Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2,3
K.J. Somaiya Institute of Management studies & Research
Vidyanagar, Vidyavihar, Mumbai-77
Abstract - Mobile operating system is a light weight ability. The operating system in currently trending in the
operating which is used in mobile device. Some operating market are Android, IOS, windows etc. And the
systems have additional features like sensor embedding operating systems which are discontinued are Web OS,
and also OTG. In this paper we are going to compare palm OS etc.
between android and iPhone Operating System (iOS)
mobile operating systems that available in the market
Android is a stack of software which includes and
which is more specific various issues. The issues which we
are going to discuss in this paper is not only concern to operating system for mobile devices as well as
mobile customers but also concern to software developers. middleware and key applications. Android was first
The security requirements for MOS are Memory released on September 23, 2008. Android is considered
Randomization, Encryption, Data Storage Format and as an OS as well as the platform for software. The
Built-in Antivirus. Memory randomization ensures that the android operating system for mobile is based on light
memory regions of mobile application as well as system weight Linux Operating system and it was developed by
shared libraries are all randomized at device and Google. Android operating system is an open source and
application start-up. In this paper we want compare and freeware. Android operating system allows the
analyse the operating system of the Android and iOS.
developers to develop application java like language
which use Google-Developed Java Libraries. Android
Keywords - iOS, MOS, Xcode, Self-reboot, SDK. architecture consist of Core Libraries, android runtime,
application frame work as well as Linux Kernel.
1. Introduction Android Use SQLite for data storage. Android support
all type of Network connectivity like GSM, EDGE, 3G,
Mobile operating system is an operating system which is LTE, Wi-Fi etc. As it is based on Linux OS It have all
used in mobile devices. This operating system are the drivers preinstalled and it support OTG (one the go)
basically a light weight operating system which required for any external devices.it also supports voice
low space and memory. Mobile operating system also recognition and multi users. The 1st android version was
known as mobile OS this operating system can also be alpha and current version is lollipop.
used in PDA, Tablet, and Smartphone etc. Mobile
operating system combines all the features of personal iOS is a mobile operating system which was developed
computer. Mobile operating system have all the essential for iPhone by Apple Inc. later it was deployed on iPod
components are as follows:- a touchscreen, cellular, Touch as well as iPad .iOS was first released on June 29,
Bluetooth, Wi-Fi, GPS mobile navigation, camera, video 2007. iOS was derived from Mac OS X with which it
camera, speech recognition, music player, voice shares the Darwin foundation, and is therefore a Unix
recorder, near field communication and infrared blaster. based operating system, by nature and it was exclusively
Mobile operating systems have features like Multiusers, for apple hardware only. The four abstraction layer of
Multiprocessing, and multitasking. Mobile operating iOS is the Media layer, the Cocoa Touch layer, the Core
system have mobile communication capability. The first OS layer, and the Core Services layer. iOS also support
mobile operating system was Palm OS 1.0 which was all type of network connectivity like GSM, EDGE, 3G,
introduced in the year 1996 and used in PDA. LTE, Wi-Fi etc.IOS hardware provides a unique
platform for sensor applications. Developing sensor
Mobile operating system are build using various applications using Apple IOS offers several advantages
architectures like Unix, Linux, Windows CE etc. In over traditional, high performance, embedded system
modern mobile operating system have pen and touch development. Using an ios based accessory the
273
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 7, July 2015
ISSN : 2348 - 6090
www.IJCAT.org
difficulties to designers while developing reliable risk. It's about how developers can reduce and
communication and functional user interfaces can be minimize potential risks for consumers. The mobile
avoided by using accessory like processing and user must also make a choice between comfort and
connectivity portion of system. Accessory over here privacy of data. In conclusion, they agreed that IOS
basically means an attachment to the IOS hardware. This are more advantage compared to Android operating
accessory would contain the sensing elements as well as System in term of security based on comparison that
the hardware. In this paper we will also be looking into have made. few basic security points discussed by
automatic collection of failure data from IOS platform. them to keep our data safe on the respective mobile
The collection of failure data is not straightforward, due device are:
to its closed-source nature. The first iOS version was
iOS 1.0 and the current version is 8.0 with enhanced - Always update your Smartphone OS, irrespective of
functionalities. it being an Android or an iOS, whenever any
application patches or OS upgrades are released.
2. Related Works - If the device is being used by a stranger, use a
Passcode to lock your device in order to avoid data
leakage.
• Marcello Cinque & Carlos Rodr´ıguez-Dom´ınguez - Do not jail-break, root, or modify the OS files.
according to their paper the design and development
details of a logging subsystem for the iOS platform.
The logger is designed to collect failure data about • Fattoh AI-Qershiet.all in their paper they have
application crashes, hangs, system freezes and self- compared Android vs. IOS, based on different
reboots. The experimentation on real-world devices aspects and measures, shows the defence types, the
has shown the usefulness of the Logger to analyse strengths, and the weaknesses of both. Some of
the dependability behaviour of iOS.Specifically, they defences mechanisms are applied in both and some
noted that, to free memory in favour to the are different for each other and this makes the
foreground application, the system may kill security a power character in both. The
frequently used applications that may also take a Vulnerabilities in Android are more than those in
non-negligible time, in some cases, to be completely IOS and this is shown in the comparison. The
restarted. They also observed that a malicious or strengths in IOS are more by a little than those in
poorly designed application may easily lead the Android. Availability of solutions and anti-
whole system to a severe failure. malwares products for Android is greater than IOS.
The two ratings in the comparison are both won by
IOS. The last but not least is that, Android is the
• Daniel Brateris and et.al in there paper they have forerunner in the race of business competition but
discussed about what type of unique orm for sensor the stockholders of Android's developments should
applications are provided by IOS hardware. IOS do more efforts in terms of security to continue
hardware includes various type of features like a forerunning because IOS stills a strong competitive
complete micro controller system, audio/video adversary and it gives a prime focus for
input/output, it also have feature for user defined implementing security technology.
touch-screen interface and also have wireless and
wire based networking. • Muneer Ahmad Dar & Javed Parvez in there paper
they have attempted to perform a detailed security
In IOS communicating with the IOS hardware and comparison of leading Smartphone operating
sensor elements is responsible by microcontroller systems with the intention to find out if one of them
which I present in the accessory. They are also has an edge over the other. After comparing, there
responsible for authenticating all the accessory which research came to the conclusion that the novice
is connected to IOS device with IOS hardware. In users are not aware of the permissions they have
IOS all the development tools are well documented granted at the time of installation particularly of the
and rigidly controlled. And with respect to cost IOS Android Users. They removed the dangerous
devices are not too much expensive - an iPod touch permissions from the app based on their
can be purchased for 229$. Using IOS devices we functionality and then our research provided the
can develop sensor based applications which allow second level of security to the users, without
the developers to concentrate on sensor base modifying the underlying structure of Android
subsystem. In this paper they demonstrated this operating system.
approach by building, designing and testing a digital
multimeter (DMM).
274
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 7, July 2015
ISSN : 2348 - 6090
www.IJCAT.org
275
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 7, July 2015
ISSN : 2348 - 6090
www.IJCAT.org
First Author:
Second authors:
276