scispace - formally typeset
Search or ask a question
Dissertation

Joint Honeypot Networks and Hybrid Intrusion Detection System for Mobile Cloud Computing

TL;DR: The implemented algorithm can be used for high-security cloud environment that is developed for army and banking purposes to monitor the network's activities effectively and offers clear potential for any further research work in the cloud-based Intrusion Detection System.
Abstract: The growing smartphone technology and emerging mobile cloud technology are the latest wireless technology. Mobile cloud computing has many of the advantages that look forward to the future and it's also simple for hackers to take full control of many other users Privacy of Data. While data security is expected to be secured, the main drawback for users when the computer is connected to the internet it's not that difficult for an intruder to engage in a data theft on the required target. So, for providing better security the combination of Hybrid Intrusion Detection System (HyInt) and Honeypot networks is thus implemented into Mobile Cloud Environment with the significant purpose of mitigating unidentified and known attacks in order to provide security. Execution of the research work provides a pure perspective of the security and quality products of the algorithm that was not included in the previous research work. As part of the research work, intensive statistical analysis was performed to prove the consistency of the proposed algorithm. The implementation and evaluation outcome offers clear potential for any further research work in the cloud-based Intrusion Detection System. The implemented algorithm can be used for high-security cloud environment that is developed for army and banking purposes to monitor the network's activities effectively.
References
More filters
Journal ArticleDOI
TL;DR: The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration.

1,045 citations

Proceedings ArticleDOI
23 Mar 2012
TL;DR: This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle and describes future research work about dataSecurity and privacy Protection issues in cloud.
Abstract: It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn't move them to cloud. The market size the cloud computing shared is still far behind the one expected. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle. Then this paper discusses some current solutions. Finally, this paper describes future research work about data security and privacy protection issues in cloud.

654 citations

Journal ArticleDOI
TL;DR: The main security and privacy challenges in this field which have grown much interest among the academia and research community are presented and corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges.

221 citations


"Joint Honeypot Networks and Hybrid ..." refers background or methods in this paper

  • ...[1] [5] Security frameworks for Mobile Cloud Computing (MCC) is classified into two groups, application security and data security frameworks, storing data on a database in a virtual environment without revealing any details is more difficult for mobile users....

    [...]

  • ...[5] [7] By using authentication techniques, potential ransomware will prevent the use of conventional HIDS based on signature matching methods....

    [...]

Journal ArticleDOI
TL;DR: A threat model and attack taxonomy in cloud environment to elucidate the vulnerabilities in cloud and provide a deep insight into Virtual Machine Introspection and Hypervisor Introspection based techniques in the survey.

161 citations


"Joint Honeypot Networks and Hybrid ..." refers methods in this paper

  • ...Wang et al suggested a methodology that relates to the central management approach, even though it has the drawbacks of all strategies that use centralized control in a distributed environment [10], Similarly, Modi et al initiated a method for a stepwise detection of intrusion....

    [...]

Journal ArticleDOI
TL;DR: It is concluded that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.
Abstract: Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system IDS is an efficient approach for protecting wireless communications in the Fifth Generation 5G context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright © 2015John Wiley & Sons, Ltd.

159 citations


"Joint Honeypot Networks and Hybrid ..." refers methods in this paper

  • ...[4] The below Figure 1 shows a design of the MCC process, the core techniques used in the technology industry like parallelization model, virtualization and mass production are the three primary techniques for cloud computing....

    [...]