scispace - formally typeset
Proceedings ArticleDOI

A Context-Adaptive Security Framework for Mobile Cloud Computing

Reads0
Chats0
TLDR
This work has devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems and provides varied techniques to improve the quality of service and reliability of mobile cloud Computing.
Abstract
Mobile cloud computing is an emerging area in the cloud computing paradigm, comprising several modes of communication that are governed by varying security standards WBAN (Wireless Body Area Networks), RFID (Radio Frequency IDentification) and VANET (Vehicular Ad-hoc NETworks) are three example applications that could be based on mobile cloud computing Considering the fact that the security mechanisms in different applications are highly heterogeneous while the cloud server is common to these applications, we devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems Furthermore, the framework provides varied techniques to improve the quality of service and reliability of mobile cloud computing Technically, this multicomponent context-adaptive framework accepts the traffic in different communication modes, prevents attacks by randomly choosing pre-defined algorithms, learns from previous attacks using cognitive model, and rearranges the cloud service model as a self-healing system

read more

Citations
More filters
Journal ArticleDOI

Security and privacy challenges in mobile cloud computing

TL;DR: The main security and privacy challenges in this field which have grown much interest among the academia and research community are presented and corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges.
Proceedings ArticleDOI

Mobile Cloud Computing: Challenges and Future Research Directions

TL;DR: In this work, the main challenges and issues related to MCC are outlined, the recent work and countermeasure solutions that are proposed by researchers to counter the challenges and crucial open research and issues that direct future research is highlighted.
Journal ArticleDOI

Framework for determining the suitability of blockchain: Criteria and issues to consider

TL;DR: The operation of blockchain, application areas where blockchain is suitable, and those where it is not, and the applicability of other emerging DLTs, apart from blockchain technology, are described.
Journal ArticleDOI

Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems

TL;DR: The proposed model is a context-aware and self-adaptive security management model for IoT, in eHealth perspective that will monitor, analyze, and respond to a multitude of security contexts autonomously, and exploits the advantages of computing in the Fog Layer.
Book ChapterDOI

Assessing the Feasibility of Adaptive Security Models for the Internet of Things

TL;DR: An evaluation framework is presented that assesses the feasibility of adaptive security models in IoT settings from an adaptive risk management perspective and captures the essential features of a given model, such as adaptation aptitude and architectural aspects.
References
More filters
Book ChapterDOI

PRISM 4.0: verification of probabilistic real-time systems

TL;DR: A major new release of the PRISMprobabilistic model checker is described, adding, in particular, quantitative verification of (priced) probabilistic timed automata.
Book ChapterDOI

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

TL;DR: The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif or the Avispa tools, which have shown to be effective at finding attacks on protocols or establishing correctness of protocols.
Proceedings ArticleDOI

Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation

TL;DR: The security issues related to the cloud are explored, some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure are explored and a security strategy is formulated to enable the Cloud providers and customers alike to fight against ever emerging security threats.
Journal ArticleDOI

Security standards for the RFID market

TL;DR: With public attention focused on the RFID landscape, security and privacy have moved to the forefront in RFID standards work, and the results are worth watching.
Proceedings ArticleDOI

Authentication in the clouds: a framework and its application to mobile users

TL;DR: The approach is based on a flexible framework for supporting authentication decisions the authors call TrustCube and on a behavioral authentication approach referred to as implicit authentication that results in a new authentication paradigm for users of mobile technologies.
Related Papers (5)
Trending Questions (1)
How to Clear Spring security context?

Considering the fact that the security mechanisms in different applications are highly heterogeneous while the cloud server is common to these applications, we devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems.