Skip to main content

Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing


Diverse researches following the advancement of IT technology and emergence of smart devices are common in current research. In particular, the most commercialized smart device, the smart phone, provides convenient communication among users due to easy portability and real-time information sharing within a diverse system. Moreover, spatial and temporal use of smart devices greatly increased because these devices are capable of performing the same functions as a desktop personal computer, making smart phones extremely popular. However, research on smart phones has mainly focused on the convenience of the services offered on these devices, while the issue of security has been neglected. Smart phones are vulnerable to diverse, malicious attacks, which have increased as new functions are developed and commonly used. For this reason, a number of applications were developed to detect a variety of malicious codes in smart phones and prevent private information leakage. However, due to the difficulties of recognizing and responding to attacks, such as advanced persistent threats (APTs), an intelligent security model is urgently required. This paper suggests intelligent security model of smart phone based on human behavior in mobile cloud computing to detect diverse types of malicious code in smart phones and respond to advanced attacks, such as APTs. The suggested intelligent security model of smart phone securely protects users from private information leaks and illegal billing action. Moreover, intelligent response to malicious, difficult-to-detect code is provided by a user behavior-based intelligent analysis, which makes it possible to shut down network, registry, drive, and system accessibility and to notify users to respond to malicious attacks.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4


  1. Jeong, Y.-S., Kim, H.-W., & Jang, H. J. (2013). Adaptive resource management scheme for monitoring of CPS. Journal of Supercomputing, 66(1), 57–69.

    Article  Google Scholar 

  2. Gil, J.-M., Park, J. H., & Jeong, Y.-S. (2013). Data center selection based on neuro-fuzzy inference systems in cloud computing environments. Journal of Supercomputing, 66(3), 1194–1214.

    Article  Google Scholar 

  3. Pattaranantakul, M., Sanguannam, K., Sangwongngam, P., & Vorakulpipat, C. (2015). Efficient key management protocol for secure RTMP video streaming toward trusted quantum network. ETRI Journal, 37(4), 696–706.

    Article  Google Scholar 

  4. Degefa, F. B., & Won, D. (2013). Extended key management scheme for dynamic group in multi-cast communication. Journal of Convergence, 4(4), 7–13.

    Article  Google Scholar 

  5. Malkawi, M. I. (2013). The art of software systems development: Reliability, availability, maintainability, performance (RAMP). Human-Centric Computing and Information Sciences, 3(22), 1–17.

    Google Scholar 

  6. Lee, S.-H., & Lee, I.-Y. (2013). A secure index management scheme for providing data sharing in cloud storage. Journal of Information Processing Systems, 9(2), 287–300.

    Article  Google Scholar 

  7. Shrivastava, N., & Kumar, G. (2013). A survey on cost effective multi-cloud storage in cloud computing. International Journal of Advanced Research in Computer Engineering and Technology, 2(4), 1405–1409.

    Google Scholar 

  8. Truong, T.-T., Tran, M.-T., & Duong, A.-D. (2012). Improvement of the more efficient & secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. Journal of Convergence, 3(2), 25–36.

    Google Scholar 

  9. Dahane, A., Berrached, N.-E., & Loukil, A. (2015). A virtual laboratory to practice mobile wireless sensor networks: A case study on energy efficient and safe weighted clustering algorithm. Journal of Information Processing Systems, 11(2), 205–228.

    Google Scholar 

  10. Singh, R., Singh, P., & Duhan, M. (2014). An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-Centric Computing and Information Sciences, 4(7), 1–14.

    Google Scholar 

  11. Kim, H.-W., Kim, J.-H., Park, J. H., & Jeong, Y.-S. (2014). Time pattern locking scheme for secure multimedia contents in human-centric device. The Scientific World Journal, 2014, 1–9.

    Google Scholar 

  12. Gaonkar, P. E., Bojewar, S., & Das, J. A. (2013). A survey: Data storage technologies. International Journal of Engineering Science and Innovative Technology, 2(2), 547–554.

    Google Scholar 

  13. Dong, B., Zheng, Q., Tian, F., Chao, K., Ma, R., & Anane, R. (2012). An optimized approach for storing and accessing small files on cloud storage. Journal of Network and Computer Applications, 35(6), 1847–1862.

    Article  Google Scholar 

  14. Chattopadhyay, M., Dan, P. K., & Mazumdar, S. (2014). Comparison of visualization of optimal clustering using self-organizing map and growing hierarchical self-organizing map in cellular manufacturing system. Applied Soft Computing, 22, 528–543.

    Article  Google Scholar 

  15. Mohammed, J. (2014). Evolution of the next generation of technologies: Mobile and ubiquitous computing. International Journal of Advanced Research in Science, Engineering and Technology, 1(5), 247–253.

    Google Scholar 

  16. Park, J. H., Kim, H.-W., & Jeong, Y.-S. (2014). Efficiency sustainability resource visual simulator for clustered desktop virtualization based on cloud infrastructure. Sustainability, 6, 8079–8091.

    Article  Google Scholar 

  17. Kim, H.-W., Park, J. H., & Jeong, Y.-S. (2015). Human-centric storage resource mechanism for big data on cloud service architecture. Journal of Supercomputing. doi:10.1007/s11227-015-1390-3.

  18. Duan, H., Yu, S., Mei, M., Zhan, W., & Li, L. (2015). CSTORE: A desktop-oriented distributed public cloud storage system. Computers and Electrical Engineering. doi:10.1016/j.compeleceng.2014.11.001.

  19. Suarez-Tangil, G., Conti, M. (2014). Detecting targeted smart phone malware with behavior-triggering stochastic models. In Proceedings of 19th European symposium on research in computer security, 7–11 (pp. 183–201). Wroclaw, Poland.

  20. Raveendranath, R., Rajamani, V., & Datta, S. K. (2014) Android malware attacks and countermeasures: Current and future directions. In Proceedings of 2014 international conference on control, instrumentation, communication and computational technologies, 10–11 (pp. 137–143). IEEE, Kanyakumari.

  21. Luo, T., Hao, H., Du, W., Wang, Y., & Yin, H. (2011). Attacks on WebView in the android system. In Proceedings of 27th annual computer security applications conference, 5–9 (pp. 343–352). Orlando, FL, USA.

  22. Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In Proceedings of 2012 IEEE symposium on security and privacy, 20–23 (pp. 95–109). IEEE, San Francisco, CA.

  23. Kim, H., Smith, J., & Shin, K. G. (2010). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the international conference on mobile systems, applications, and services, 15–18 (pp. 239–252). ACM, Breckenridge, Colorado, USA.

  24. Mu, J., Cui, A., & Rao, J. (2013). Android mobile security-threats and protection. In Proceedings of international conference on computer, networks and communication engineering (ICCNCE 2013), 23–24 (pp. 683–686). Atlantis Press, Beijing, China.

  25. Louk, M., Lim, H., & Lee, H. (2014). An Analysis of security system for intrusion in smart phone environment. The Scientific World Journal, 2014 (pp. 1–12), Article ID 983901.

  26. Mohd Foozy, C. F., Ahmad, R., & Abdollah, M. F. (2013). Phishing detection taxonomy for mobile device. International Journal of Computer Science Issues, 10(1), 338–344.

    Google Scholar 

  27. Seo, S.-H., Gupta, A., Sallam, A. M., Bertino, E., & Yim, K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38, 43–53.

    Article  Google Scholar 

Download references


This work was supported by Institute for Information and Communications Technology Promotion (IITP) Grant funded by the Korea government (MSIP) (No. B0101-15-1293, Cyber targeted attack recognition and trace-back technology based-on long-term historic analysis of multi-source data).

Author information

Authors and Affiliations


Corresponding authors

Correspondence to Jong Hyuk Park or Young-Sik Jeong.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Moon, D., Kim, I., Joo, J.W. et al. Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing. Wireless Pers Commun 91, 1697–1710 (2016).

Download citation

  • Published:

  • Issue Date:

  • DOI:


  • Advanced persistent threat
  • Authentication
  • Intelligent security model
  • Mobile cloud computing