O'Reilly logo

Mobile Cloud Computing by Huijun Wu, Dijiang Huang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Mobile Cloud Security: Virtualization and Isolation on Mobiles

Isolation doesn't bother me at all. It gives me a sense of security.

Jimmy Page

Abstract

Mobile security is a critical issue for mobile cloud computing. Ideally, a mobile can run both personal applications and companies' applications for supporting business functions. The Bring Your Own Device (BYOD) solutions are designed for these dual goals to enable employees to consolidate both personal and business applications and mobile data access on a single device. This chapter introduces a BYOD approach using KVM-based virtualization technologies for ARM devices to enable running VMs with nearly unmodified guest OS and allow easy implementation of corporate policies ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required