Abstract
This chapter reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The review identifies the drawbacks in existing solutions and proposes a novel approach towards enhancing the security of the User Layer (UL) in the MCC environment. The approach named MINDPRES (Mobile-Cloud Intrusion Detection and Prevention System) combines a host-based IDS and network-based IDS using Machine Learning (ML) techniques. It applies dynamic analysis of both device resources and network traffic in order to detect malicious activities at the UL in the MCC environment. Preliminary investigations show that our approach will enhance the security of the UL in the MCC environment. Our future work will include the development and the evaluation of the proposed model across the various mobile platforms in the MCC environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Alizadeh, S. Abolfazli, M. Zamani, S. Baaaharun, K. Sakurai, Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. (2016). https://doi.org/10.1016/j.jnca.2015.10.005
Vishal, B. Kaur, S. Jangra, Assessment of different security issues, threats with their detection and prevention security models in Mobile Cloud Computing (MCC), in Communications in Computer and Information Science, (2019). https://doi.org/10.1007/978-981-13-3143-5_27
T. Bhatia, A.K. Verma, Data security in mobile cloud computing paradigm: A survey, taxonomy and open research issues. J. Supercomput. (2017). https://doi.org/10.1007/s11227-016-1945-y
K. Zkik, G. Orhanou, S. El Hajji, Secure mobile multi cloud architecture for authentication and data storage. Int. J. Cloud Appl. Comput. (2017). https://doi.org/10.4018/ijcac.2017040105
M.B. Mollah, M.A.K. Azad, A. Vasilakos, Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl. (2017). https://doi.org/10.1016/j.jnca.2017.02.001
T.H. Noor, S. Zeadally, A. Alfazi, Q.Z. Sheng, Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. (2018). https://doi.org/10.1016/j.jnca.2018.04.018
S.K. Khatri, Monica, V.R. Vadi, Biometrie based authentication and access control techniques to secure mobile cloud computing, in 2nd International Conference on Telecommunication and Networks, TEL-NET 2017, (2018). https://doi.org/10.1109/TEL-NET.2017.8343558
L.T. Chean, V. Ponnusamy, S.M. Fati, Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing, in ISCAIE 2018–2018 IEEE Symposium on Computer Applications and Industrial Electronics, (2018). https://doi.org/10.1109/ISCAIE.2018.8405469
N. Agrawal, S. Tapaswi, A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mob. Comput. (2019). https://doi.org/10.1016/j.pmcj.2018.11.003
Y. Shi, S. Abhilash, K. Hwang, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Proceedings – 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015, p. 2015. https://doi.org/10.1109/MobileCloud.2015.15
J. Walls, K.K.R. Choo, A review of free cloud-based anti-malware apps for android, in Proceedings – 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, (2015). https://doi.org/10.1109/Trustcom.2015.482
R. Kumar, R. Goyal, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Comput. Sci. Rev. (2019). https://doi.org/10.1016/j.cosrev.2019.05.002
F. Idrees, M. Rajarajan, M. Conti, T.M. Chen, Y. Rahulamathavan, PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. (2017). https://doi.org/10.1016/j.cose.2017.03.011
Gartner Inc., Gartner says global smartphone sales to only grow 7 per cent in 2016, 2016
N.O. Ogwara, K. Petrova, M.L.B. Yang, Data security frameworks for mobile cloud computing, in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) IEEE, pp. 1–4
Z. Inayat, A. Gani, N.B. Anuar, S. Anwar, M.K. Khan, Cloud-based intrusion detection and response system: Open research issues, and solutions. Arab. J. Sci. Eng. (2017). https://doi.org/10.1007/s13369-016-2400-3
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. (2013). https://doi.org/10.1016/j.jnca.2012.05.003
J. Wu, L. Ding, Y. Wu, N. Min-Allah, S.U. Khan, Y. Wang, C2Detector: A covert channel detection framework in cloud computing. Secur. Commun. Netw. (2014). https://doi.org/10.1002/sec.754
A. Patel, M. Taghavi, K. Bakhtiyari, J. Celestino Júnior, An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. (2013). https://doi.org/10.1016/j.jnca.2012.08.007
S.N. Dhage, B.B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra, Intrusion detection system in cloud computing environment, in International Conference and Workshop on Emerging Trends in Technology 2011, ICWET 2011 – Conference Proceedings, (2011). https://doi.org/10.1145/1980022.1980076
A. Houmansadr, S.A. Zonouz, R. Berthier, A cloud-based intrusion detection and response system for mobile phones, in Proceedings of the International Conference on Dependable Systems and Networks, (2011). https://doi.org/10.1109/DSNW.2011.5958860
N. Ulltveit-Moe, V.A. Oleshchuk, G.M. Køien, Location-aware mobile intrusion detection with enhanced privacy in a 5G context. Wirel. Pers. Commun. (2011). https://doi.org/10.1007/s11277-010-0069-6
C. Modi, D. Patel, B. Borisanya, A. Patel, M. Rajarajan, A novel framework for intrusion detection in cloud, in Proceedings of the 5th International Conference on Security of Information and Networks, SIN’12, (2012). https://doi.org/10.1145/2388576.2388585
R.S. Khune, J. Thangakumar, A cloud-based intrusion detection system for Android smartphones, in 2012 International Conference on Radar, Communication and Computing, ICRCC 2012, p. 2012. https://doi.org/10.1109/ICRCC.2012.6450572
W. Yan, CAS: A framework of online detecting advance malware families for cloud-based security, in 2012 1st IEEE International Conference on Communications in China, ICCC 2012, (2012). https://doi.org/10.1109/ICCChina.2012.6356881
W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.T. Abdullah, A cloud-based intrusion detection service framework, in Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, (2012). https://doi.org/10.1109/CyberSec.2012.6246098
M. Ficco, S. Venticinque, B. Di Martino, mOSAIC-based intrusion detection framework for cloud computing, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2012). https://doi.org/10.1007/978-3-642-33615-7_12
N.D. Man, E.N. Huh, A collaborative intrusion detection system framework for cloud computing, in Lecture Notes in Electrical Engineering, (2012). https://doi.org/10.1007/978-94-007-2911-7_8
A. Patel, M. Taghavi, K. Bakhtiyari, J. Celestino, Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2012). https://doi.org/10.1007/978-3-642-35362-8_33
R. Roshandel, P. Arabshahi, R. Poovendran, LIDAR: A layered intrusion detection and remediationframework for smartphones, in ISARCS 2013 – Proceedings of the 4th ACM Sigsoft International Symposium on Architecting Critical Systems, (2013). https://doi.org/10.1145/2465470.2465475
A. Dolgikh, Z. Birnbaum, Y. Chen, V. Skormin, Behavioral modeling for suspicious process detection in cloud computing environments, in Proceedings – IEEE International Conference on Mobile Data Management, (2013). https://doi.org/10.1109/MDM.2013.90
S. Yazji, P. Scheuermann, R.P. Dick, G. Trajcevski, R. Jin, Efficient location aware intrusion detection to protect mobile devices, in Personal and Ubiquitous Computing, (2014). https://doi.org/10.1007/s00779-012-0628-9
J. Milosevic, A. Dittrich, A. Ferrante, M. Malek, A resource-optimized approach to efficient early detection of mobile malware, in Proceedings – 9th International Conference on Availability, Reliability and Security, ARES 2014, (2014). https://doi.org/10.1109/ARES.2014.51
J. Li, L. Zhai, X. Zhang, D. Quan, Research of android malware detection based on network traffic monitoring, in Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014, (2014). https://doi.org/10.1109/ICIEA.2014.6931449
F. Idrees, R. Muttukrishnan, War against mobile malware with cloud computing and machine learning forces, in 2014 IEEE 3rd International Conference on Cloud Networking, CloudNet 2014, (2014). https://doi.org/10.1109/CloudNet.2014.6969008
S. Manthira Moorthy, M. Roberts Masillamani, Intrusion detection in cloud computing implementation of (SAAS and IAAS) using grid environment, in Advances in Intelligent Systems and Computing, (2014). https://doi.org/10.1007/978-81-322-1299-7_6
V.A. Pandian, T.G. Kumar, A novel cloud based NIDPS for smartphones, in Communications in Computer and Information Science, (2014). https://doi.org/10.1007/978-3-642-54525-2_42
Y. Qi, M. Cao, C. Zhang, R. Wu, A design of network behavior-based malware detection system for android, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2014). https://doi.org/10.1007/978-3-319-11194-0_52
M. Kumar, M. Hanumanthappa, Cloud based intrusion detection architecture for smartphones, in ICIIECS 2015–2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems, (2015). https://doi.org/10.1109/ICIIECS.2015.7193252
T.M. Marengereke, K. Sornalakshmi, Cloud based security solution for android smartphones, in IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015, (2015). https://doi.org/10.1109/ICCPCT.2015.7159512
Y. Mehmood, M.A. Shibli, A. Kanwal, R. Masood, Distributed intrusion detection system using mobile agents in cloud computing environment, in Proceedings – 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, (2016). https://doi.org/10.1109/CIACS.2015.7395559
H. Toumi, M. Talea, K. Sabiri, A. Eddaoui, Toward a trusted framework for cloud computing, in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, (2015). https://doi.org/10.1109/CloudTech.2015.7337013
A. Fischer et al., CloudIDEA: A malware defense architecture for cloud data centers, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2015). https://doi.org/10.1007/978-3-319-26148-5_40
C.N. Modi, network intrusion detection in cloud computing, in Emerging Research in Computing, Information, Communication and Applications, (2015)
T. Singh, S. Verma, V. Kulshrestha, S. Katiyar, Intrusion detection system using genetic algorithm for cloud, in ACM International Conference Proceeding Series, (2016). https://doi.org/10.1145/2905055.2905175
S. Hou, A. Saas, L. Chen, Y. Ye, Deep4MalDroid: A deep learning framework for android malware detection based on Linux kernel system call graphs, in Proceedings – 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops, WIW 2016, (2017). https://doi.org/10.1109/WIW.2016.15
W.G. Hatcher, D. Maloney, W. Yu, Machine learning-based mobile threat monitoring and detection, in 2016 IEEE/ACIS 14th International Conference on Software Engineering Research, Management and Applications, SERA 2016, (2016). https://doi.org/10.1109/SERA.2016.7516130
T. Dbouk, A. Mourad, H. Otrok, C. Talhi, Towards ad-hoc cloud based approach for mobile intrusion detection, in International Conference on Wireless and Mobile Computing, Networking and Communications, (2016). https://doi.org/10.1109/WiMOB.2016.7763251
H.A. Kholidy, A. Erradi, S. Abdelwahed, F. Baiardi, A risk mitigation approach for autonomous cloud intrusion response system. Computing (2016). https://doi.org/10.1007/s00607-016-0495-8
N. Pandeeswari, G. Kumar, Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Networks Appl. (2016). https://doi.org/10.1007/s11036-015-0644-x
U. Nagar, X. He, P. Nanda, Z. Tan, A framework for data security in cloud using collaborative intrusion detection scheme, in ACM International Conference Proceeding Series, (2017). https://doi.org/10.1145/3136825.3136905
F. Tong, Z. Yan, A hybrid approach of mobile malware detection in android. J. Parallel Distrib. Comput. (2017). https://doi.org/10.1016/j.jpdc.2016.10.012
A. Nezarat, A game theoretic method for VM-To-hypervisor attacks detection in cloud environment, in Proceedings – 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017, (2017). https://doi.org/10.1109/CCGRID.2017.138
D. Moloja, N. Mpekoa, Towards a cloud intrusion detection and prevention system for M-voting in South Africa, in International Conference on Information Society, i-Society 2017, (2018). https://doi.org/10.23919/i-Society.2017.8354666
V. Balamurugan, R. Saravanan, Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Comput. (2019). https://doi.org/10.1007/s10586-017-1187-7
H. Idrissi, M. Ennahbaoui, S. El Hajji, E.M. Souidi, A secure cloud-based IDPS using cryptographic traces and revocation protocol, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2017). https://doi.org/10.1007/978-3-319-55589-8_24
A. Nezarat, Y. Shams, A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J. Supercomput. (2017). https://doi.org/10.1007/s11227-017-2025-7
S. Raja, S. Ramaiah, An efficient fuzzy-based hybrid system to cloud intrusion detection. Int. J. Fuzzy Syst. (2017). https://doi.org/10.1007/s40815-016-0147-3
S. Velliangiri, J. Premalatha, Intrusion detection of distributed denial of service attack in cloud. Cluster Comput. (2019). https://doi.org/10.1007/s10586-017-1149-0
A.S. Sohal, R. Sandhu, S.K. Sood, V. Chang, A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. (2018). https://doi.org/10.1016/j.cose.2017.08.016
Y. Li, M. Du, J. Xu, A new distributed intrusion detection method based on immune mobile agent, in Proceedings – 2018 6th International Conference on Advanced Cloud and Big Data, CBD 2018, (2018). https://doi.org/10.1109/CBD.2018.00046
S. Ghribi, A.M. Makhlouf, F. Zarai, C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment, in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, (2018). https://doi.org/10.1109/IWCMC.2018.8450478
K.K. Nguyen, D.T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, Cyberattack detection in mobile cloud computing: A deep learning approach, in IEEE Wireless Communications and Networking Conference, WCNC, (2018). https://doi.org/10.1109/WCNC.2018.8376973
S. Ravji, M. Ali, Integrated intrusion detection and prevention system with honeypot in cloud computing, in Proceedings – 2018 International Conference on Computing, Electronics and Communications Engineering, iCCECE 2018, (2019). https://doi.org/10.1109/iCCECOME.2018.8658593
T. Qin, R. Chen, L. Wang, C. He, LMHADC: Lightweight method for host based anomaly detection in cloud using mobile agents, in 2018 IEEE Conference on Communications and Network Security, CNS 2018, (2018). https://doi.org/10.1109/CNS.2018.8433208
O. Achbarou, M.A. El Kiram, O. Bourkoukou, S. Elbouanani, A multi-agent system-based distributed intrusion detection system for a cloud computing, in Communications in Computer and Information Science, (2018). https://doi.org/10.1007/978-3-030-02852-7_9
E. Besharati, M. Naderan, and E. Namjoo, “LR-HIDS: logistic regression host-based intrusion detection system for cloud environments,” J. Ambient Intell. Humaniz. Comput., 2018, doi: https://doi.org/10.1007/s12652-018-1093-8
H. Kim, J. Kim, Y. Kim, I. Kim, K.J. Kim, Design of network threat detection and classification based on machine learning on cloud computing. Cluster Comput. (2019). https://doi.org/10.1007/s10586-018-1841-8
C. Modi, D. Patel, A feasible approach to intrusion detection in virtual network layer of Cloud computing. Sadhana – Acad. Proc. Eng. Sci. (2018). https://doi.org/10.1007/s12046-018-0910-2
K. Peng, L. Zheng, X. Xu, T. Lin, V.C.M. Leung, Balanced iterative reducing and clustering using hierarchies with principal component analysis (PBirch) for intrusion detection over big data in mobile cloud environment, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2018). https://doi.org/10.1007/978-3-030-05345-1_14
R. Rajendran, S.V.N. Santhosh Kumar, Y. Palanichamy, K. Arputharaj, Detection of DoS attacks in cloud networks using intelligent rule based classification system. Cluster Comput. (2019). https://doi.org/10.1007/s10586-018-2181-4
J. Ribeiro, G. Mantas, F.B. Saghezchi, J. Rodriguez, S.J. Shepherd, R.A. Abd-Alhameed, Towards an autonomous host-based intrusion detection system for android mobile devices, in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, (2019). https://doi.org/10.1007/978-3-030-05195-2_14
S. Dey, Q. Ye, S. Sampalli, A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Inf. Fusion (2019). https://doi.org/10.1016/j.inffus.2019.01.002
Y. Weng, L. Liu, A collective anomaly detection approach for multidimensional streams in mobile service security. IEEE Access (2019). https://doi.org/10.1109/ACCESS.2019.2909750
J. Ribeiro, F.B. Saghezchi, G. Mantas, J. Rodriguez, S.J. Shepherd, R.A. Abd-Alhameed, An autonomous host-based intrusion detection system for android mobile devices. Mob. Netw. Appl. (2020). https://doi.org/10.1007/s11036-019-01220-y
Q. Zhou, F. Feng, Z. Shen, R. Zhou, M.Y. Hsieh, K.C. Li, A novel approach for mobile malware classification and detection in Android systems. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-018-6498-z
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogwara, N.O., Petrova, K., Yang, M.L.(., MacDonell, S. (2021). Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-71017-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71016-3
Online ISBN: 978-3-030-71017-0
eBook Packages: EngineeringEngineering (R0)