Journal ArticleDOI
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
Reads0
Chats0
TLDR
It is concluded that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.Abstract:
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system IDS is an efficient approach for protecting wireless communications in the Fifth Generation 5G context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright © 2015John Wiley & Sons, Ltd.read more
Citations
More filters
Journal ArticleDOI
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges
TL;DR: The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration.
Journal ArticleDOI
A survey on 5G
TL;DR: In this article, the authors investigate and discuss serious limitations of the fourth generation (4G) cellular networks and corresponding new features of 5G networks, and present a comparative study of the proposed architectures that can be categorized on the basis of energy-efficiency, network hierarchy, and network types.
Journal ArticleDOI
A survey on FinTech
TL;DR: This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements, by which a theoretical data-driven FinTech framework is proposed and five technical aspects are summarized and involved.
Posted Content
A Survey on 5G: The Next Generation of Mobile Communication
TL;DR: In this article, the authors investigate and discuss serious limitations of the fourth generation (4G) cellular networks and corresponding new features of 5G networks, and present a comparative study of the proposed architectures that can be categorized on the basis of energy-efficiency, network hierarchy, and network types.
Journal ArticleDOI
Fog computing security: a review of current applications and security solutions
TL;DR: The impact of security issues and possible solutions are determined, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
References
More filters
Journal ArticleDOI
Mobile cloud computing
TL;DR: This paper provides an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud Computing, and presents a taxonomy based on the key issues in this area, and discusses the different approaches taken to tackle these issues.
Journal ArticleDOI
Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?
Kumar Karthik,Yung-Hsiang Lu +1 more
TL;DR: The cloud heralds a new era of computing where application services are provided through the Internet, but is it the ultimate solution for extending such systems' battery lifetimes?
Journal ArticleDOI
Review: Intrusion detection system: A comprehensive review
TL;DR: Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
Karen A. Scarfone,Peter Mell +1 more
TL;DR: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
Book
Principles of Information Security
TL;DR: Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers.