Sunday, March 31, 2019

Smartphone Operating Systems: Evaluation Enhancements

Smartphone Operating Systems Evaluation EnhancementsMuneer Ahmad DarJaved ParvezAbstractThe increasing re change shape of bustling operational placements that operates the sm whole hand held devices c completelyed the Smartphone, has become integral plane component part of our lives. The openness of these new environments has lead to new domain of apps and commercializes and has enabled great(p)er consolidation with existing online services like e-banking etc. Smartphone triflers ar competing in turns to car horn each opposite for storage, transitionor look sharp, political program compatibility and camera megapixels besides its the largely softw be the quick OS that makes the biggest difference to the popularity and market bundle of Smartphone. This paper evaluates the popular Smartphone Operating Systems with the purpose of understanding the drug substance ab exploiter friendliness, popularity, drug user privacy and certification and entreibility with th e wide range of apps. Our research concentrate on the advantages and limitations of the Smartphone operate administrations with the intension to find out if one of them has an exhibit on the other and finally we propose the risements so as to make them to a greater extent user friendly and secure. Keywords sprightly Operating Systems Smartphone Apps Processor speed Megapixels earnest Accessibility.IntroductionSmartphone have become indispensible part of our life and everyone who uses it is getting addicted. Smartphone permits a wide variety of apps ranging from social networking to GPS base location scrutinizing that atomic number 18 useful for everyone in their day today tasks. In a study of 1,600 people including managers and professionals 1, Leslie Perlow, found that70% people said they verification their Smartphone within an hour of getting up.56% check their phone within an hour of going to sleep.48% check over the weekend, including on Friday and Saturday night s.51% check continuously during vacation.44% said they would experience a great deal of anxiety if they lost their phone and couldnt replace it for a week.With these legion(predicate) professionals becoming dependent on Smartphone, which has necessary components of the computing platform an range form, actions and hardware. The main component of a Smartphone on which its functionality depends is the operating remains ASmartphone,tablet or all other digitalwandering device is operated by the Operating ashes called the quick OS. Modern mobile operating systems includes all the features of apersonal computeroperating system and in step-up to that includes the features like atouch screen,cellular,Bluetooth,Wi-Fi,speech recognition,voice recorder, GPS mobile navigation,camera,video camera,music player etc.The Smartphone operating system (OS) discipline has gr testify to include competitors such as Google, Microsoft, Apple, Symbian, and do by with each of them laborious to m ake it more user friendly and secure. Although these operating system platforms are trying their best and have come achieved a push-down store since their inception, no(prenominal) of these Smartphone companies provide a mobile OS that is ideal and satisfies all the users in terms of user friendliness and privacy. They claim that their platforms perform the best in all situations and ordain certainly non advertise any failing with their Operating systems. This makes it vexed for end users particularly to a dilettante user to know which platform is best suited for their need.In this paper, we perform a comprehensive analysis of each mobile operating system in order to identify the strengths of one Operating System over other operating system. Section II gives the overview of mixed Smartphone operating systems. In section III we identify the limitations of mobile operating systems. In section IV we propose the enhancements which could be implemented in the Smartphone Operating Systems and finally we spew our conclusions in section V.Smartphone Operating SystemsANDROIDAndy Rubin, Googles director of mobile platforms, commented There should be nothing that users place get to on their ground that they backsidet rile on their cell phone. 1. with this vision the popularity of chic phones having Googles mechanical man Operating System is continuously on the rhytidectomy in the 21st century..android is a comprehensive operating environment based on Linux kernel, it is also a layered system the architecture of android system is examinen as in picture 3. Applications layer is the site of all Android applications including an email client, SMS program, maps, browser, contacts, and others. All applications are written using the chocolate programming language. Application framework layer defined the Android application framework. All Android applications are based on the application framework. The Android application framework includingA rich and extensibl e set of Views that back tooth be utilize to build an application with beautiful user interface, including lists, grids, schoolbook boxes, buttons, and even an embeddable web browser.A set of Content Providers that enable applications to access data from other applications (such as Contacts), or to share their own data.A Re point of reference Manager that provides access to non figure resources such as localise strings, graphics, and layout filesA Notification Manager that enables all applications to display custom alerts in the status bar.An Activity Manager that manages the lifecycle of applications and provides a common navigation venture stack.1. figureure 1 Android System Architecture 3Some of the advantages of Android over other Smartphone operating systems is listed as under.The ability to fertilize tens of thousands of apps skillful like the iPhone but with option of phone models that you skunk choose from. The choice of with or without physical keyboard, shape, co lor, phone size, screen size, manufacturer, features, and phone carrier. No more monopoly by one company on one carrier.Android intromit developers/programmers to develop apps (applications) in what is know as application without borders.Android is forefather friendly and supremely customizable the more you use Googles services, the more Android pull up stakes shine Android has the major(ip)ity of the market and the user experience is amend quickly.Googles Android straightway checks your location and calendar to automatically show you relevant info e.g. traffic to work, cafes, and flight details and lets you search with infixed voice commands and replies with natural speech.Android is an open source service. This means that its free and anyone can use it. Anyone can modify and improve the software making it more effective and personalized. Applications are freely made and designed for Android by numerous app developers all over the world and these apps are offered for free on the Android market place. This feature of open source has also attracted mobile phone producers to manufacture phones using Android OSAndroid is not just an operating system designed for individuals but it also fulfills your channel needs at the same snip. Android market place offers numerous apps that are specially designed to manage your business. Now you can have a closer look at your business processes on the go with the help of these apps.IPHONE OSiOS is the mobile operating system developed by Apple Inc. It is the second most commonly used operating system behind Googles Android. Unlike Android it can be installed only on Apples hardware.The iPhone OS has seen a rapid rise in popularity and garnered a large and dedicated user base. The iPhone OS has risen so far and so fast to begin with due to the innovations on user interface and availability of 3rd society applications 11.Unlike the Android credential architecture, iOS certificate model provides different school of t hought for achieving mobile device security and users protection. The iOS application platform empowers developers to create new applications and to contribute to the application store. However, each application submitted by a third party developer is sent to the revision process. During the revision process the application code is analyzed by professional developers who make certain that the application is safe before it is released the application store. However, such an application, when installed, gets all the permissions on a mobile device. Application might access local camera, 3G/4G, Wi-Fi or GPS module without users knowledge. While Android lets each user handle its own security on their own responsibility, the iOS platform makes developers to write safe code using iOS secure genus Apis and prevents vixenish applications from getting into the app store. The iOS security APIs are rigid in the summation Services layer of the operating system and are based on services in t he Core OS (kernel) layer of the operating system 14. Application that needs to penalise a network task, may use secure networking functions through the API called CFNetwork , located in the Core Services layer. The iOS security implementation includes a demon called the warrantor Server that implements several security protocols. The Security Server has no API with public access. Instead, applications use the Keychain Services API, the Certificate, Key, and Trust services API, which in turn gets access with the Security Server.SYMBIANThe Symbian OS was designed specifically for mobile devices with its subtile memory footprint and consumes low power. It is an open OS, enabling third party developers to write and install applications independently from the device manufacturers. An extensive C++ API is provided which allows access to services such as telephony and messaging, in addition to staple fibre OS functionality. The Symbian OS was designed so applications could run for ye ars without losing the user data. Also the OS has the capability of being platform independent and can run on more than one hardware platform 6, 7, 8, 9.WINDOWS sprightlyThis platform is based on Windows CE (WinCE). WinCe is a sign up OS specifically designed for pervasive devices. It is focused on providing a consistent interface for applications on various hardware platforms which emphasizes portability by providing the user with the Win32 API. The hardware platforms include Packet PCs, Smartphone, Portable Media Centers, and even onboard computers in automobiles. The Windows diligent platform was designed for flexibility and with the developer in mind. For that reason it was designed to countenance lots of preemptive multitasking. It supports a whopping 256 priority levels for threads and up to 32 processes. It supports all of the standard mutual exclusion and synchronization methods you would sojourn from a desktop PC. This functionality makes it ideal for a Smartphone beca use the users typically demand multitasking and penury to be as productive as achievable 4, 7, 8, 9 . palm OS wield OS is a proprietary operating system originally developed by Palm Inc. In the early versions (preGarnet), the Palm OS was primarily utilized in Palmdeveloped private Digital Assistant (PDA) mobile hardware units. At one point, Palm PDAs with the Palm OS held 85% of the market share in the mobile device market 12. However, in recent years, Palms market share has been in decline, mostly due to the stagnant nature of the OS development and has yielded the in the lead position to Symbian 6, 7, 8, 12.Limitations of Mobile OsAs discussed in the previous sections, the mobile operating systems are competing for the major market share and are claiming to be the best for the users, yet they have number of limitations in their platforms which for obvious reasons they are not disclosing to their users. The malicious apps aimed at mobile devices have risen from just about 14,0 00 to 40,000 in less(prenominal) than a year. This rise in the malicious apps withdraws the healthful OS. The limitations of the Mobile operating systems are listed as underAll or No Permission A user cannot grant single permissions, tour rejecting others in order to install the app. Among the list of permissions an app might request a suspicious permission among the other legitimate permissions, will still be able to confirm the installation.Mobile devices may download malware which the mobile OS is not able to trace. The novice users may download apps that contain malware unknowingly because it can be disguised as a well known game, security patch by OS, utility, or other useful application. It is difficult for users to tell the difference amid a legitimate app and one containing malware.Often, the users of the app cannot valuate the appropriateness and legitimacy of permissions for the app in question. In some fictional characters it may be well understood, for example when a chess game app requests the privilege to cite the Smartphone or to send SMS messages. In many cases, however, users will simply not be able to understand the appropriateness of the permission.Functionality, which is supposed to be possible only given the appropriate permissions, can still be achieved with less number of permissions or even with none at all.In case of the iOS , the user is not at all informed about any of the permissions. The app can access any of the resources without the permission of the user.Resistance of Android and iOS against various attacks.Proposed OS EnhancementsIn order to enhance the security of the mobile operating systems we propose the following EnhancementsNeed Based Permission System (NBS) The Need-Based Security (NBS) system designed to enhance the privacy of the user at run time. The main advantage of the proposed NBS system is that the user is informed about the certain and unauthorized access of the resources at run time. The NBS system can be implemented in the operating system to provide the permissions at run time. Currently the Os is either including all the permissions without the information of the user as in case of iOS or it forces the user to accept all the permissions at install time as in case of the worlds popular OS Android. The most authoritative file AndroidManifest.xml which lists the permissions of the app can be modified at run time by providing the need based permission system whenever the app is asking for the permission the user may be informed at that moment. For example, let us examine the Dial Kashmir app available on Google find which gives all the details of Tourist places in Kashmir and contact details of important places like universities, government offices etc. The main permission this app may require is the INTERNET. If it includes MANAGE_ACCOUNTS which is the permission that allows the app to retrieve the user account information from the phone, our operating system will get the permiss ion from the user at run time to access the resource and if user allows then only the permission will be granted. The main advantage of our NBS system is that it gives freedom to the users and the programmers to write a code which does not result in usability issues. Need based permission system and getting permission approvals at run time is a relatively new but promising approach as it gives lot of freedom to the novice users.Security API In order to deal with the malicious apps downloaded by the user, we propose a security API which can be incorporated with the existing security framework of mobile operating system. The objective is to provide security against the Apps which are installed by the end user and is given all the permissions at the time of installation. This enhanced security has the desirable property of not disturbing a regular user in any evident way. In fact, the user need not even be awake(predicate) that the Security API has been applied. We have to prevent th e modification and access of data from mobile phones by other external malicious applications unknowingly. We propose an API which will enhance the security of existing Android Framework.The first step in our proposed security API is implemented by adapting an encryption technique utilizing Advanced Encryption algorithmic rule (AES) and applying it to all the personal files in the Smartphone. File operations offered by the proposed Security API should aid in the detection of potentially malicious Apps whose behavior matches that of Malware. Malware recognition is usually achieved by signature matching, heuristic analysis, or comparing hash-valuesFig 4 Sequence Diagram of the SystemConclusionThe increasing tailor of Smartphone usage by individuals of all ages has brought forward stiff competition between different Smartphone OSs and Googles Android OS. However, recent researches and reports revealed that the novice users are not secure on these platforms because of the limitations of these OS. We found different types of limitations in various mobile Os and particularly in Android and iOS which are the leading mobile Operating Systems. We found that there is a major need of modification in the permission based model of security system and we strongly recommended the implementation of Need based security system in the mobile operating systems so that the novice user can be informed at run time about the access to its various resources.ReferencesPerlow, L.A. Sleeping with your smartphonehow to break the 24-7 habbit and change the way you work, Harvard Business suss out press, 2012.Kataria, A. Anjali, T. Venkat, R., Quantifying smartphone vulnerabilities,Signal Processing and Integrated Net kit and boodle (SPIN), 2014 International Conference on, vol., no., pp.645,649, 20-21 Feb. 2014doi 10.1109/SPIN.2014.Bornstein, Dan. 2008. Dalvik VM Internals. http//sites.google.com/site/io/dalvikvminternalsDelac, G. Silic, M. Krolo, J., Emerging security threats for mobile platforms,MIPRO, 2011 Proceedings of the 34th International Convention, vol., no., pp.1468,1473, 23-27 May 2011Muneer Ahmad Dar and Javed Parvez. A story Strategy to Enhance the Android Security Framework.International Journal of computing device Applications91(8)37-41, April 2014. Published by Foundation of Computer Science, New York, USA.Cleron, Mike. Androidology Part 2 of 3 Architecture Overview. 11 November, 2007.http//www.youtube.com/watch?v=fL6gSd4ugSICleron, Mike. Androidology Part 3 of 3 Architecture Overview. 11 November, 2007.http//www.youtube.com/watch?v=MPukbH6DlY .8 DeviceForge.com. 2006. Sun blesses coffee phone.http//www.deviceforge.com/news/NS6109398413.html (accessed 14 April 2009).Dilger, Daniel E. iPhone 2.0 SDK The No Multitasking Myth. 13 March 2008. somewhat Drafted Magazine. http//www.roughlydrafted.com/2008/03/13/iphone20 sdkthenomultitaskingmyth/ (accessed 8February 2009).Dilger, Daniel E. iPhone OS X Architecture the Mach Kernel and RAM. 13 July 20 07. Roughly DraftedMagazine. http//www.roughlydrafted.com/2007/07/13/iphoneosxarchitecturethemachkernelandram/Faas, Ryan and David Haskin. Review Which smart phone OS works best?.http//www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=911702114. Apple inc., iOS Reference Library, Security Overview, http//developer.apple.com/depository library/ios/documentation/Security/Conceptual/Security_Overview/Introduction/Introduction.html//apple_ref/doc/uid/TP30000976-CH201-TPXREF101

No comments:

Post a Comment