Advertisement

A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security

  • Giovanni Cagalaban
  • Seoksoo Kim
  • Minho Kim
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)

Abstract

Various computing technologies involving wireless sensors, Internet, personal computers, and mobile devices are coming together to create machine-to-machine (M2M) communications. As modern mobile devices continue to approach the capabilities and extensibility of standard desktop workstations and servers, mobile devices are also beginning to face many of the same security threats as desktops and servers experience. An enabler for security issues in mobile devices is virtualization, an established technology in the desktop and server domains. In this paper, we address the security challenges by presenting a virtualization technique in M2M communications for cloud computing security. Then virtualization technique serves as security control mechanism for mobile devices which provides strong protection against the identified mobile threats as well as performance efficiency. The mobile virtualization approach and its elements are discussed in detail taking into account the existing limitations of mobile devices. This paper aims to spend bandwidth resources to significantly reduce on-device CPU, memory, and power resources using extremely lightweight technology. Our result shows that the virtualization technique enhances mobile security and reduces on-device software complexity.

Keywords

Virtualization Cloud Computing Security M2M Communications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    K. Nullriver, Inc. iphone installer.app (2011), http://iphone.nullriver.com/
  2. 2.
    Google. Android - an open handset alliance project (2011), http://code.google.com/android/
  3. 3.
    Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Securecomm and Workshops, pp. 1–10 (2006)Google Scholar
  4. 4.
    Tower Group. Cyber-criminals target mobile banking (2007), http://www.vnunet.com/vnunet/news/2173161/cybercriminals-targetmobile
  5. 5.
    Google, Google safe browsing (2008), http://code.google.com/apis/safebrowsing
  6. 6.
    Kaspersky Lab. Kaspersky mobile security (2008), http://usa.kaspersky.com/products_services/mobile-security.php
  7. 7.
    Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: Nversion antivirus in the network cloud. In: Proceedings of the 17th USENIX Security Symposium (2008)Google Scholar
  8. 8.
    Brakensiek, J., Droge, A., Hartig, H., Lackorzynski, A., Botteck, M.: Virtualization as an enabler for security in mobile devices. In: Workshop on Isolation and Integration in Embedded Systems, IIES (2008)Google Scholar
  9. 9.
    Hwang, J., Suh, S., Heo, S., Park, C., Ryu, J., Park, S., Kim, C.: Xen on arm: System virtualization using xen hypervisor for arm-based secure mobile phones. In: 5th IEEE Consumer Communications and Networking Conference, pp. 257–261 (2008)Google Scholar
  10. 10.
    Cox, L., Chen, P.: Pocket hypervisors: Opportunities and challenges. Mobile Computing Systems and Applications (2007)Google Scholar
  11. 11.
    Heiser, G.: The role of virtualization in embedded systems. In: 1st Workshop on Isolation and Integration in Embedded Systems, IIES 2008, Glasgow, UK. ACM SIGOPS (2008)Google Scholar
  12. 12.
    Kunz, T., Omar, S.: A mobile code toolkit for adaptive mobile applications. In: Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications, pp. 51–59 (2000)Google Scholar
  13. 13.
    Rudenko, A., Reiher, P., Popek, G., Kuenning, G.: The Remote Processing Framework for portable computer power saving. In: Proceedings of the ACM Symposium on Applied Computing (1999)Google Scholar
  14. 14.
    Veeraraghavan, K., Nightingale, E., Flinn, J., Noble, B.: qufiles: a unifying abstraction for mobile data management. In: The Ninth Workshop on Mobile Computing Systems and Applications, HotMobile 2008 (2008)Google Scholar
  15. 15.
  16. 16.
    VisionMobile, Low cost Android: crossing the $100 barrier (2010), http://www.visionmobile.com/blog/2010/02/low-cost-android-crossing-the-100-barrier/
  17. 17.
    TMCnet, VirtualLogix VLX Virtualization Software Selected by ST-Ericsson for Low-Cost Android-Ready Smartphone Platform, http://fixed-mobile-convergence.tmcnet.com/topics/mobile-communications/articles/76086-virtuallogix-vlx-irtualization-software-selected-st-ericsson-low.html (2010)
  18. 18.
    Brakensiek, J., Droge, A., Hartig, H., Lackorzynski, A., Botteck, M.: Virtualization as an enabler for security in mobile devices. In: Workshop on Isolation and Integration in Embedded Systems, IIES (2008)Google Scholar
  19. 19.
    Chen, P., Noble, B.: When virtual is better than real. In: Proceedings of the 2001 Workshop on Hot Topics in Operating Systems, HotOS, pp. 133–138 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Giovanni Cagalaban
    • 1
  • Seoksoo Kim
    • 1
  • Minho Kim
    • 1
  1. 1.Department of MultimediaHannam UniversityDaejeonKorea

Personalised recommendations