A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
نویسندگان
چکیده
منابع مشابه
Research on System Virtualization using Xen Hypervisor for ARM based secure mobile phones
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger, its security is becoming an important issues. Xen as a virtualization technology could be one of its solutions with domain protection mechanism. Recently, Xen community released the interesting patch that supports mobile devices based on ARM architecture. This seminar paper deals with this patc...
متن کاملAn Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data
Currently, the exchange cycles of various computers, smartphones, tablets, and others have become shorter, because new high-performance devices continue to roll out rapidly. However, existing legacy devices are not old-fashioned or obsolete to use. From the perspective of sustainable information technology (IT), energy-efficient virtualization can apply a way to increase reusability for special...
متن کاملSecure Data Storage in Mobile Cloud Computing
In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...
متن کاملCritical Success Factors for Data Virtualization: A Literature Review
Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review ...
متن کاملTreasurePhone: Context-Sensitive User Data Protection on Mobile Phones
Due to increased input and output capabilities, mobile phones hold many different kinds of (mostly private) data. The need for finer grained profiles and integrated data security on mobile phones has already been documented extensively (e.g. [1]). However, there are no appropriate concepts and implementations yet to handle and limit access to data on mobile phones. TreasurePhone has been design...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2015
ISSN: 1550-1477,1550-1477
DOI: 10.1155/2015/929380