Research Article | Open Access | Download PDF
Volume 3 | Issue 6 | Year 2013 | Article Id. IJPTT-V3I10P103 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I10P103Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change
Vengali Sagar, V. Ravi Kumar.
Citation :
Vengali Sagar, V. Ravi Kumar., "Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 6, pp. 28-32, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I10P103
Abstract
— Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the people which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm to find out from those programs the abnormal behavior that arise.
Keywords
- Mobile cloud computing, mobile cloud infrastructure, mobile cloud service scenarios, abnormal behavior monitoring, machine learning
References
[1] Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure 1Taehyun Kim, 1Yeongrak Choi, Seunghee Han, 3Jae Yoon Chung, 3Jonghwan Hyun, 3Jian Li, and 1James Won-Ki Hong
[2] Scott Paquette, Paul T.Jaegar, Susan C.Wilson. Identifying the security risks associated with governmental use of cloud computing, Journal of Government Information Quarterly 27, pages 245-253, April, 2010.
[3] Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Stanford, David Koestar, Patti Reynolds. “Cloud Computing: A new business paradigm for biomedical information sharing”. Journal of Biomedical Informatics 43, pages 342-353, August, 2008.
[4] Ann Cavoukian, Information and Privacy Commissioner of Ontario. “Privacy in the Clouds”, A White Paper on Privacy and Digital Identity, 2009.
[5] R Gellman. “Cloud Computing and Privacy”. Presented at the World Privacy Forum, 2009.
[6] Subra Kumaraswamy, Shahed Latif and Tim Mather. “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”. Published by O’Reilly, 1st edition, September, 2009.
[7] Dan Svantesson, Roger Clarke. “Privacy and consumer risks in cloud computing”. Privacy consumer risks journal, pages 391-397, July, 2010.
[8] Kim Zetter. “Medical Records: Stored in the Cloud, Sold on the open Market”, Journal of privacy, crime and security, pages 223-256, March, 2009.
[9] Roger Clarke. “Evaluation of Google’s Statement against the rivacy Statement Template of 19 December 2005”, <http://www.rogerclarke.com/DV/PST-Google.html>, 2005.
[10] Google Docs Privacy Policy (Version of 3 October 2010).
[11] Frank Gens. “IT Cloud Services User Survey, part 2: Top
Benefits and Challenges”, Survey conducted by IDC, October,
2008.
[12] Buyya R, Yeo, Venugopal CS, S Broberg, J Brandic, I. “Cloud
Computing and Emerging IT Platforms: Vision, Hype, and
Reality for Delivering Computing as the 5th Utility”. Future
Generation Computer Systems 25, pages 599-616, 2009.
[13] J.D Blower. “GIS in the cloud: Implementing a web map
service on Google App Engine”, Proceedings of the 1st
International Conference and Exhibition on Computing for
Geospatial Research and Application, Washington D.C, June
21-23, 2010.
[14] Mark Nicolett, Jay Heiser. “Accessing the security risks of
cloud computing”, Gartner Inc., June, 2008.
[15] Manish Pokharel and Jong Sou Park. “Cloud computing future
solution for e-Governance”, Proceedings of 3rd International
Conference on Theory and Practice of Electronic Governance,
IEEE 2009.
[16] Ortuatay B. “Twitter service restored after hacker attack”,
Journal of the Baltimore Sun, 2009.
[17] Cubrilovic, N. “Letting Data die a natural death”, International
Journal of electronic Government Research, 2009.