Skip to main content

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

  • Conference paper
  • First Online:
Advances in Security, Networks, and Internet of Things

Abstract

This chapter reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The review identifies the drawbacks in existing solutions and proposes a novel approach towards enhancing the security of the User Layer (UL) in the MCC environment. The approach named MINDPRES (Mobile-Cloud Intrusion Detection and Prevention System) combines a host-based IDS and network-based IDS using Machine Learning (ML) techniques. It applies dynamic analysis of both device resources and network traffic in order to detect malicious activities at the UL in the MCC environment. Preliminary investigations show that our approach will enhance the security of the UL in the MCC environment. Our future work will include the development and the evaluation of the proposed model across the various mobile platforms in the MCC environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. M. Alizadeh, S. Abolfazli, M. Zamani, S. Baaaharun, K. Sakurai, Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. (2016). https://doi.org/10.1016/j.jnca.2015.10.005

  2. Vishal, B. Kaur, S. Jangra, Assessment of different security issues, threats with their detection and prevention security models in Mobile Cloud Computing (MCC), in Communications in Computer and Information Science, (2019). https://doi.org/10.1007/978-981-13-3143-5_27

    Chapter  Google Scholar 

  3. T. Bhatia, A.K. Verma, Data security in mobile cloud computing paradigm: A survey, taxonomy and open research issues. J. Supercomput. (2017). https://doi.org/10.1007/s11227-016-1945-y

  4. K. Zkik, G. Orhanou, S. El Hajji, Secure mobile multi cloud architecture for authentication and data storage. Int. J. Cloud Appl. Comput. (2017). https://doi.org/10.4018/ijcac.2017040105

  5. M.B. Mollah, M.A.K. Azad, A. Vasilakos, Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl. (2017). https://doi.org/10.1016/j.jnca.2017.02.001

  6. T.H. Noor, S. Zeadally, A. Alfazi, Q.Z. Sheng, Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. (2018). https://doi.org/10.1016/j.jnca.2018.04.018

  7. S.K. Khatri, Monica, V.R. Vadi, Biometrie based authentication and access control techniques to secure mobile cloud computing, in 2nd International Conference on Telecommunication and Networks, TEL-NET 2017, (2018). https://doi.org/10.1109/TEL-NET.2017.8343558

    Chapter  Google Scholar 

  8. L.T. Chean, V. Ponnusamy, S.M. Fati, Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing, in ISCAIE 2018–2018 IEEE Symposium on Computer Applications and Industrial Electronics, (2018). https://doi.org/10.1109/ISCAIE.2018.8405469

    Chapter  Google Scholar 

  9. N. Agrawal, S. Tapaswi, A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mob. Comput. (2019). https://doi.org/10.1016/j.pmcj.2018.11.003

  10. Y. Shi, S. Abhilash, K. Hwang, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in Proceedings – 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015, p. 2015. https://doi.org/10.1109/MobileCloud.2015.15

  11. J. Walls, K.K.R. Choo, A review of free cloud-based anti-malware apps for android, in Proceedings – 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, (2015). https://doi.org/10.1109/Trustcom.2015.482

    Chapter  Google Scholar 

  12. R. Kumar, R. Goyal, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Comput. Sci. Rev. (2019). https://doi.org/10.1016/j.cosrev.2019.05.002

  13. F. Idrees, M. Rajarajan, M. Conti, T.M. Chen, Y. Rahulamathavan, PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. (2017). https://doi.org/10.1016/j.cose.2017.03.011

  14. Gartner Inc., Gartner says global smartphone sales to only grow 7 per cent in 2016, 2016

    Google Scholar 

  15. N.O. Ogwara, K. Petrova, M.L.B. Yang, Data security frameworks for mobile cloud computing, in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) IEEE, pp. 1–4

    Google Scholar 

  16. Z. Inayat, A. Gani, N.B. Anuar, S. Anwar, M.K. Khan, Cloud-based intrusion detection and response system: Open research issues, and solutions. Arab. J. Sci. Eng. (2017). https://doi.org/10.1007/s13369-016-2400-3

  17. C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. (2013). https://doi.org/10.1016/j.jnca.2012.05.003

  18. J. Wu, L. Ding, Y. Wu, N. Min-Allah, S.U. Khan, Y. Wang, C2Detector: A covert channel detection framework in cloud computing. Secur. Commun. Netw. (2014). https://doi.org/10.1002/sec.754

  19. A. Patel, M. Taghavi, K. Bakhtiyari, J. Celestino Júnior, An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. (2013). https://doi.org/10.1016/j.jnca.2012.08.007

  20. S.N. Dhage, B.B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra, Intrusion detection system in cloud computing environment, in International Conference and Workshop on Emerging Trends in Technology 2011, ICWET 2011 – Conference Proceedings, (2011). https://doi.org/10.1145/1980022.1980076

    Chapter  Google Scholar 

  21. A. Houmansadr, S.A. Zonouz, R. Berthier, A cloud-based intrusion detection and response system for mobile phones, in Proceedings of the International Conference on Dependable Systems and Networks, (2011). https://doi.org/10.1109/DSNW.2011.5958860

    Chapter  Google Scholar 

  22. N. Ulltveit-Moe, V.A. Oleshchuk, G.M. Køien, Location-aware mobile intrusion detection with enhanced privacy in a 5G context. Wirel. Pers. Commun. (2011). https://doi.org/10.1007/s11277-010-0069-6

  23. C. Modi, D. Patel, B. Borisanya, A. Patel, M. Rajarajan, A novel framework for intrusion detection in cloud, in Proceedings of the 5th International Conference on Security of Information and Networks, SIN’12, (2012). https://doi.org/10.1145/2388576.2388585

    Chapter  Google Scholar 

  24. R.S. Khune, J. Thangakumar, A cloud-based intrusion detection system for Android smartphones, in 2012 International Conference on Radar, Communication and Computing, ICRCC 2012, p. 2012. https://doi.org/10.1109/ICRCC.2012.6450572

  25. W. Yan, CAS: A framework of online detecting advance malware families for cloud-based security, in 2012 1st IEEE International Conference on Communications in China, ICCC 2012, (2012). https://doi.org/10.1109/ICCChina.2012.6356881

    Chapter  Google Scholar 

  26. W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.T. Abdullah, A cloud-based intrusion detection service framework, in Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, (2012). https://doi.org/10.1109/CyberSec.2012.6246098

    Chapter  Google Scholar 

  27. M. Ficco, S. Venticinque, B. Di Martino, mOSAIC-based intrusion detection framework for cloud computing, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2012). https://doi.org/10.1007/978-3-642-33615-7_12

    Chapter  Google Scholar 

  28. N.D. Man, E.N. Huh, A collaborative intrusion detection system framework for cloud computing, in Lecture Notes in Electrical Engineering, (2012). https://doi.org/10.1007/978-94-007-2911-7_8

    Chapter  Google Scholar 

  29. A. Patel, M. Taghavi, K. Bakhtiyari, J. Celestino, Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2012). https://doi.org/10.1007/978-3-642-35362-8_33

    Chapter  Google Scholar 

  30. R. Roshandel, P. Arabshahi, R. Poovendran, LIDAR: A layered intrusion detection and remediationframework for smartphones, in ISARCS 2013 – Proceedings of the 4th ACM Sigsoft International Symposium on Architecting Critical Systems, (2013). https://doi.org/10.1145/2465470.2465475

    Chapter  Google Scholar 

  31. A. Dolgikh, Z. Birnbaum, Y. Chen, V. Skormin, Behavioral modeling for suspicious process detection in cloud computing environments, in Proceedings – IEEE International Conference on Mobile Data Management, (2013). https://doi.org/10.1109/MDM.2013.90

    Chapter  Google Scholar 

  32. S. Yazji, P. Scheuermann, R.P. Dick, G. Trajcevski, R. Jin, Efficient location aware intrusion detection to protect mobile devices, in Personal and Ubiquitous Computing, (2014). https://doi.org/10.1007/s00779-012-0628-9

    Chapter  Google Scholar 

  33. J. Milosevic, A. Dittrich, A. Ferrante, M. Malek, A resource-optimized approach to efficient early detection of mobile malware, in Proceedings – 9th International Conference on Availability, Reliability and Security, ARES 2014, (2014). https://doi.org/10.1109/ARES.2014.51

    Chapter  Google Scholar 

  34. J. Li, L. Zhai, X. Zhang, D. Quan, Research of android malware detection based on network traffic monitoring, in Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014, (2014). https://doi.org/10.1109/ICIEA.2014.6931449

    Chapter  Google Scholar 

  35. F. Idrees, R. Muttukrishnan, War against mobile malware with cloud computing and machine learning forces, in 2014 IEEE 3rd International Conference on Cloud Networking, CloudNet 2014, (2014). https://doi.org/10.1109/CloudNet.2014.6969008

    Chapter  Google Scholar 

  36. S. Manthira Moorthy, M. Roberts Masillamani, Intrusion detection in cloud computing implementation of (SAAS and IAAS) using grid environment, in Advances in Intelligent Systems and Computing, (2014). https://doi.org/10.1007/978-81-322-1299-7_6

    Chapter  Google Scholar 

  37. V.A. Pandian, T.G. Kumar, A novel cloud based NIDPS for smartphones, in Communications in Computer and Information Science, (2014). https://doi.org/10.1007/978-3-642-54525-2_42

    Chapter  Google Scholar 

  38. Y. Qi, M. Cao, C. Zhang, R. Wu, A design of network behavior-based malware detection system for android, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2014). https://doi.org/10.1007/978-3-319-11194-0_52

    Chapter  Google Scholar 

  39. M. Kumar, M. Hanumanthappa, Cloud based intrusion detection architecture for smartphones, in ICIIECS 2015–2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems, (2015). https://doi.org/10.1109/ICIIECS.2015.7193252

    Chapter  Google Scholar 

  40. T.M. Marengereke, K. Sornalakshmi, Cloud based security solution for android smartphones, in IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015, (2015). https://doi.org/10.1109/ICCPCT.2015.7159512

    Chapter  Google Scholar 

  41. Y. Mehmood, M.A. Shibli, A. Kanwal, R. Masood, Distributed intrusion detection system using mobile agents in cloud computing environment, in Proceedings – 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, (2016). https://doi.org/10.1109/CIACS.2015.7395559

    Chapter  Google Scholar 

  42. H. Toumi, M. Talea, K. Sabiri, A. Eddaoui, Toward a trusted framework for cloud computing, in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, (2015). https://doi.org/10.1109/CloudTech.2015.7337013

    Chapter  Google Scholar 

  43. A. Fischer et al., CloudIDEA: A malware defense architecture for cloud data centers, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2015). https://doi.org/10.1007/978-3-319-26148-5_40

    Chapter  Google Scholar 

  44. C.N. Modi, network intrusion detection in cloud computing, in Emerging Research in Computing, Information, Communication and Applications, (2015)

    Google Scholar 

  45. T. Singh, S. Verma, V. Kulshrestha, S. Katiyar, Intrusion detection system using genetic algorithm for cloud, in ACM International Conference Proceeding Series, (2016). https://doi.org/10.1145/2905055.2905175

    Chapter  Google Scholar 

  46. S. Hou, A. Saas, L. Chen, Y. Ye, Deep4MalDroid: A deep learning framework for android malware detection based on Linux kernel system call graphs, in Proceedings – 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops, WIW 2016, (2017). https://doi.org/10.1109/WIW.2016.15

    Chapter  Google Scholar 

  47. W.G. Hatcher, D. Maloney, W. Yu, Machine learning-based mobile threat monitoring and detection, in 2016 IEEE/ACIS 14th International Conference on Software Engineering Research, Management and Applications, SERA 2016, (2016). https://doi.org/10.1109/SERA.2016.7516130

    Chapter  Google Scholar 

  48. T. Dbouk, A. Mourad, H. Otrok, C. Talhi, Towards ad-hoc cloud based approach for mobile intrusion detection, in International Conference on Wireless and Mobile Computing, Networking and Communications, (2016). https://doi.org/10.1109/WiMOB.2016.7763251

    Chapter  Google Scholar 

  49. H.A. Kholidy, A. Erradi, S. Abdelwahed, F. Baiardi, A risk mitigation approach for autonomous cloud intrusion response system. Computing (2016). https://doi.org/10.1007/s00607-016-0495-8

  50. N. Pandeeswari, G. Kumar, Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Networks Appl. (2016). https://doi.org/10.1007/s11036-015-0644-x

  51. U. Nagar, X. He, P. Nanda, Z. Tan, A framework for data security in cloud using collaborative intrusion detection scheme, in ACM International Conference Proceeding Series, (2017). https://doi.org/10.1145/3136825.3136905

    Chapter  Google Scholar 

  52. F. Tong, Z. Yan, A hybrid approach of mobile malware detection in android. J. Parallel Distrib. Comput. (2017). https://doi.org/10.1016/j.jpdc.2016.10.012

  53. A. Nezarat, A game theoretic method for VM-To-hypervisor attacks detection in cloud environment, in Proceedings – 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017, (2017). https://doi.org/10.1109/CCGRID.2017.138

    Chapter  Google Scholar 

  54. D. Moloja, N. Mpekoa, Towards a cloud intrusion detection and prevention system for M-voting in South Africa, in International Conference on Information Society, i-Society 2017, (2018). https://doi.org/10.23919/i-Society.2017.8354666

    Chapter  Google Scholar 

  55. V. Balamurugan, R. Saravanan, Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Comput. (2019). https://doi.org/10.1007/s10586-017-1187-7

  56. H. Idrissi, M. Ennahbaoui, S. El Hajji, E.M. Souidi, A secure cloud-based IDPS using cryptographic traces and revocation protocol, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2017). https://doi.org/10.1007/978-3-319-55589-8_24

    Chapter  MATH  Google Scholar 

  57. A. Nezarat, Y. Shams, A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J. Supercomput. (2017). https://doi.org/10.1007/s11227-017-2025-7

  58. S. Raja, S. Ramaiah, An efficient fuzzy-based hybrid system to cloud intrusion detection. Int. J. Fuzzy Syst. (2017). https://doi.org/10.1007/s40815-016-0147-3

  59. S. Velliangiri, J. Premalatha, Intrusion detection of distributed denial of service attack in cloud. Cluster Comput. (2019). https://doi.org/10.1007/s10586-017-1149-0

  60. A.S. Sohal, R. Sandhu, S.K. Sood, V. Chang, A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. (2018). https://doi.org/10.1016/j.cose.2017.08.016

  61. Y. Li, M. Du, J. Xu, A new distributed intrusion detection method based on immune mobile agent, in Proceedings – 2018 6th International Conference on Advanced Cloud and Big Data, CBD 2018, (2018). https://doi.org/10.1109/CBD.2018.00046

    Chapter  Google Scholar 

  62. S. Ghribi, A.M. Makhlouf, F. Zarai, C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment, in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, (2018). https://doi.org/10.1109/IWCMC.2018.8450478

    Chapter  Google Scholar 

  63. K.K. Nguyen, D.T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, Cyberattack detection in mobile cloud computing: A deep learning approach, in IEEE Wireless Communications and Networking Conference, WCNC, (2018). https://doi.org/10.1109/WCNC.2018.8376973

    Chapter  Google Scholar 

  64. S. Ravji, M. Ali, Integrated intrusion detection and prevention system with honeypot in cloud computing, in Proceedings – 2018 International Conference on Computing, Electronics and Communications Engineering, iCCECE 2018, (2019). https://doi.org/10.1109/iCCECOME.2018.8658593

    Chapter  Google Scholar 

  65. T. Qin, R. Chen, L. Wang, C. He, LMHADC: Lightweight method for host based anomaly detection in cloud using mobile agents, in 2018 IEEE Conference on Communications and Network Security, CNS 2018, (2018). https://doi.org/10.1109/CNS.2018.8433208

    Chapter  Google Scholar 

  66. O. Achbarou, M.A. El Kiram, O. Bourkoukou, S. Elbouanani, A multi-agent system-based distributed intrusion detection system for a cloud computing, in Communications in Computer and Information Science, (2018). https://doi.org/10.1007/978-3-030-02852-7_9

    Chapter  Google Scholar 

  67. E. Besharati, M. Naderan, and E. Namjoo, “LR-HIDS: logistic regression host-based intrusion detection system for cloud environments,” J. Ambient Intell. Humaniz. Comput., 2018, doi: https://doi.org/10.1007/s12652-018-1093-8

  68. H. Kim, J. Kim, Y. Kim, I. Kim, K.J. Kim, Design of network threat detection and classification based on machine learning on cloud computing. Cluster Comput. (2019). https://doi.org/10.1007/s10586-018-1841-8

  69. C. Modi, D. Patel, A feasible approach to intrusion detection in virtual network layer of Cloud computing. Sadhana – Acad. Proc. Eng. Sci. (2018). https://doi.org/10.1007/s12046-018-0910-2

  70. K. Peng, L. Zheng, X. Xu, T. Lin, V.C.M. Leung, Balanced iterative reducing and clustering using hierarchies with principal component analysis (PBirch) for intrusion detection over big data in mobile cloud environment, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), (2018). https://doi.org/10.1007/978-3-030-05345-1_14

    Chapter  Google Scholar 

  71. R. Rajendran, S.V.N. Santhosh Kumar, Y. Palanichamy, K. Arputharaj, Detection of DoS attacks in cloud networks using intelligent rule based classification system. Cluster Comput. (2019). https://doi.org/10.1007/s10586-018-2181-4

  72. J. Ribeiro, G. Mantas, F.B. Saghezchi, J. Rodriguez, S.J. Shepherd, R.A. Abd-Alhameed, Towards an autonomous host-based intrusion detection system for android mobile devices, in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, (2019). https://doi.org/10.1007/978-3-030-05195-2_14

    Chapter  Google Scholar 

  73. S. Dey, Q. Ye, S. Sampalli, A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Inf. Fusion (2019). https://doi.org/10.1016/j.inffus.2019.01.002

  74. Y. Weng, L. Liu, A collective anomaly detection approach for multidimensional streams in mobile service security. IEEE Access (2019). https://doi.org/10.1109/ACCESS.2019.2909750

  75. J. Ribeiro, F.B. Saghezchi, G. Mantas, J. Rodriguez, S.J. Shepherd, R.A. Abd-Alhameed, An autonomous host-based intrusion detection system for android mobile devices. Mob. Netw. Appl. (2020). https://doi.org/10.1007/s11036-019-01220-y

  76. Q. Zhou, F. Feng, Z. Shen, R. Zhou, M.Y. Hsieh, K.C. Li, A novel approach for mobile malware classification and detection in Android systems. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-018-6498-z

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noah Oghenfego Ogwara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogwara, N.O., Petrova, K., Yang, M.L.(., MacDonell, S. (2021). Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71017-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71016-3

  • Online ISBN: 978-3-030-71017-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics