You are on page 1of 3

2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)

People and Mobile Computing:


Architecture and Concerns
Omar Abahussain Fawzi Albalooshi
Department of Computer Science Department of Computer Science
University of Bahrain University of Bahrain
Sakhir, Bahrain Sakhir, Bahrain
20110708@stu.uob.edu.bh falblooshi@uob.edu.bh

Abstract— In modern society, mobile devices have become


an essential part of our life to do many things from anywhere
at any time. This paper aims to show the importance of mobile
computing and its impact on people. Then it discusses the
architecture of mobile computing. Moreover, the paper Factory controlled
Remote Connect Server Virtual Device
Computer
highlights different risks of mobile computing and the bad by mainframe
practices that should be avoided. As technology advances, risks
increase if left unresolved or the people are unaware of such Firewall
Firewall Firewall
ongoing risks.
mainframe Virtual Server
Keywords—mobile computing, 3 tier architecture, mobile Firewall Firewall
computing concerns, mobile computing users, bad practices in
mobile computing Firewall
Firewall Printer & Fax

I. INTRODUCTION Cloud Storage Drive


Firewall Firewall
People have tasks and things to be carried out on desktop
computers which were difficult to reach anytime. Not to Web Server

mention whether the accessed desktop computer has the


Remote video access
requirements for the task to be done or not (such as hardware Firewall Play a video on a
and software compatibility). The emergence of mobile projector

devices made life much easier alongside the internet and


cloud services. Simply put, accessing services and
performing tasks has become within the grasp of the hand
rather than sitting in front of an immobile device to do Antenna

whatever is required.
It may seem to be great having such mobile devices PDA Tablet Laptop Handheld Slate
which have simplified our lives but there are consequences
Mobile Devices
of such devices. Since it is a mobile device, it can be
snitched by a thieve who would sell the device or data or
both. Mobile devices have limitations compared to big ones
in terms of capability to defend against a cyber attack [1]. As
we keep our mobile device active all the time compared to User

fixed devices that we power off, data will be stolen slowly


and eventually fully stolen. Fig. 1. Mobile Computing and what can be done from anywhere anytime.

One of the solutions is spreading awareness to the people


of such risks. Security of these devices must be taken care of A. Definition
by their owners or by being aware of the good practices and Mobile computing is the terminology used for describing
understanding the rights and wrongs. As many people are not the human-computer interaction between a variety of devices
aware of what the device could provide as security protection that are portable to transmit and receive data at ease (such
or service. devices are smartphones, laptops, tablets, wearables, Etc.) It
involves mobile communication services as well as hardware
The paper will go through mobile computing, the and software. Each of these components has a limitation.
architecture, go through related works, discuss the concerns,
suggest a solution, and at last a conclusion.
B. The communication of mobile computing
Communication has the network infrastructure, ad-hoc,
II. MOBILE COMPUTING
properties, concrete technologies, and transmitted data
Fig. 1 shows what a user could possibly do with a mobile formats. As for the Hardware, simply would be the mobile
device. To understand mobile computing, it has been broken device components itself, each device has different hardware
to several points [2,3] to understand it properly: than others.

XXX-X-XXXX-XXXX-X/XX/$XX.00 © 2019 IEEE, Omar Abahussain. All rights reserved.

978-1-5386-7684-4/19/$31.00 ©2019 IEEE


2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)

C. The hardware of mobile computing reusability of components and scalability management. All
Hardware depends mainly on what services and features these benefits and characteristics made the three-tier
the mobile device will provide to its user. Whether it needs architecture very popular choice when developing an
high RAM (random access memory), high storage size, application inter or new-centric. As mentioned earlier, it is a
antenna strength, etc. three-tier architecture which are Presentation tier (user
interface), Application tier (logic), and Data tier (data). If the
user interface changes, the logic, and data remain the same
D. The software of mobile computing
unaffected and still functional. It is more suitable and
Software simply deals with mobile application effective specifically network client/server design.
requirements and characteristics. Mobile computing gives
users the ability to access data and services from everywhere C. Drawbacks of the Architecture
and anywhere. The data could be video, voice, and data
transmitted over the network through the mobile device The architecture may seem to be perfect but the
communication service. drawbacks of such architecture are great due to its
complexity. Thus, harder to maintain as the whole
architecture as it grows bigger and may get corrupted/broken.
E. The impact of mobile computing on people
Additionally, the high cost of implementing such architecture
Most defiantly, mobile computing has made things very and the server performance degrades due to having the
simple and people are more dependent as the technology application tier server wise dependent.
advances. Statistically speaking [4,5], mobile computing is
continuously inclining.
IV. RELATED WORKS
F. To conclude According to the International Journal of Research in
Computer Application & Management [11], discussing the
The reason behind the growth and dependence on mobile
bad practices of users using their smartphone. A research
computing is due to the most benefits of mobile computing
study was conducted to find out the user’s knowledge of the
which are Connectivity, social engagements, and
security threats that lurk the smartphone, understand the
personalization. Despite the worst drawback which is data
importance and the level of the security the user prefers and
theft and depending on the stolen data, it can be assessed on
advise what should be done. The research study was a
how critical the situation is.
mixture of both contained Quantitative and Qualitative
Research. The results of the study came back as many users
III. THE ARCHITECTURE have important data on their smartphones, preferred screen
The mobile computing architecture section has been lock was a pattern which is considered as a medium to low
broken to several points [6, 7, 8, 9, 10] to understand it security. Shockingly, not many have a SIM lock nor even
properly: know what SIM lock means. Users also by 95% install from
unknown sources which can lead to installing a gateway for
A. Definition information theft, spam, etc. And the majority do not have
antivirus installed nor Anti-theft application. The study also
Mobile computing is a three-tier architecture which showed that users do not read what permissions the
consists of the Presentation tier, Application tier, and Data application request rather they simply grant access. At last,
tier. The architecture is explained in Fig. 2 explains the majority did not know what IMEI is or its purpose. IMEI
furthermore about the architecture. is an abbreviation for International Mobile Equipment
Identity [12]. It is a unique number to differentiate each
Mobile Computing – Three-Tier Architecture device from another. It also helps in tracking the device if it
Tier-1 Tier-2 Tier-3 is stolen and to verify that it is your phone by comparing the
Network layer
Presentation Tier Application Tier Data Tier device’s IMEI number with the IMEI written in the receipt of
The business logic
This layer deals of the application,
The transmitted purchase or on the box.
Also known as the data is stored in the
only with the the functions and
user interface tier,
Deals with the user
communication as services, the
database and
retrieved,
On the other hand, Symantec Corp (the world leading
data to be language used and CyberSecurity) in their patent papers (Inventors: Kevin
Definition

requests, inputs additional provide


transmitted needs the server/
and interactions.
network verified. database
other data web Alejandro Roundy, Michael Hart, Christopher Gates) [13],
service.
communication. discussing ways of detecting security threats by generating a
Window Business logic
security incident report and storing them in a database. The
Network
Cloud Database database serves the purpose of providing statistical data that
protocols, can be accessed on Symantec Corp website [14] for all the
Browser proxies, Language Used
Local Database
bad practices and threats as such data help users in knowing
protocols, the rights and wrongs. The idea is to prevent users from
etc.
Application User
Services Web Services
falling into cyber traps as well as push them away from the
bad practices of using default passwords or short simple
Contens

Interface

Etc. Etc. passwords and so on.


Certainly, there are many related works in terms
Fig. 2. The Architecture of Mobile Computing
understanding the importance of mobile computing field
alongside the concerns from each perspective. Therefore,
B. Advantages of the Architecture many have discussed different points of the mobile
The reason behind such architecture would be a computing mainly focused on cloud computing as the
performance boost, more flexibility, maintainability at ease,
2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)

technology is advancing towards that direction, it can be [2] R. Shah, "Mobile Computing And Architecture", Prezi, 2019.
viewed in [15, 16, 17] for further knowledge expanding. [Online]. Available: https://prezi.com/qucainxhi1l7/mobile-
computing-and-architecture/. [Accessed: 10- Feb- 2019].
[3] "The Benefits of Mobile Computing and How Data Is Accessed", The
V. CONCERNS Balance Small Business, 2019. [Online]. Available:
https://www.thebalancesmb.com/definition-of-mobile-computing-
Mobile computing has helped many people due to the 2533640. [Accessed: 10- Feb- 2019].
capability of accomplishing tasks while away from any fixed [4] E. Enge, "Mobile vs Desktop Usage in 2018: Mobile widens the gap",
device. This allowed unethical developers and hackers to Stone Temple, 2019. [Online]. Available:
take advantage of the situation and target these devices for https://www.stonetemple.com/mobile-vs-desktop-usage-study/.
information theft. After the theft, either the information is [Accessed: 14- Feb- 2019].
sold or demands a ransom to be paid in bitcoin currency [18]. [5] "Internet Statistics & Facts (Including Mobile) for 2019",
HostingFacts.com, 2019. [Online]. Available:
Aside from local theft where the device is stolen https://hostingfacts.com/internet-facts-stats/. [Accessed: 14- Feb-
physically. In such situation, it is rarely to be found again as 2019].
such thefts never have the intentions of returning the device [6] "3-Tier Architecture: A Complete Overview - JReport", JReport,
back to its owner and the data or the device or both are sold 2019. [Online]. Available: https://www.jinfonet.com/resources/bi-
defined/3-tier-architecture-complete-overview/. [Accessed: 10- Feb-
which if fallen in wrong hands, the stolen data may be 2019].
critical depending on its importance and its impact. For [7] PATEL, "Architecture of Mobile Computing", Slideshare.net, 2019.
instance, a bank manager kept blueprints and codes of the [Online]. Available:
bank on his phone that got stolen will cause great loss as the https://www.slideshare.net/jainikpatel12/architecture-of-mobile-
bank has to take precautions and change everything that may computing. [Accessed: 10- Feb- 2019].
have been compromised due to the theft. [8] "Unit 2 - Mobile Computing – Three Tier Architecture.", KDKCE,
2019. [Online]. Available: https://www.kdkce.edu.in/pdf/Unit-
As from the related work, people are not aware of what 2%20Mobile%20computing-Architecture.pdf. [Accessed: 10- Feb-
security features the mobile devices present and in case of 2019].
theft what can be done and should be done. Additionally, [9] C. Kambalyal, "3-tier architecture", vol. 2, 2010.
they are unaware of the third-party security softwares that [10] "5 Benefits of a 3-Tier Architecture - Izenda", Izenda, 2019. [Online].
also provide assistance. Moreover, they are unaware of many Available: https://www.izenda.com/blog/5-benefits-3-tier-
architecture/. [Accessed: 10- Feb- 2019].
risks linger their mobile device.
[11] S. Anyimah, M. Shrivas, J. Badu and T. Yeboah, "Users’
Consciousness And Practices Regarding Smartphone Security
VI. SOLUTIONS Threats, Vulnerabilities And Security Measures: A Research In The
Tarkwa-Nsuaem Municipality Of The Western Region, Ghana",
From the users’ side, they should be educated about International Journal of Research in Computer Application and
every mobile computing concern as well as how to secure Management, vol. 7, no. 11, 2017. Available:
their mobile devices very well and keeping it safe. In http://ijrcm.org.in/comapp/index.php. [Accessed 10 February 2019].
addition, the data stored on the mobile device where any [12] "What Is My Phone’s IMEI and What Is It For?", MakeUseOf, 2019.
sensitive data should not be stored in it. [Online]. Available: https://www.makeuseof.com/tag/phones-imei-
makeuseof-explains/. [Accessed: 10- Feb- 2019].
On the developers’ side would be to force security to the [13] Roundy, K., Hart, M. and Gates, C. (2018). US10003606B2 -
users regardless of what they want, the options “Skip” or Systems and methods for detecting security threats - Google Patents.
“Ask me later” should not be there. Anti-theft should be [online] Patents.google.com. Available at:
https://patents.google.com/patent/US10003606B2/en [Accessed 1
active immediately. Antivirus should be installed mandatory. Nov. 2018].
[14] "Internet Security Threat Report (ISTR) 2018 | Symantec",
VII. CONCLUSION Symantec.com, 2018. [Online]. Available:
https://www.symantec.com/security-center/threat-report. [Accessed:
People should be aware while using these devices to keep 14- Feb- 2019].
them safe and secure with mid to high encryption such that is [15] P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on
a complex pattern, pin or password, perhaps using biometrics Architecture and Computation Offloading", IEEE Communications
[19] or any security lock that the mobile device offers. Also, Surveys & Tutorials, vol. 19, no. 3, pp. 1628-1656, 2017. Available:
such devices should never have sensitive data or information 10.1109/comst.2017.2682318 [Accessed 10 February 2019].
that could compromise and complicate things, or even worse [16] M. Satyanarayanan, "A Brief History of Cloud Offload", ACM
which cause death. SIGMOBILE Mobile Computing and Communications Review, vol.
18, no. 4, pp. 19-23, 2015. Available: 10.1145/2721914.2721921
[Accessed 10 February 2019].
REFERENCES [17] L. Tong, Y. Li and W. Gao, "A hierarchical edge cloud architecture
for mobile computing", IEEE INFOCOM 2016 - The 35th Annual
IEEE International Conference on Computer Communications, 2016.
[1] K. Kauthamy, N. Ashrafi and J. Kuilboer, "Mobile Devices and Cyber Available: 10.1109/infocom.2016.7524340 [Accessed 10 February
Security - An Exploratory Study on User’s Response to Cyber 2019].
Security Challenges", Proceedings of the 13th International
[18] "Bitcoin - Open source P2P money", Bitcoin.org, 2019. [Online].
Conference on Web Information Systems and Technologies, 2017.
Available: https://bitcoin.org/en/. [Accessed: 14- Feb- 2019].
Available: 10.5220/0006298803060311 [Accessed 13 February
2019]. [19] "What is biometrics? - Definition from WhatIs.com", SearchSecurity,
2019. [Online]. Available:
https://searchsecurity.techtarget.com/definition/biometrics.
[Accessed: 10- Feb- 2019].

You might also like