Skip to main content

Advanced Security Technique in Presence of Open Communication System and Cyber Era

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2022)

Abstract

This paper presents the modeling and improvement of mobile cloud computing protection and security enhancement in communication system. The era of open and complex communication needs full protection from intruders land nerds which requires new and advance technology to assist the human in order to make the live more comfortable and safe life. The mobile device have become the best friend in daily activity. The mobile device merit working in the situation which can belief for helping the people in enhanced way as important roles. The security of mobile cloud computing from primitive secure level to the complicated one has been investigated in this work. Following attempt to confront of mobile cloud, the actual casing of mobile in term of performance power competence has been studied and improved. The expression of practices mobile cloud computing model is taking advantage of trusted platform module functionality. A new system of remote evidence for safe mobile device in the background of cloud base clarification has been suggested to improve the safety rank. The results show promising methods to support and protect current and future mobile device within cloud network devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sarker, I.H., Kayes, A.S., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data. 7, 41 (2020)

    Google Scholar 

  2. Khoulimi, H., Lahby, M., Benammar, O.: An overview of explainable artificial intelligence for Cyber Security. Stud. Comput. Intell. 31–58 (2022)

    Google Scholar 

  3. Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Sec. Appl. 50,(2020)

    Google Scholar 

  4. Chen, D., Wawrzynski, P., Lv, Z.: Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustain. Cities Soc. 66,(2021)

    Google Scholar 

  5. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł, Cetin, F., Basim, H.N.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62, 82–97 (2020)

    Google Scholar 

  6. Roopak, M., Yun Tian, G., Chambers, J.: Deep learning models for cyber security in IOT Networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). (2019)

    Google Scholar 

  7. Yohanandhan, R.V., Elavarasan, R.M., Manoharan, P., Mihet-Popa, L.: Cyber-physical power system (CPPS): a review on modeling, simulation, and analysis with cyber security applications. IEEE Access 8, 151019–151064 (2020)

    Article  Google Scholar 

  8. Corallo, A., Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts. Comput. Ind. 114, 103165 (2020)

    Google Scholar 

  9. Shaukat, K., et al.: Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13, 2509 (2020)

    Article  Google Scholar 

  10. Ullah, F., et al.: Cyber security threats detection in Internet of Things using deep learning approach. IEEE Access 7, 124379–124389 (2019)

    Article  Google Scholar 

  11. Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018)

    Google Scholar 

  12. Dasgupta, D., Akhtar, Z., Sen, S.: Machine learning in cybersecurity: a comprehensive survey. J. Defense Model. Simul. Appl. Methodol. Technol. 19, 57–106 (2020)

    Google Scholar 

  13. Jalali, M.S., Kaiser, J.P.: Cybersecurity in hospitals: a systematic, Organizational Perspective. J. Med. Internet Res. 20, e10059 (2018)

    Google Scholar 

  14. Xu, S.: Cybersecurity dynamics: a foundation for the Science of Cybersecurity. Proactive and Dynamic Network Defense. 1–31 (2019)

    Google Scholar 

  15. Formosa, P., Wilson, M., Richards, D.: A principlist framework for cybersecurity ethics. Comput. Secur. 109,(2021)

    Google Scholar 

  16. Alnasser, A., Sun, H., Jiang, J.: Cyber security challenges and solutions for V2X communications: a survey. Comput. Netw. 151, 52–67 (2019)

    Article  Google Scholar 

  17. Nafea, R.A., Amin Almaiah, M.: Cyber security threats in cloud: literature review. In: 2021 International Conference on Information Technology (ICIT). (2021)

    Google Scholar 

  18. Zhu, S., Saravanan, V., Muthu, B.A.: Achieving data security and privacy across healthcare applications using cyber security mechanisms. Electron. Libr. 38, 979–995 (2020)

    Article  Google Scholar 

  19. Chadwick, D.W., et al.: A cloud-edge based data security architecture for sharing and analysing cyber threat information. Futur. Gener. Comput. Syst. 102, 710–722 (2020)

    Article  Google Scholar 

  20. Hamid, O.K., Abduljabbar, R.B., Alhyani, N.J.: Fast and robust approach for data security in communication channel using pascal matrix. Indonesian J. Electr. Eng. Comput. Sci. 19, 248 (2020)

    Google Scholar 

  21. Rajasekharaiah, K.M., Dule, C.S., Sudarshan, E.: Cyber security challenges and its emerging trends on latest technologies. In: IOP Conference Series: Materials Science and Engineering. 981, 022062 (2020)

    Google Scholar 

  22. Yang, L., Li, J., Elisa, N., Prickett, T., Chao, F.: Towards big data governance in cybersecurity. Data-Enabled Discov. Appl. 3, 10 (2019)

    Google Scholar 

  23. Abduljabbar, R.B., Hamid, O.K., Alhyani, N.J.: Features of genetic algorithm for plain text encryption. Int. J. Electr. Comput. Eng. (IJECE). 11, 434 (2021)

    Google Scholar 

  24. Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310–222354 (2020)

    Article  Google Scholar 

  25. Jiang, Y., Atif, Y.: A selective ensemble model for Cognitive Cybersecurity analysis. J. Netw. Comput. Appl. 193, 103210 (2021)

    Article  Google Scholar 

  26. Gawade, A., Shekokar, N.M.: Impact of cyber security threats on IOT Applications. Cyber Security Threats and Challenges Facing Human Life. 71–80 (2022)

    Google Scholar 

  27. Salih, A., Zeebaree, S.T., Ameen, S., Alkhyyat, A., Shukur, H.M.: A survey on the role of Artificial Intelligence, Machine Learning and deep learning for cybersecurity attack detection. In: 2021 7th International Engineering Conference Research and Innovation amid Global Pandemic (IEC). (2021)

    Google Scholar 

  28. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., Basim, H.N.: Cyber Security Awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62, 82–97 (2020).

    Google Scholar 

  29. Mendhurwar, S., Mishra, R.: Integration of social and IOT technologies: architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 15, 565–584 (2019)

    Article  Google Scholar 

  30. Mantha, B.R.K., de Soto, B.G.: Cyber security challenges and vulnerability assessment in the construction industry. In: Proceedings of the Creative Construction Conference 2019. (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oday Kamil Hamid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hamid, O.K., Abduljabbar, R.B., Dawood, A.Q., Naghmash, M.S., Alhyani, N.J. (2023). Advanced Security Technique in Presence of Open Communication System and Cyber Era. In: Al-Sharafi, M.A., Al-Emran, M., Al-Kabi, M.N., Shaalan, K. (eds) Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. ICETIS 2022. Lecture Notes in Networks and Systems, vol 584. Springer, Cham. https://doi.org/10.1007/978-3-031-25274-7_39

Download citation

Publish with us

Policies and ethics