Skip to main content

2014 | Buch

Virtualization Techniques for Mobile Systems

insite
SUCHEN

Über dieses Buch

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
In a short span of time, mobile phones have matured from limited oversized gadgets to small powerful feature packed smart phones. Early feature phone devices offered little more function than basic email, calendar and contacts. Due to advances in semiconductor technology, these devices started offering the computation power comparable to a slightly older generation computer and made them capable of running a wide variety of user installed applications. With the emergence of apps, there came the increased importance of protecting the data on the device, much of which was of a personal nature. As adoption in the general public grew, people wanted to use their smartphones in the workplace; Enterprises began to embrace the new platforms under the banner of Bring Your Own Device (BYOD) and set about discovering ways to use them in enhancing the overall productivity and communication among team members. This brought about the challenge of how to manage devices not owned by the company yet still provide methods to securely access enterprise information in a way that complied with company policy, which in turn led to enterprise level device management and policy enforcement.
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 2. Mobile Virtualization Technologies
Abstract
In order to achieve increased adoption and sustainability “bring your own device” (BYOD) schemes within the enterprise, mobile virtualization is rapidly becoming a very attractive choice because it provides both employee and enterprise with flexibility while addressing the privacy concerns of the user and meeting the organizations security requirements. Allowing BYOD devices in the enterprise requires policies in place that govern how devices will be used and how they will be managed while maintaining end user flexibility. A number of technologies for mobile virtualization have been developed over the last few years which range from sophisticated mobile device policy management, to hypervisors and container based separation [JaKa01].
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 3. Mobile Virtualization Comparative Analysis
Abstract
A way to help analyze which system is most appropriate for your environment is to do a comparative analysis of the various solutions available. Here we compare four solutions: Divide from Enterproid, Horizon Mobile from VMWare, BlackBerry Balance from RIM and Good Dynamics from Good Technology. In order to analyze and understand these various solutions, we have to look at them by each category and the corresponding functions.
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 4. Mobile Virtualization Case Study
Abstract
In order to see how mobile virtualization affects the BYOD user, a pilot was done with Divide from Enterproid, one of the mobile virtualization technologies described previously that is based on a application container approach. The pilot was run for 12 weeks with over 1,100 registered users out of which 817 were activated. Users were all employees who volunteered to participate in the pilot. There were no screening criteria and no specific instructions for use of Divide during the pilot. There were no prescribed evaluation tasks; participants were free to use Divide on their personal smartphone and/or tablet device(s) for business and personal tasks, in a manner natural to them.
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 5. Mobile Virtualization Reference Architecture
Abstract
An agile, lightweight, but secure extensible hybrid application container and deployment mechanism for mobile devices has the potential to provide improved cross platform support, reduced development lifecycle time and a consistent application security model within large organizations. Such an architecture can provide a set of security and mobile device management interfaces to lightweight applications written in a high level markup and scripting language and also how these applications can be provisioned via push or pull mechanisms to an enterprise user's device. The use of such a container for hybrid applications widens the potential support and development resource within an enterprise possessing readily available skill sets, thus permitting mission critical applications to be developed in a much shorter time frame [JaSm01].
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 6. Mobile Virtualization Container Performance Analysis
Abstract
In the previous chapter we presented a case study on how mobile virtualization affects applications from the user perspective where the results were directly related to the user’s perception of performance, usability and security. In this chapter, through benchmark analysis, the effects of three mobile virtualization technologies are compared to the reference benchmark application written in the Mobile Virtualization Container (MVC) model which executes a several performance functions for a predefined amount of time. The mobile virtualization technologies compared to the MVC model were Divide from Enterproid, Red Bend and Blackberry Balance 10.
David Jaramillo, Borko Furht, Ankur Agarwal
Chapter 7. Conclusion, Contributions and Future Work
Abstract
The explosion of mobile devices in the consumer space has been quite a disruptor for the mobile enterprise where corporate managed platforms are well defined, well contained and fairly secure. However, now with the emergence of the consumer mobile devices from Apple iOS and Google Android, the enterprise has been forced to make functional tradeoffs in order to maintain platform and data security. Due to the corporate security decisions, the end user gives up a significant amount of personal freedom and ease of use of their device. Enterprise security requirements like password complexity, device encryption, network restrictions and other techniques that restrict the access to information on the mobile device tends to drive users away and/or encourages users to find other less secure alternatives that will eventually compromise enterprise data and access. A number of mobile virtualization technologies have been presented here, each of them delivering specific features that focus on ensuring the security of the enterprise container and applications. Application level containers, type 1 and 2 hypervisors and the new hybrid application container architecture all lack the organic integration of enterprise & personal personas found in solutions like the emerging BlackBerry 10 Balance platform. Hypervisor technologies show promise; however, it is specific to the Android platform, has higher end hardware requirements and not likely to be seen on the iOS platform anytime soon.
David Jaramillo, Borko Furht, Ankur Agarwal
Backmatter
Metadaten
Titel
Virtualization Techniques for Mobile Systems
verfasst von
David Jaramillo
Borko Furht
Ankur Agarwal
Copyright-Jahr
2014
Electronic ISBN
978-3-319-05741-5
Print ISBN
978-3-319-05740-8
DOI
https://doi.org/10.1007/978-3-319-05741-5

Premium Partner