A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security

Various computing technologies involving wireless sensors, Internet, personal computers, and mobile devices are coming together to create machine-to-machine (M2M) communications. As modern mobile devices continue to approach the capabilities and extensibility of standard desktop workstations and servers, mobile devices are also beginning to face many of the same security threats as desktops and servers experience. An enabler for security issues in mobile devices is virtualization, an established technology in the desktop and server domains. In this paper, we address the security challenges by presenting a virtualization technique in M2M communications for cloud computing security. Then virtualization technique serves as security control mechanism for mobile devices which provides strong protection against the identified mobile threats as well as performance efficiency. The mobile virtualization approach and its elements are discussed in detail taking into account the existing limitations of mobile devices. This paper aims to spend bandwidth resources to significantly reduce on-device CPU, memory, and power resources using extremely lightweight technology. Our result shows that the virtualization technique enhances mobile security and reduces on-device software complexity.

[1]  Gernot Heiser,et al.  The role of virtualization in embedded systems , 2008, IIES '08.

[2]  Jaewoo Chung,et al.  Mobile Computing Systems and Applications , 2011, IEEE Pervasive Comput..

[3]  Thomas Kunz,et al.  A mobile code toolkit for adaptive mobile applications , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[4]  Brian D. Noble,et al.  When Virtual Is Better Than Real , 2001 .

[5]  Geoffrey H. Kuenning,et al.  The remote processing framework for portable computer power saving , 1999, SAC '99.

[6]  Sang-Bum Suh,et al.  Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[7]  Martin Botteck,et al.  Virtualization as an enabler for security in mobile devices , 2008, IIES '08.

[8]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[9]  Peter M. Chen,et al.  Pocket Hypervisors: Opportunities and Challenges , 2007 .

[10]  Farnam Jahanian,et al.  CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.

[11]  Jason Flinn,et al.  quFiles: a unifying abstraction for mobile data management , 2008, HotMobile '08.