Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

This paper reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The review identifies the drawbacks in existing solutions and proposes a novel approach towards enhancing the security of the User Lay...

Full description

Bibliographic Details
Main Authors: Ogwara, NO (Author), Petrova, K (Author), Yang, MLB (Author), MacDonell, SG (Author)
Format: Others
Published: arXiv, 2021-08-10T00:47:02Z.
Subjects:
Online Access:Get fulltext
LEADER 01559 am a22001933u 4500
001 14413
042 |a dc 
100 1 0 |a Ogwara, NO  |e author 
700 1 0 |a Petrova, K  |e author 
700 1 0 |a Yang, MLB  |e author 
700 1 0 |a MacDonell, SG  |e author 
245 0 0 |a Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach 
260 |b arXiv,   |c 2021-08-10T00:47:02Z. 
500 |a arXiv:2012.08042 
520 |a This paper reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The review identifies the drawbacks in existing solutions and proposes a novel approach towards enhancing the security of the User Layer (UL) in the MCC environment. The approach named MINDPRES (Mobile- Cloud Intrusion Detection and Prevention System) combines a host-based IDS and network-based IDS using Machine Learning (ML) techniques. It applies dynamic analysis of both device resources and network traffic in order to detect malicious activities at the UL in the MCC environment. Preliminary investigations show that our approach will enhance the security of the UL in the MCC environment. Our future work will include the development and the evaluation of the proposed model across the various mobile platforms in the MCC environment. 
540 |a OpenAccess 
650 0 4 |a Mobile Cloud Computing; Data Security; Intrusion Detection System; User Layer; MINDPRES 
655 7 |a Conference Contribution 
856 |z Get fulltext  |u http://hdl.handle.net/10292/14413