Resource management and security issues in mobile phone operating systems: A comparative analysis
Author and article information
Abstract
Nowadays Mobile phones are becoming more popular in our daily lives. Mobile technology has a great effect on human life. Our daily tasks are dependent on mobile devices. Memory Management (MM), Security and Performance plays an important role in every handheld device specially in mobile phones, which are very much dependent on their operating system (OS). These embedded operating systems are on the driving seat when we talk about efficient and useful memory management and secure handling. Three popular OS in mobile phones are Android, Windows and iOS (iPhone OS). Each OS has its own way of managing the memory and provide it to certain number of applications. Android is an open software available for the people to modify as per their needs. But Windows and iOS operating systems didn’t allow their software as open source. Researchers have done a large amount of work using different mechanisms and decision makings to develop new ways to manage the memory of these OS’s. This work shows a comparative analysis of different memory management and security related techniques in above three operating systems. In this paper, we present the analysis of memory management and security in mobile phone operating systems with respect to apps, main memory, cache memory and virtual memory. Also, we compare the overall performance of these OS’s in terms of MM, security concerns. This study will help in finding better operating system in terms of efficient memory management and security.
Cite this as
2017. Resource management and security issues in mobile phone operating systems: A comparative analysis. PeerJ Preprints 5:e3344v1 https://doi.org/10.7287/peerj.preprints.3344v1Author comment
This is a preprint submission to PeerJ Preprints.
Sections
Additional Information
Competing Interests
The authors declare that they have no competing interests.
Author Contributions
Khalid Mahmood Awan conceived and designed the experiments, analyzed the data, wrote the paper.
Muhammad Waqar performed the experiments, contributed reagents/materials/analysis tools, wrote the paper, prepared figures and/or tables.
Muhammad Faseeh performed the experiments, contributed reagents/materials/analysis tools, prepared figures and/or tables.
Farman Ullah performed the experiments, contributed reagents/materials/analysis tools, reviewed drafts of the paper.
Muhammad Qaiser Saleem analyzed the data, wrote the paper, reviewed drafts of the paper.
Data Deposition
The following information was supplied regarding data availability:
The research in this article did not generate any data or code (please explain).
Funding
The authors received no funding for this work. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.