the security situations. In this investigation study, five security problems in
mobile computing are argued such as data security, virtualization, mobile cloud application,
mobile devices security as well as privacy issues. In order to overcome with the safety issues,
three security control mechanisms are discussed in this paper such asencryption, network access
control mechanism and compliance and standard. Finally, it is recommended three of the security
control mechanisms such as wireless zero configuration, combination of IPSec/AAA in addition
to hierarchical mobile IPV6 and usage of mobile IPV6 as the security techniques to overcome
with identified security as well as privacy issues.
Keywords:Security, Mobile Computing, Virtualization, Wireless zero configuration, Mobile
cloud application.
Security in Mobile Computing_2
2SECURITY IN MOBILE COMPUTING
Table of Contents
1. Introduction..................................................................................................................................4
1.1 Background of the study........................................................................................................4
1.2 Aim and objectives of the study............................................................................................4
1.3 Research questions.................................................................................................................5
1.4 Purpose of the study...............................................................................................................5
2. Literature Review........................................................................................................................5
2.1 Introduction............................................................................................................................5
2.2 Aspects of security in mobile computing..............................................................................6
2.3 Mobile computing security issues.........................................................................................7
2.4 Recommend security techniques to overcome issues in mobile computing..........................9
2.5 Summary..............................................................................................................................10
3. Research methodology...............................................................................................................11
3.1 Introduction..........................................................................................................................11
3.2 Data collection method........................................................................................................11
3.3 Data analysis method...........................................................................................................12
3.4 Summary..............................................................................................................................12
4. Data analysis and results............................................................................................................13
4.1 Introduction..........................................................................................................................13
4.2 Quantitative Data Analysis..................................................................................................13
Security in Mobile Computing_3
3SECURITY IN MOBILE COMPUTING
4.3 Summary..............................................................................................................................26
5. Conclusion and Recommendations............................................................................................26
5.1 Conclusion...........................................................................................................................26
5.2 Recommendations................................................................................................................27
References......................................................................................................................................28
Appendix A....................................................................................................................................31
Round 1......................................................................................................................................31
Round 2......................................................................................................................................33
Round 3......................................................................................................................................35
Security in Mobile Computing_4
4SECURITY IN MOBILE COMPUTING
1. Introduction
1.1 Background of the study
The research is focused on analyzing the safety into the stage of the mobile computing.
There are various security breaches which are occurred in area of the mobile computing. The
researcher understands about different features of the security into the mobile computing sector
as well as then there understands of various steps to mitigate changes of the problems in the
business sector. There is an accepting of necessities of the security aspects which are enforced in
the mobile computing platform.In the rapid growth of the wireless mobile communicational
technology, as well as benefits, flexibility as well as capability to communication in fixed
network (Khalil, Khreishahand Azeem 2014). The mobile devices, laptop computers, mobile
data storage devices as well as mobile computing into the network devices are becoming popular
at the user as well as application levels.
1.2 Aim and objectives of the study
The aim of the study is to analyze analyzing the security in the mobile computing. It also
analyzes the security issues which are caused in mobile computing as well as solutions to
overcome with those issues. Following are the objectives of this particular research study such
as:
To discuss a variety of aspects of the security in the mobile computing
To recognize the security concerns in the mobile computing
To recommend solutions for the identified safety issues into the mobile computing
Security in Mobile Computing_5
5SECURITY IN MOBILE COMPUTING
1.3 Research questions
Following are the list of the research questions which are discussed as below such as:
1. What are different aspects of the security in the mobile computing?
2. What are the security issues in mobile computing?
3. What are possible recommended solutions for identified security issues?
1.4 Purpose of the study
Despite the users of mobile computing is concerned about the security, this selected
research topic will provide benefit to the users as it will discuss possible security issues which
are raised in the business organization and possible solutions against the issues to overcome it.
There are various challenges in mobile computing, while latest are how to verify security,
protection of the information which are being transmitted in wireless mode as well as protection
of the confidential data at rest. The security issues such as availability, confidentiality,
accountability and others are required to be taken care and those are handled properly. This
report is provided security techniques used to handle the security related risks as well as issues.
2. Literature Review
2.1 Introduction
Mollah, Azadand Vasilakos (2017) discussed that the mobile computing is a faster
increasing business solutions into the area of the Information as well as Communication
Technology. In the current time, the Smartphone as well as tablets are not used as traditional
mobile devices while it is used for doing email, chat, internet browsing, running of the mobile
applications, sharing of files to others, editing of documents and others. The mobile devices are
Security in Mobile Computing_6
6SECURITY IN MOBILE COMPUTING
failed to meet with satisfaction of number of users as well as computational needs. Yang et al.
(2015) argued that the mobile cloud computing is being initiated as a services of the cloud
computing which is being accessible in mobile phone surroundings as well as mobile system
situation. The report is based on aspects of the security into the mobile computing, security
concerns associated to mobile computing as well as recommended security mechanisms for
overcoming with the mobile computing issues.
2.2 Aspects of security in mobile computing
The mobile cloud infrastructure is introduced a cloud of the mobile devices where data
storage as well as dealing out are taken position in the cloud, it is not for the Smartphone users
but wide variety of the mobile clients. Jiang, Maand Wei (2016) stated that execution of the
mobile applications iscomputational and there is larger quantity of energy which is being
enthusiastic by the mobile devices. The computational applications are being offloaded to cloud
for the purpose of implementation in addition to the mobile devices can be given consequences
afterwards. The security in mobile computing is based on key elements such as
Confidentiality: It prevents unauthorized users to gain access to the serious
organizational information of the exacting users.
Integrity: It ensures unconstitutional modifications as well as destruction of the
information which are not taken place (Ali, Khanand Vasilakos 2015).
Availability: It ensures to authorize users get access as they are required.
Legitimate: It makes sure that only official person can have right of entry to the services
(Roman, Lopezand Mambo 2018).
Security in Mobile Computing_7
7SECURITY IN MOBILE COMPUTING
Accountability: It ensures that the users are accountable for safety related activities by
arranging the system users as well as their daily activities are linked when required (Eslahiet al.
2014).
2.3 Mobile computing security issues
The security problems into the mobile computing is separated into two groups such as
security problems related to communication of the data over the wireless network furthermore
issues which are connected to information as well as data reside on the portable devices. The
security issues into the mobile computing can cause unauthorized users to gain access to
confidential as well as critical information of the users (Ahmedand Hossain 2014).Following are
the list of the safety defies which are caused in the mobile computing such as:
Data security issues:Chen et al.(2016) discussed major security challenge as a
consequence of the movable user’s data is to be stored as well as processed at cloud which are
being located at service providers end. The data security issues are related to losses of
information, data breach, and improvement of data, safety of data as well as data locality. Data
losses and breaches are broken down into two security needs like integrity as well as
confidentiality. The data losses are meant that the user’s data is in error conditions which are
damaged by physical means. Pathan (2016) pointed that recovery issues related to data is other
focus. It is a procedure to recover information from damaged, despoiled as well as losses of the
mobile user’s data. Into the cloud service model, the users are required to identify where their
data is stored, hence data locality is a security challenge. He, Chanand Guizani (2015) argued
that once the information is being outsourced to the cloud servers to some extent, then the
portable clients can loss physical management of their data. The cloud infrastructures are reliable
Security in Mobile Computing_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things (IOT) Networking Assignment
|11
|3122
|156

Cloud Computing Issues Assignment
|10
|2234
|41

Design of Secure Mobile Cloud with Smart Load Balancing
|6
|5504
|366

Mobile and Wireless Security: Threats, Risks, and Prevention Techniques
|13
|3312
|461

Mobile and Wireless Security: Issues, Threats, and Solutions
|10
|615
|231

Wireless Security for Rare Vintage Auto Parts Ltd
|19
|5679
|416