Total views : 304

Research and Implementation of Type-1-Based Virtualization Security System in Smart Devices Environment

Affiliations

  • Department of Computer Information Processing, Daejeon Health Institute of Technology, Korea, Republic of
  • R2Soft Corporation, Korea, Republic of

Abstract


Background: The mobile virtualization security system can provide enhanced security with separated environment of simultaneously and independently operating multiple OS on the Hypervisor Abstraction Layer. Methods Analysis: This paper introduces the research and implementation of Type-1-Based Virtualization Security System in Smart Device Environment. Its detailed functions are mobile virtualization management, security authentication, security policy and access control, encryption/decryption, and safe storage that provide secure communication among the guest Operating Systems. This paper also introduces an experimental product operating a mobile office application. Findings: In the comparative test with the existing TEEMO Type-2-based Virtualization Security System, it measured processing times of compulsory loading situation and no-loading situation for 12 major security APIs. As a result, our system has showed reduced API processing time from 48% to 85%, faster processing speed in both compulsory loading situation and noloading situation. Its average processing time has been 0.189 in the situation of consecutive API callings. Therefore, our system has proved acceptable processing time for real users as well as enhanced security with authentication and safe storage in the mobile hypervisor virtualization system. Application/Improvements: This research can offer assistance in providing secure communication and speed improvement among guest OS in mobile virtualization environment.

Keywords

Hypervisor, Mobile Security, Mobile Virtualization, Mobile Office, Smartwork.

Full Text:

 |  (PDF views: 232)

References


  • Young-Ho K, Jeong-Nyeo K. Building Secure Execution Environment for Mobile Platform. Proceedings of 2011 First ACIS/JNU International Conference, Korea. 2011. p. 119 –22.
  • Young-Ho K, Yun-Kyung L, Jeong-Nyeo K. TeeMo: A Generic Trusted Execution Framework for Mobile Devices. Proceedings of International Conference CNSI 2012, Korea. 2012; 579–583.
  • Seong-Kyeom K, Seung-Jin M. Wireless Intrusion Prevention System (WIPS) growth and build. Proceedings of Korean Institute of Communications and Information Sciences Conference, Korea. 2013. p. 581–2.
  • Jeffrey B, Ryan OH, Arati B, Vinod G, Liviu I. Rootkits on Smart Phones: Attacks, Implications and Opportunities. Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, USA. 2010; 49–54.
  • Keunwoo R, Woongryul J, Dongho W. Security Requirements of a Mobile Device Management System. International Journal of Security and its Applications. 2012 Apr; 6(2):353–8.
  • Ronald P, Leendert VD, Reiner S. Virtualization and Hardware-Based Security. IEEE Security and Privacy. 2008 Oct; 6(5):24–31.
  • Paul B, Boris D, Keir F, Steven H, Tim H, Alex H, et al. Xen and the Art of Virtualization. Proceedings of the nineteenth ACM symposium on Operating systems principles, USA. 2003; 164–77.
  • Sung-Min L, Sang-Bum S, Bok-deuk J, Sang-dok M. A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization. Proceedings of 2008 5th IEEE Consumer Communications and Networking Conference, USA. 2008. p. 251–6.
  • Tal G, Ben P, Jim C, Mendel R, Dan B. Terra: a virtual machine-based platform for trusted computing. Proceedings of the nineteenth ACM symposium on Operating systems principles, USA. 2003; 193–206.
  • Muthu Pandi K, Somasundaram K. Energy Efficient in Virtual Infrastructure and Green Cloud Computing: A Review. Indian Journal of Science and Technology. 2016 Mar; 9(11). DOI: 10.17485/ijst/2016/v9i11/89399.
  • Durairaj M, Manimaran A. A Study on Security Issues in Cloud based E-Learning. Indian Journal of Science and Technology. 2015 Apr; 8(8):757–65.
  • Jae-Deok L, Jeong-Nyeo K. A Study on the Trusted App.-based Access Control to the Isolated Trusted Execution Environment in Mobile Device. Proceedings of the Korean Institute of Communications and Information Sciences Conference, Korea. 2014. p. 364–5.
  • Ahmed MA, Peng N, Jitesh S, Quan C, Rohan B, Guruprasad G, et al. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, USA. 2014. p. 90–102.
  • Hwi-Min C, Chang-Bok J, Joo-Man K. Efficient security method using mobile virtualization technology and trustzone of ARM. Journal of Digital Convergence. 2014 Oct; 12(10):299–308.
  • Nuno S, Himanshu R, Stefan S, Alec W. Using ARM trustzone to build a trusted language runtime for mobile applications. Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, USA. 2014. p. 67–80.
  • Joo-Young H, Sang-Bum S, Sung-Kwan H, Chan-Ju P, Jae-Min R, Seong-Yeol P, et al. Xen on ARM: System Virtualization using Xen Hypervisor for ARM-Based Secure Mobile Phones. Proceedings of 2008 5th IEEE Consumer Communications and Networking Conference, USA. 2008. p. 257–61.
  • Seehwan Y, Chuck Y. Real-Time Scheduling for Xen-ARM Virtual Machines. IEEE Transactions on Mobile Computing. 2014 Aug; 13(8):1857–67.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.