Proceedings ArticleDOI
A Context-Adaptive Security Framework for Mobile Cloud Computing
Saurabh Dey,Srinivas Sampalli,Qiang Ye +2 more
- pp 89-95
Reads0
Chats0
TLDR
This work has devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems and provides varied techniques to improve the quality of service and reliability of mobile cloud Computing.Abstract:
Mobile cloud computing is an emerging area in the cloud computing paradigm, comprising several modes of communication that are governed by varying security standards WBAN (Wireless Body Area Networks), RFID (Radio Frequency IDentification) and VANET (Vehicular Ad-hoc NETworks) are three example applications that could be based on mobile cloud computing Considering the fact that the security mechanisms in different applications are highly heterogeneous while the cloud server is common to these applications, we devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems Furthermore, the framework provides varied techniques to improve the quality of service and reliability of mobile cloud computing Technically, this multicomponent context-adaptive framework accepts the traffic in different communication modes, prevents attacks by randomly choosing pre-defined algorithms, learns from previous attacks using cognitive model, and rearranges the cloud service model as a self-healing systemread more
Citations
More filters
Journal ArticleDOI
Security and privacy challenges in mobile cloud computing
TL;DR: The main security and privacy challenges in this field which have grown much interest among the academia and research community are presented and corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges.
Proceedings ArticleDOI
Mobile Cloud Computing: Challenges and Future Research Directions
TL;DR: In this work, the main challenges and issues related to MCC are outlined, the recent work and countermeasure solutions that are proposed by researchers to counter the challenges and crucial open research and issues that direct future research is highlighted.
Journal ArticleDOI
Framework for determining the suitability of blockchain: Criteria and issues to consider
TL;DR: The operation of blockchain, application areas where blockchain is suitable, and those where it is not, and the applicability of other emerging DLTs, apart from blockchain technology, are described.
Journal ArticleDOI
Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems
Waqas Aman,Firdous Kausar +1 more
TL;DR: The proposed model is a context-aware and self-adaptive security management model for IoT, in eHealth perspective that will monitor, analyze, and respond to a multitude of security contexts autonomously, and exploits the advantages of computing in the Fog Layer.
Book ChapterDOI
Assessing the Feasibility of Adaptive Security Models for the Internet of Things
TL;DR: An evaluation framework is presented that assesses the feasibility of adaptive security models in IoT settings from an adaptive risk management perspective and captures the essential features of a given model, such as adaptation aptitude and architectural aspects.
References
More filters
Book ChapterDOI
PRISM 4.0: verification of probabilistic real-time systems
TL;DR: A major new release of the PRISMprobabilistic model checker is described, adding, in particular, quantitative verification of (priced) probabilistic timed automata.
Book ChapterDOI
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
TL;DR: The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif or the Avispa tools, which have shown to be effective at finding attacks on protocols or establishing correctness of protocols.
Proceedings ArticleDOI
Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
TL;DR: The security issues related to the cloud are explored, some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure are explored and a security strategy is formulated to enable the Cloud providers and customers alike to fight against ever emerging security threats.
Journal ArticleDOI
Security standards for the RFID market
TL;DR: With public attention focused on the RFID landscape, security and privacy have moved to the forefront in RFID standards work, and the results are worth watching.
Proceedings ArticleDOI
Authentication in the clouds: a framework and its application to mobile users
TL;DR: The approach is based on a flexible framework for supporting authentication decisions the authors call TrustCube and on a behavioral authentication approach referred to as implicit authentication that results in a new authentication paradigm for users of mobile technologies.