International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250-1568 Vol.
3, Issue 1, Mar 2013, 183-188 © TJPRC Pvt. Ltd.
A SURVEY OF MOBILE VIRTUALIZATION USING CLOUD COMPUTING
ARPIT J. KUCHE & D M. DAKHANE Sant Gadge Baba Amravati University, Amravati, Maharashtra, India
Today in the world of fastest growing technology the number of smartphone users and mobile application are growing rapidly. Now a days people expect to have PC like functions & features in the Smartphone. In this paper, we present a survey of mobile virtualization system that will allow users to create virtual smartphone images into cloud; each image will meet different needs. Users will be able to tap freely into the power of the data canter by installing the desired mobile applications remotely in one of these images. Because the mobile applications are controlled remotely, they are not constrained by the limit of processing power, memory and battery life of a physical smartphone.
KEYWORDS: Smartphone, Virtualization, Cloud INTRODUCTION
The virtualization of mobile devices such as smartphones offers significant potential in addressing the mobile manageability, security, cost, compliance, application development and deployment challenges that exist in the enterprise today. Advances in mobile processor performance, memory and storage capacities have led to the availability of many of the virtualization techniques that have previously been applied in the desktop and server domains. Leveraging these opportunities, VMware's Mobile Virtualization Platform (MVP) makes use of system virtualization to deliver an end-toend solution for facilitating employee-owned mobile phones in the enterprise. There are many service providers that provide online storage services to Smartphone users to overcome the limitations of Smartphone storages. However, still there is no service that offers full computation capability to Smartphone users. It allows users to create virtual smartphone images in the cloud and to remotely run their mobile applications in these images as they would locally run. The main reason behind this is to allow smartphone users to more easily tap into the power of the cloud and to free them from the limit of processing power, memory and battery life of a physical smartphone.
MOBILE VIRTUALIZATION SUPPORTS CLOUD COMPUTING
Olafur Ingthorsson’s article  and analysis about the mobile virtualization says that creating completely separate profiles through vitalizing the handset opens completely new possibilities in terms of usage scenarios. This will include integration of both a business profile and a personal profile in the same device, without coinciding any information or applications. Storing copies of the profile(s) in the Cloud means that users can replicate and shift between devices still maintaining the same profile and keep a high level of data assurance by storing the data in the Cloud. The Article further says that VMware had introduced its mobile cloud platform, called Mobile Virtualization Platform (MVP), that’s aimed at supporting separate personal and corporate profiles on the same handset, e.g. a employee owned handset. Each profile runs in a completely isolated container so that OS’s, applications and data belonging to each profile, personal or corporate, are only accessible within the appropriate profile. So, running a hypervisor on the handset directly will isolate the profiles and create a virtualized infrastructure. Recently VMware has announced a partnership with LG Electronics about running the MVP on a Android enabled LG smartphone. With rising smartphone sales, the need for a combined work-personal smartphone becomes
Arpit J. Kuche & D M. Dakhane
increasingly stronger as most users prefer to carry only one handset. Using virtualization at the handset level seems to solve many of the associated security challenges and risks as work related and personal profiles should be completely separated and isolated. Normally, this would include apps, contacts and data.
IMPORTANCE OF MOBILE VIRTUALIZATION BY OK LABS
OK Labs  give three reasons why mobile virtualization is important: Security Although this is not a major concern for consumers now, it will become increasingly important as mobile banking and other similar applications gain popularity. Also, as open operating systems such as Android become more and more ubiquitous, mobile devices will become more vulnerable to hacker attacks and malware. Mobile virtualization can help protect the critical data on those devices. For Work and Play Think of this as a personal world and corporate world on one device that meets the security needs of corporate requirements. In addition, consumers will be able to access their favourite applications for a variety of platforms (Android, Windows, Blackberry, etc.) on the same phone. It addresses consumer behaviour preferences corporate employees who want to "bring their own device" to work, will be able to do so, while still meeting the needs of IT. Smartphone Market It drives the market through cost savings. According to analyst firm, Vision Mobile, smartphone platforms account for less than 20 percent of the more than 620 million handsets shipped globally in the first half of 2010, while more than 80 percent of total shipments are driven by feature phones. Through hardware consolidation, mobile virtualization lets manufacturers provide smart phone functionality for the cost of a feature phone. This is especially important for the consumers, in most of the world, who cannot afford smartphone prices today.
OVERVIEW OF VIRTUAL SMARTPHONE VIA CLOUD
Work Done by Mitsutaka Itoh, Eric Y. Chen and Tetsuya Kusumoto Mitsutaka Itoh, Eric Y. Chen and Tetsuya Kusumoto propose a model for mobile virtualization via cloud . The model proposes a system that allows smartphone users to create virtual smartphone images in the mobile cloud and customize each image to meet different needs. Users of this system can selectively run their applications in these images as they would locally. Running applications remotely in the cloud has a number of advantages: mobile applications installed remotely in these images can easily tap into the power of a data center, so they are not constrained by the processingpower, memory, and battery-life limits of a physical smartphone; the system avoids untrusted applications accessing local data; more effective security solutions can be deployed; and new ways of using smartphones become possible. The system consists of a server program, client program, and communication protocol. The server program resides in each virtual smartphone image while the client program is installed in a physical mobile device. The client programs enable a user to remotely interact with and control various mobile applications installed in the virtual smartphone. Using a VNC-based protocol (VNC: virtual network computing), this system transmits various events from the physical device to the virtual smartphone and sends graphical screen updates in the other direction. A virtual Android image that runs on x86 platforms and can be remotely controlled from an ARM based Android device (Fig 1). The main reason behind this choice is the fact that the Android OS is available on both x86 and ARM
A Survey of Mobile Virtualization Using Cloud Computing
platforms as open source software. This particular system implementation allows for tight integration between both physical and virtual smartphones. However, this conceptual model can be extended to work on hybrid platforms, such as allowing an i-mode user to access a virtual Android image, thus enabling the user to virtually execute Android applications on their i-mode phones.
Figure 1: Virtual Smartphone via Cloud Related Work Satyanarayanan et al.  outlined their vision of letting mobile users seamlessly utilize nearby computers to obtain the resources of cloud computing by instantiates a "cloudlet" that rapidly synthesizes virtual machines on nearby infrastructure that can be access through WLAN. Baratto et al presented MobiDesk , a virtual desktop computing hosting infrastructure that provides full featured PC desktop environment to mobile users. Potter et al presented an extension of this infrastructure they call DeskPod , which focuses on reliability issues. Although these literatures related to our work in terms of allowing mobile users to remotely access virtual machine images, our objective of leveraging the performance of mobile applications is different from theirs since they focus on delivering PC applications to mobile users. Our work is most closely related to Chun et al.  as we share similar objective and focus on mobile applications. Chun recognized five categories of augmented execution to speed up mobile applications, namely Primary, Background, Mainline, Hardware and Multiplicity and presented a research agenda to bring the vision into reality. At the time of this writing, it is not clear whether they have progressed and implemented any prototype. Their project homepage can be found in . Our Virtual Smartphone over IP system can be seen as a specific implementation of the Hardware augmentation. An increasing number of literatures propose to address the same security issue by detecting malware in much the same way adopted by PC users. These proposals can be categorized into Local remote anomaly-based , access-control-based  and signature-based  approaches. Due to the limitations of hardware capacity, we argue that these approaches derived from the world of PC cannot be easily deployed on smartphones today. The overhead incurred by these detection programs may hamper the user experience by lagging the overall system responsiveness and consuming battery at a much faster pace. However, these approaches can be deployed on our virtual smartphone images to help users test untrusted programs. If malware is detected in an image, its user can easily revert the image to its previous clean state.
Arpit J. Kuche & D M. Dakhane
BENEFITS OF VIRTUALIZATION ON THE SMARTPHONE BY REDFLY
Benefits proposed in white paper by Redfly shows that the remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. Providing users remote or virtual access to line-of-business applications, files, sensitive corporate data, etc., effectively widens the distance between end users and applications. This managed distancing of users from applications yields greater security, aids in compliance and continuity issues, and provides better access to Web services while giving users a more flexible experience that is truly mobile. Other benefits of remote access and virtualization include: Data Loss Protection—since data resides on the cloud and not on the smartphone, there is a reduced risk of lost or compromised data. Security—all interaction is over VPN behind a firewall and controlled by managed policies and procedures. This reduces the chance of introducing viruses or otherwise compromising the network. Robust Applications—in a remote or virtualized setting, most of the “heavy lifting” is done on the server end allowing the use of applications that currently may be too taxing for smartphone CPUs. There is no need to “mobilize” existing applications to enable smartphone-compatible versions. Reduce the Need for Other Deployed Devices—with current smartphone capabilities partnered with a remote or virtualized environment, many users find they can reduce or eliminate the need to carry a laptop, Net book or UMPC depending on the needed application set and environment. Continuity—use the same business processes as you do today without revamping. Virtualized applications may be accessed by a variety of web-enabled devices providing a consistent and device agnostic user experience.
OVERCOMING CHALLENGES TO ADOPTION
Steve Subar’s (President and CEO of Open Kernel Lab) article says that despite its many use cases and successful deployment in products shipping in volume, mobile virtualization faces systemic challenges to even broader use: • Perception of the technology as a viable alternative to legacy solutions, e.g. A software solution to delivering lower BOM costs or to providing security. • • Concerns about performance overhead. The need to integrate mobile hypervisor as pre-load software, on a per-device basis (as opposed to post-load, application-style deployment) These challenges are gradually being overcome; mobile OEMs and operators/carriers are increasingly attracted to the use of virtualization to bring down the cost of Android devices, while recent performance benchmarks at key OEMs have tempered concerns about the performance overheads. The article also says that mobile virtualization has been shipping in mobile phones since 2009. Despite challenges to adoption, the mobile/wireless ecosystem is turning its attention to this flexible technology, especially to bring down the cost of building and buying smartphones. Coupled with emerging needs to provide secure services on mobile devices, mobile virtualization should play a key role in the deployment of the next 500 million phones
A Survey of Mobile Virtualization Using Cloud Computing
In this survey we presented the work done in the field of mobile virtualization. With the help of mobile virtualization technique using cloud computing user will be able to create virtual images of smartphones in the cloud and access these images remotely from their physical the performance Smartphone devices. However, there are some issues about the performance and overhead. Overcoming the issues this technology can change the world of mobile communication.
1. Mobile virtualization supports mobile cloud Computing http://cloudcomputingtopics.com/2010/12/mobileVirtualization-supports-mobile-cloud-computing/ 2. 3. 4. General Dynamics broadband http://www.oklabs.com/solutions/what-is-mobile-phone-virtualization Virtual Smartphone over IP https://www.nttreview.jp/archive/ ntttechnical.php?contents=ntr201007sf4.html M. Satyanarayanan, V. Bahl, R. Caceres, and N. Davies, “The Case for VM-based Cloudlets in Computing,” IEEE Pervasive Computing, 2009. 5. R.A. Baratto, S. Potter, G. Su, and J. Nieh,“MobiDesk: mobile virtual desktop computing,” Proceedings of the10th annual international conference on Mobile computing and networking, Philadelphia, PA, USA: ACM, 2004, pp. 1-15. 6. S. Potter and J. Nieh, “Highly Reliable Mobile Desktop Computing in Your Pocket,” Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International, 2006, pp. 247 -254. 7. 8. 9. B.G. Chun and P. Maniatis, “Augmented Smartphone Applications Through Clone Cloud Execution.” “CloneCloud Project at Intel Research,” http://berkeley.intel research.net/bgchun/clonecloud/ Bose, X. Hu, K.G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,” Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp. 225-238. 10. H. Kim, J. Smith, and K.G. Shin, “Detecting energy greedy anomalies and mobile malware variants,” Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp. 239-252. 11. A.-. Schmidt, J.H. Clausen, A. Camtepe, and S. Albayrak, “Detecting Symbian OS malware Through static function call analysis,” Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, 2009, pp. 12. A Schmidt, F. Peters, F. Lamour, C. Scheel, S.A.Çamtepe, and S. Albayrak, “Monitoring smartphones for anomaly detection,” Mob. Netw. Appl., vol. 14, 2009, pp. 92-106. 13. L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, “Designing System-Level Defenses against Cellphone Malware,” Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on, 2009, pp. 83 90. 14. Z. Cheng, “Mobile Malware: Threats and Prevention,” McAfee Avert. Mobile
Arpit J. Kuche & D M. Dakhane
15. Celiocrop- Redfly www.celiocorp.com/uploads/REDFLY_Remote_Acces.pdf 16. Mobile Virtualization – Coming to a Smartphone near You. http://www.visionmobile.com/blog/2010/06/mobile virtualization-coming-to-a-smartphone-near-you/