scispace - formally typeset
Journal ArticleDOI

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

Reads0
Chats0
TLDR
It is concluded that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.
Abstract
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system IDS is an efficient approach for protecting wireless communications in the Fifth Generation 5G context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright © 2015John Wiley & Sons, Ltd.

read more

Citations
More filters
Journal ArticleDOI

Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges

TL;DR: The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration.
Journal ArticleDOI

A survey on 5G

TL;DR: In this article, the authors investigate and discuss serious limitations of the fourth generation (4G) cellular networks and corresponding new features of 5G networks, and present a comparative study of the proposed architectures that can be categorized on the basis of energy-efficiency, network hierarchy, and network types.
Journal ArticleDOI

A survey on FinTech

TL;DR: This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements, by which a theoretical data-driven FinTech framework is proposed and five technical aspects are summarized and involved.
Posted Content

A Survey on 5G: The Next Generation of Mobile Communication

TL;DR: In this article, the authors investigate and discuss serious limitations of the fourth generation (4G) cellular networks and corresponding new features of 5G networks, and present a comparative study of the proposed architectures that can be categorized on the basis of energy-efficiency, network hierarchy, and network types.
Journal ArticleDOI

Fog computing security: a review of current applications and security solutions

TL;DR: The impact of security issues and possible solutions are determined, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
References
More filters
Journal ArticleDOI

Mobile cloud computing

TL;DR: This paper provides an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud Computing, and presents a taxonomy based on the key issues in this area, and discusses the different approaches taken to tackle these issues.
Journal ArticleDOI

Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?

TL;DR: The cloud heralds a new era of computing where application services are provided through the Internet, but is it the ultimate solution for extending such systems' battery lifetimes?
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TL;DR: Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.

SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)

TL;DR: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
Book

Principles of Information Security

TL;DR: Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers.
Related Papers (5)