Security Evaluation of Google Chrome Operating System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationdesktops, to laptops and hand-held devices, has a core piece of software, called operating system (OS) executedon the top of a bare machine of hardware that allocates the basic resources of the system and supervises theexecution of all applications within the system. This paper investigates and evaluates the security of GoogleChrome Operating System. Google Chrome Operating system is an operating system developed by google,which runs on specialized hardware. The Chrome OS differ from traditional operating system such as Windowsin that it is designed to work specifically with web pplications. In this operating system, the user data livesessentially on the web. Thus, if the physical machine-laptop is lost or stolen, the user can still access their dataonline. However, the Chromebook also allows users to access downloaded data offline, which must be kept safe.To achieve this, Chrome OS ensures that all downloaded data is protected and that code running on thisChromebook is safe to use. In order to avoid security challenges of traditional operating system such as virusand worms, ChromeBook not only ensures that the code is safe, but also incorporates an autoupdate features toadd new patches to the system.
Authors and Affiliations
Ogbuabor Godwin Okechukwu
A Practical and Comparative Study of Call Graph Construction Algorithms
A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the imp...
Fuzzy Inference Rule Generation Using Genetic AlgorithmVariant
Abstract: In essence of fuzzy inference system (FIS) for classification, Genetic algorithm (GA) which is anoptimal searching technique is used for generation rules in the proposed work. This paper develops an FIS withrul...
Traffic Modeling of Wireless Body Area Network
Abstract: Wireless Body Area Network (WBAN) is required to provide quality of service (QoS) guarantees for transporting and processing life threatening gathered data. One important aspect of providing QoS guarantees unde...
A Generalized Study on Encryption Techniques for Location Based Services
Abstract: Location-based service (LBS) is the concept that denotes applications integrating geographic location (i.e., spatial coordinates) with the general notion of services. Examples of such applications include...
An Integrated Approach to Design an EAF for the CCS of ICDSin India
Abstract: E-government is getting a positive thrust in view of `Digital India Project` initiatives by the currentgovernment in India. At present, information and communication technology (ICT) has become an essenti...