Open Access Open Access  Restricted Access Subscription Access

Security Technique in Mobile Clouds to Ensure Malware Prevention


Affiliations
1 Department of Computer Science, Faculty of C and IT, University of Gujrat, Pakistan
 

Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues relating to the MCC, first issue is that the owners have no full control over the infra-structure. Therefore, they set up their own methods to control data security and make it reliable. Secondly, the cloud owners have maximum rights because cloud owners can change and manage the user’s system and also make use of their data by implementing their rights. State the methodology adapted to meet your objectives. Findings: This study shows how data can be kept in confidentiality by maintaining necessary consistent relations in cloud. Prevention from Malware Technique is also being discussed that makes it probable for data to be compressed and encrypted by using a variety of keys prior to uploading on the cloud. It is uploaded in such a way that ending data could be decrypted and de compressed by a single key. Application/Improvements: The planed scheme empowers the user in performing utmost computation comprehensively and storage jobs which keep the users away from revealing the data guts and the personal/private information of users.
User

  • Hoang T, Chonho L, Dusit N. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing. 2013; 13(18):1587–611. https://doi.org/10.1002/wcm.1203.
  • Fernando N, Seng W, Wenny R. Mobile cloud computing: A survey. Future Generation Computer Systems. 2013; 29(1):84–106. https://doi.org/10.1016/j.future.2012.05.023.
  • Dipali S. Yadav H, Kanchan D. Mobile cloud computing issues and solution framework. International Research Journal of Engineering and Technology. 2016; 3(11):1115– 18.
  • Ahmed E. Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges. Journal of Network and Computer Applications. 2015; 52(1):154–72. https://doi.org/10.1016/j.jnca.2015.03.001.
  • Shiraz M, Abolfazli S, Abdul G. A study on virtual machine deployment for application outsourcing in mobile cloud computing. 2013; 63(1):946–64.
  • Abid S, Mureed H. Security issues and challenges of mobile cloud computing. International Journal of Grid and Distributed Computing. 2013; 6(6):37–50. https://doi.org/10.14257/ijgdc.2013.6.6.04.
  • Aminzadeh N, Zohreh S, Siti H. Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues. Simulation Modelling Practice and Theory. 2015; 50(1):96–108. https://doi.org/10.1016/j.simpat. 2014.05.009.
  • Abolfazli S, Aasd E. Mobile cloud computing: The-stateofthe-art, challenges, and future research. Encyclopedia of Cloud Computing. 2015; 1(1):123–9.
  • Chang J, Gao V, Gruhn J, Roussos G. Mobile cloud computing research – issues, challenges, and needs. IEEE Seventh International Symposium on Service-Oriented System Engineering; 2013. p. 442–53. https://doi.org/10.1109/ SOSE.2013.96.
  • Zetta. Zetta: Enterprise cloud storage on demand [Internet]. [cited 2008 Mar]. Available from: http://www.zetta.net/.
  • Wang X. Mobile cloud computing in 5g: Emerging trends, issues, and challenges. IEEE Network. 2015; 29(2):1234–40. https://doi.org/10.1109/MNET.2015.7064896.
  • Ali M, Samee U, Vasilakos AV. Security in cloud computing: Opportunities and challenges. Information Sciences. 2015; 30(5):357–83. https://doi.org/10.1016/j.ins.2015.01.025.
  • Liu J. Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions. Journal of Network and Computer Applications. 2015; 48(1):99–117. https://doi.org/10.1016/j.jnca.2014.09.009.
  • Shant D, Pinku S. Computation offloading frameworks in mobile cloud computing: A survey. IEEE International Conference on Current Trends in Advanced Computing (ICCTAC); 2016. p. 123–30.
  • Sujithra M, Sathya N. Mobile device data security: A cryptographic approach by outsourcing mobile data to cloud. Procedia Computer Science. 2015; 47(1):480–5. https://doi.org/10.1016/j.procs.2015.03.232.
  • Anirudh P, Mohammad S, Mais N. Survey on three components of Mobile Cloud Computing: offloading, distribution and privacy. Scientific Research an Academic Publisher. 2017; 5(6):4236–43.
  • Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff L, Zagorodnov D. The eucalyptus open-source cloud-computing system. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid; 2009. p.124–31. https://doi.org/10.1109/CCGRID.2009.93
  • Sun Microsystems Unveils Open Cloud Platform [Internet]. [cited 2009 Mar 18]. Available from: https:// www.businesswire.com/news/home/20090318005374/en/ Sun-Microsystems-Unveils-Open-Cloud-Platform. Date accessed: 18/03/2009.
  • Dipayan D, Krishna L. A review and research towards mobile cloud computing. 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering; 2014. p. 1–5.
  • Mascolo C. The power of mobile computing in a social era. IEEE Internet Computing. 2010; 14(6):76–9. https://doi.org/10.1109/MIC.2010.150
  • Fernandes E, Crispo B, Conti M. FM 99.9, Radio Virus: Exploiting FM radio broadcasts for malware deployment. IEEE Transactions on Information Forensics & Security. 2013; 8(6):1027–37. https://doi.org/10.1109/ TIFS.2013.2259818.
  • Xing T, Huang D, Ata S, Medhi D. Mobicloud: A geodistributed mobile cloud computing platform. Network and Service Management (CNSM). 8th International Conference on Network and Service Management (CNSM) and, Workshop on Systems Virtualiztion Management (SVM); 2012. p. 164–8.
  • Li J, Gu D, Luo Y. Android Malware Forensics: Reconstruction of malicious events. 32nd International Conference on Distributed Computing Systems Workshops. 2012, pp. 552558. https://doi.org/10.1109/ICDCSW.2012.33.
  • Lijun M, Chan K, Tse H. A tale of clouds: Paradigm comparisons and some thoughts on research issues. IEEE Asia-Pacific Services Computing Conference; 2008. p. 464–9.
  • Siani P, Yun S, Miranda M. A privacy manager for cloud computing. HP Labs. Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK; 2009. p. 90–106.
  • Rastogi V, Chen Y, Jiangy X. DroidChameleon: Evaluating android anti-malware against transformation attacks. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security; 2013. p. 329–34. https://doi.org/10.1145/2484313.2484355.
  • Jeffrey D, Sanjay G. MapReduce: A flexible data processing tool. Communications of the ACM. 2010; 53(1): 12–19.
  • Bo P, Bin C, Xiaoming L. Implementation issues of a cloud computing platform. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 2009; 8:59–66.
  • Jiawei Y, Shucheng Y. Proofs of retrievability with public verifiability and constant communication cost in cloud. Cloud Computing. 2013; 4(2):1234–50.
  • Jo M. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications. 2015; 22(3):50–8. https://doi.org/10.1109/MWC.2015.7143326.
  • Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing. 2009; 8(4):14–23. https://doi.org/10.1109/ MPRV.2009.82.
  • Giuseppe A, Roberto D. Scalable and efficient provable data possession; 2008. p. 1–11.
  • Shiraz M and Gani A. Mobile cloud computing: Critical analysis of application deployment in virtual machines. Proceedings, International Conference Information and Computer Networks (ICICN'12). 2012; 27(1):123–30.
  • Sikorski M, Honig A. Practical Malware Analysis - The hands-on guide to dissecting malicious software; 2012.
  • Jon O, Evan C, Farnam J. CloudAV: N-version antivirus in the network cloud. Proceedings of the USENIX security symposium; 2008. PMCid:PMC3131111

Abstract Views: 208

PDF Views: 0




  • Security Technique in Mobile Clouds to Ensure Malware Prevention

Abstract Views: 208  |  PDF Views: 0

Authors

Abdul Shakoor
Department of Computer Science, Faculty of C and IT, University of Gujrat, Pakistan
Adeel Ahmed
Department of Computer Science, Faculty of C and IT, University of Gujrat, Pakistan
Muhammad Shahzad Sarfraz
Department of Computer Science, Faculty of C and IT, University of Gujrat, Pakistan

Abstract


Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues relating to the MCC, first issue is that the owners have no full control over the infra-structure. Therefore, they set up their own methods to control data security and make it reliable. Secondly, the cloud owners have maximum rights because cloud owners can change and manage the user’s system and also make use of their data by implementing their rights. State the methodology adapted to meet your objectives. Findings: This study shows how data can be kept in confidentiality by maintaining necessary consistent relations in cloud. Prevention from Malware Technique is also being discussed that makes it probable for data to be compressed and encrypted by using a variety of keys prior to uploading on the cloud. It is uploaded in such a way that ending data could be decrypted and de compressed by a single key. Application/Improvements: The planed scheme empowers the user in performing utmost computation comprehensively and storage jobs which keep the users away from revealing the data guts and the personal/private information of users.

References





DOI: https://doi.org/10.17485/ijst%2F2018%2Fv11i31%2F115060