Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing

作者: Daesung Moon , Ikkyun Kim , Jae Woong Joo , Hyung Jin Im , Jong Hyuk Park

DOI: 10.1007/S11277-015-3121-8

关键词:

摘要: Diverse researches following the advancement of IT technology and emergence smart devices are common in current research. In particular, most commercialized device, phone, provides convenient communication among users due to easy portability real-time information sharing within a diverse system. Moreover, spatial temporal use greatly increased because these capable performing same functions as desktop personal computer, making phones extremely popular. However, research on has mainly focused convenience services offered devices, while issue security been neglected. Smart vulnerable diverse, malicious attacks, which have new developed commonly used. For this reason, number applications were detect variety codes prevent private leakage. difficulties recognizing responding such advanced persistent threats (APTs), an intelligent model is urgently required. This paper suggests phone based human behavior mobile cloud computing types code respond APTs. The suggested securely protects from leaks illegal billing action. response malicious, difficult-to-detect provided by user behavior-based analysis, makes it possible shut down network, registry, drive, system accessibility notify attacks.

参考文章(28)
Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez, Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models european symposium on research in computer security. ,vol. 8712, pp. 183- 201 ,(2014) , 10.1007/978-3-319-11203-9_11
Montida Pattaranantakul, Kittichai Sanguannam, Paramin Sangwongngam, Chalee Vorakulpipat, Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network Etri Journal. ,vol. 37, pp. 696- 706 ,(2015) , 10.4218/ETRIJ.15.0114.0883
Jong Park, Hyun-Woo Kim, Young-Sik Jeong, Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure Sustainability. ,vol. 6, pp. 8079- 8091 ,(2014) , 10.3390/SU6118079
Joon-Min Gil, Jong Hyuk Park, Young-Sik Jeong, Data center selection based on neuro-fuzzy inference systems in cloud computing environments The Journal of Supercomputing. ,vol. 66, pp. 1194- 1214 ,(2013) , 10.1007/S11227-011-0667-4
Jiayi Mu, Ailing Cui, Jingyu Rao, Android Mobile Security – Threats and Protection The International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013). pp. 683- 686 ,(2013) , 10.2991/ICCNCE.2013.169
Young-Sik Jeong, Hyun-Woo Kim, Haeng Jin Jang, Adaptive resource management scheme for monitoring of CPS The Journal of Supercomputing. ,vol. 66, pp. 57- 69 ,(2013) , 10.1007/S11227-013-0970-3
Hahnsang Kim, Joshua Smith, Kang G. Shin, Detecting energy-greedy anomalies and mobile malware variants Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 239- 252 ,(2008) , 10.1145/1378600.1378627
Hancong Duan, Shiyao Yu, Mei Mei, Wenhan Zhan, Lin Li, CSTORE: A desktop-oriented distributed public cloud storage system Computers & Electrical Engineering. ,vol. 42, pp. 60- 73 ,(2015) , 10.1016/J.COMPELECENG.2014.11.001
W. Nie, S. J. Peng, J. Xu, L. R. Liu, G. Wang, J. B. Geng, Erratum to “Experimental Analyses of the Major Parameters Affecting the Intensity of Outbursts of Coal and Gas” The Scientific World Journal. ,vol. 2014, pp. 1- 2 ,(2014) , 10.1155/2014/461540