ArticlePDF Available

Analysing Power Consumption Of Different Browsers & Identity Management Systems In Mobile Phones

Authors:

Abstract and Figures

Currently there are many different Identity Management Systems which differ in their architectures as well as use different protocols and serve different purposes and are extensively used by organisations to provide online services. With the remarkable growth of mobile phones in the last few years, both in number and computational power, more and more users are accessing an array of online services using their mobile phones. One of the major concerns for the user of mobile phones is the battery life which is limited and tends to run out quickly. Hence, efficiency in power consumption is a crucial factor for any system when it is accessed using a mobile phone. In this paper, we analyse the efficiency, in terms of power consumption, of different browsers in mobile phones and different Identity Management Systems when the mobile phones are used to access online services protected by those Identity Management Systems.
Content may be subject to copyright.
A preview of the PDF is not available
... The federation with respect to Identity Management Systems (IMS) is a joint venture of two or more trusted organizations. Such organizations are bound together with some business or technical contract in which users from either side can access restricted resources [10]. Although, the identity management frameworks and standards provide the capability of SSO, the frameworks are limited on providing certain features of cross domain security such as Conflict of Interest (CoI). ...
... ∀sp-ua ∈ Sp − Ua | sp-cr [17] = sp-r [6] ∨ sp-cr [10] = sp-r[1] → sp-r [1] := sp-cr [10], sp-r [2] := sp-cr [11], sp-r [3] := sp-cr [12], sp-r [4] := sp-cr [13], sp-r [10] := sp-cr [14], sp-r [13] := sp-cr [9], sp-r [25] := sp-cr [24], sp-r [11] := C R − R E G − DI D(sp-cr [17], sp-cr [10]), sp-r [12] := C R − R E G − SK (sp-cr [17], sp-cr [10]), sp-cr [15] := sp-r [11], sp-cr [16] := sp-r [12], sp-ua [1] := sp-r [11], sp-ua [2] := sp-r [12], Sp − Cr = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25]) R (Reg-Sr-S) = ∀sr-cr ∈ Sr − Cr, ∀sr-r ∈ Sr − R, ∀sr-ua ∈ Sr − Ua | sr-cr [12] = sr-r [8] ∨ sr-cr [8] = sr-r[1] → sr-r [1] := sr-cr [8], sr-r [2] := sr-cr [11], sr-r [4] := sr-cr [10], sr-r [5] := sr-cr [9], sr-r [10] := sr-cr [16], sr-r [14] := sr-cr [7], sr-r [25] := sr-cr [24], sr-r [11] := C R − R E G − DI D(sr-cr [12], sp-cr [8]), sr-r [12] := C R − R E G − SK (sr-cr [12], sr-cr [8]), sr-cr [18] := sr-r [11], sr-cr [19] := sr-r [12], sr-ua [1] := sr-r [11], sr-ua [2] := sr-r [12] Sr − Cr = Sr − Cr ∪ (sr-cr [18], sr-cr [19]) ∧ Sr − R = Sr − R ∪ (sr-r [1], sr-r [2], sr-r [4],sr-r [5], sr-r [10], sr-r [14], sr-r [11], sr-r [12], sr-r [25]) ∧ Sr − Ua = Sr − Ua ∪ (sr-ua [1], sr-ua [2]) ...
... ∀sp-ua ∈ Sp − Ua | sp-cr [17] = sp-r [6] ∨ sp-cr [10] = sp-r[1] → sp-r [1] := sp-cr [10], sp-r [2] := sp-cr [11], sp-r [3] := sp-cr [12], sp-r [4] := sp-cr [13], sp-r [10] := sp-cr [14], sp-r [13] := sp-cr [9], sp-r [25] := sp-cr [24], sp-r [11] := C R − R E G − DI D(sp-cr [17], sp-cr [10]), sp-r [12] := C R − R E G − SK (sp-cr [17], sp-cr [10]), sp-cr [15] := sp-r [11], sp-cr [16] := sp-r [12], sp-ua [1] := sp-r [11], sp-ua [2] := sp-r [12], Sp − Cr = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25]) R (Reg-Sr-S) = ∀sr-cr ∈ Sr − Cr, ∀sr-r ∈ Sr − R, ∀sr-ua ∈ Sr − Ua | sr-cr [12] = sr-r [8] ∨ sr-cr [8] = sr-r[1] → sr-r [1] := sr-cr [8], sr-r [2] := sr-cr [11], sr-r [4] := sr-cr [10], sr-r [5] := sr-cr [9], sr-r [10] := sr-cr [16], sr-r [14] := sr-cr [7], sr-r [25] := sr-cr [24], sr-r [11] := C R − R E G − DI D(sr-cr [12], sp-cr [8]), sr-r [12] := C R − R E G − SK (sr-cr [12], sr-cr [8]), sr-cr [18] := sr-r [11], sr-cr [19] := sr-r [12], sr-ua [1] := sr-r [11], sr-ua [2] := sr-r [12] Sr − Cr = Sr − Cr ∪ (sr-cr [18], sr-cr [19]) ∧ Sr − R = Sr − R ∪ (sr-r [1], sr-r [2], sr-r [4],sr-r [5], sr-r [10], sr-r [14], sr-r [11], sr-r [12], sr-r [25]) ∧ Sr − Ua = Sr − Ua ∪ (sr-ua [1], sr-ua [2]) ...
... The federation with respect to Identity Management Systems (IMS) is a joint venture of two or more trusted organizations. Such organizations are bound together with some business or technical contract in which users from either side can access restricted resources [10]. Although, the identity management frameworks and standards provide the capability of SSO, the frameworks are limited on providing certain features of cross domain security such as Conflict of Interest (CoI). ...
... A portion of the HLPN model shown in Figure 3 is depicted in Figure 4, which represents the registration process of domains on the DS. ∶= sp-cr [10], sp-r [2] ∶= sp-cr [11], sp-r [3] ∶= sp-cr [12], sp-r [4] ∶= sp-cr [13], sp-r [10] ∶= sp-cr [14], sp-r [13] ∶= sp-cr [9], sp-r [25] ∶= sp-cr [24], sp-r [11] ∶= CR − REG − DID (sp-cr [17], sp-cr [10]), sp-r [12] ∶= CR − REG − SK (sp-cr [17], sp-cr [10]), sp-cr [15] ∶= sp-r [11], sp-cr [16] ∶= sp-r [12], sp-ua [1] ∶= sp-r [11], sp-ua [2] ∶= sp-r [12], Sp − Cr ′ = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R ′ = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25] ...
... A portion of the HLPN model shown in Figure 3 is depicted in Figure 4, which represents the registration process of domains on the DS. ∶= sp-cr [10], sp-r [2] ∶= sp-cr [11], sp-r [3] ∶= sp-cr [12], sp-r [4] ∶= sp-cr [13], sp-r [10] ∶= sp-cr [14], sp-r [13] ∶= sp-cr [9], sp-r [25] ∶= sp-cr [24], sp-r [11] ∶= CR − REG − DID (sp-cr [17], sp-cr [10]), sp-r [12] ∶= CR − REG − SK (sp-cr [17], sp-cr [10]), sp-cr [15] ∶= sp-r [11], sp-cr [16] ∶= sp-r [12], sp-ua [1] ∶= sp-r [11], sp-ua [2] ∶= sp-r [12], Sp − Cr ′ = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R ′ = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25] ...
Article
Service-oriented architecture offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using high-level Petri nets to understand the protocol information flow in a distributed environment. We analyze the rules of information flow using Z language, while Z3 SMT solver is used for the verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g., secure secret key authentication, and Chinese wall security policy and secrecy specific properties, e.g., confidentiality, integrity, and authenticity.
Article
Full-text available
Increasing electronic waste has forced the mobile phone industry to move into a new era of energy consumption awareness. Trends show that mobile phone manufacturers are implementing more and more features on a single device. Using these features has led to an increase in electricity consumed by mobile phones, thus forcing users to charge them more frequently. Studies have shown that one can maximise a phone's battery life by limiting the number of charging cycles (Columbus, 2013). In this study, a survey was conducted in order to collect mobile phone usage behaviour. Data concerning most frequently used mobile features together with their usage frequency were collected. Based on the information gathered, a mobile application, MoBateriE, was designed. This 2 application consists of an expert system which at first studies users' behaviour and later imitates them whenever needed. MoBateriE has been designed for smart phone users who want to make extensive use of the features available on their phones without exhausting the battery efficiency of the phone. This application was distributed to a large number of users. Usage logs of thirty-three users were collected and analysed. Results obtained show that after using MoBateriE, users enjoyed a four per cent increase in usage time per charging cycle.
Conference Paper
Full-text available
rganizations needed a way to unify authentication systems in the enterprise for easier management and better security. Single-sign-on was widely adopted and provided a solution for keeping one repository of usernames and passwords that could be used transparently across several internal applications. After analyzing various issues regarding authentication of user's in federated systems we have tried to find out the benefits of using OpenID and SAML as authentication protocols in cloud computing. The focus of the thesis is on the simulation study of the authentication protocols SAML and OpenID in Cloudsim using NetBeans. The performance evaluation has been done based on RAM usage and execution time by introducing the concept of Global Broker.
Article
Full-text available
The paper presents a multiple correspondence analysis of customer preferences at the m-commerce market. The authors have focused on customer preferences in relation to the use of mobile phones while shopping. The correspondence analysis has been developed based on the survey results conducted among 408 customers. During the study 4 consumer segments were selected in terms of behaviour regarding the possibilities and ways of using mobile phones while shopping.
Article
Full-text available
Companies wishing to meet customers' needs should always take into account new technological solutions, which are increasingly used by consumers. One of these technologies, which has become increasingly advanced, is the cell phone, particularly the so-called smartphone. Mobile phones have become a useful tool for both retail stores and customers. Customers can quickly search in their cells for the price of the product offered on websites. These broad capabilities of cell phones have led to a new kind of competition for traditional stores. On the other hand retail stores can use cell phones in order to inform their customers about new promotions, events, etc. The main objective of this paper is to introduce the scale and the cause of the use of cell phones by customers in traditional retailing. The author has focused on cell phone utilization by customers while shopping. In the paper the survey results have been presented, which had been conducted among cell phone users in one medium-sized Polish city. The research results show that cell telephony while shopping has yet to reach the same level of popularity among Polish customers, which it has attained in other countries.
Conference Paper
Full-text available
The fast access of essential and latest information from anytime and anywhere is crucial for the success of fire mission planning and is still a challenge, if requirements such as high performance, security and simplicity have to be met concurrently. However, the secure access to the distributed information of public authorities like building plans or medical patient data is currently mostly available via the traditional time-consuming post. Due to this problem a mobile integrated solution is developed, which allows a secure and holistic access to relevant information. The solution is based on the Security Assertion Markup Language (SAML) architecture which specifies an XML based standard for exchanging authentication and authorization data. Unfortunately, the performance of this approach is not applicable for time-critical mobile applications because of the SAML specific communication procedures. Thus, this paper presents two approaches for boosting the performance and shows the results of performance evaluation for the required validation. Moreover, an analytic model is introduced for identifying the SAML specific processing time.
Conference Paper
Full-text available
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor power consumption while explicitly controlling the power management and activity states of individual components. It requires no external measurement equipment. We also describe PowerTutor, a component power management and activity state introspection based tool that uses the model generated by PowerBooter for online power estimation. PowerBooter is intended to make it quick and easy for application developers and end users to generate power models for new smartphone variants, which each have different power consumption properties and therefore require different power models. PowerTutor is intended to ease the design and selection of power efficient software for embedded systems. Combined, PowerBooter and PowerTutor have the goal of opening power modeling and analysis for more smartphone variants and their users.
Conference Paper
Full-text available
Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Good energy management requires a good understanding of where and how the energy is used. To this end we present a detailed analysis of the power consumption of a recent mobile phone, the Openmoko Neo Freerunner. We measure not only overall system power, but the exact breakdown of power consumption by the device's main hardware components. We present this power breakdown for micro-benchmarks as well as for a number of realistic usage scenarios. These results are validated by overall power measurements of two other devices: the HTC Dream and Google Nexus One. We develop a power model of the Freerunner device and analyse the energy usage and battery lifetime under a number of usage patterns. We discuss the significance of the power drawn by various components, and identify the most promising areas to focus on for further improvements of power management. We also analyse the energy impact of dynamic voltage and frequency scaling of the device's application processor.
Article
Identity management is traditionally seen from the service providers' point of view, meaning that it is an activity undertaken by the service provider to manage service user identities. Traditional identity man-agement systems are designed to be cost effective and scalable primarily for the service providers, but not necessarily for the users, which often results in poor usability. Users are, for example, often required to memorise multiple passwords for accessing different services. This represents a minor inconvenience if users only access a few online services. However, with the rapid increase in the uptake of online ser-vices, the traditional approach to identity management is already having serious negative effects on the user experience. The industry has responded by proposing new identity management models to improve the user experience, but in our view these proposals give little relief to users at the cost of relatively high increase in server system complexity. This paper takes a new look at identity management, and proposes solutions that are designed to be cost effective and scalable from the users' perspective, while at the same time being compatible with traditional identity management systems.
Conference Paper
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protect their digital identities against identity theft. This paper discusses the usability and privacy in online identity management solutions, and proposed a general approach for making users better able to control and manage their digital identities, as well as for creating more secure identity management solutions. More specifically, we propose a user-centric approach based on hardware and software technology on the user-side with the aim of assisting users when accessing online services.
Conference Paper
We present an adaptive, feedback-based, energy estimation model for battery-powered embedded devices such as sensor network gate-ways and hand-held computers. Our technique maps hardware and software counters to energy consumption values using a set of first order, linear regression equations. Our system is novel in that it combines online and offline techniques to enable runtime power prediction. Our system employs an offline instantiated model that it continuously updates using feedback from a readily available battery monitor within the device. We empirically evaluate our model and detail its robustness, accuracy, and computational cost. We also analyze the stability of the model in the presence of feedback errors. We demonstrate that our approach can achieve an error rate of 1% (extant techniques: 2.6% to 4%) for computationally bound tasks and 6.6% (extant techniques: 11%) for communication bound tasks.
The ambiguity of identity
  • D V Thanh
  • I Jørstad
Thanh, D. V. and Jørstad, I. 2008. The ambiguity of identity. Telektronikk Telenor, 3/4.2007.
draft-mace-shibboleth-arch-protocols-latest.pdf. [12] LIBERTY ALLIANCE PROJECT, Liberty ID-FF Architecture Overview Version: 1.2- erratav1
  • Available
Available: http://shibboleth.internet2.edu/docs/draft-mace-shibboleth-arch-protocols-latest.pdf. [12] LIBERTY ALLIANCE PROJECT, Liberty ID-FF Architecture Overview Version: 1.2- erratav1.0. [Online]. Available:
Sesame: A self-constructive virtual power meter for batterypowered mobile systems
  • M Dong
  • L Zhong
Dong, M. and Zhong, L. 2010. Sesame: A self-constructive virtual power meter for batterypowered mobile systems. Tech. Rep.
Available: https://www.prime-project
  • Project
[16] PRIME Project. [Online]. Available: https://www.prime-project.eu/.