Abstract
This paper presents the modeling and improvement of mobile cloud computing protection and security enhancement in communication system. The era of open and complex communication needs full protection from intruders land nerds which requires new and advance technology to assist the human in order to make the live more comfortable and safe life. The mobile device have become the best friend in daily activity. The mobile device merit working in the situation which can belief for helping the people in enhanced way as important roles. The security of mobile cloud computing from primitive secure level to the complicated one has been investigated in this work. Following attempt to confront of mobile cloud, the actual casing of mobile in term of performance power competence has been studied and improved. The expression of practices mobile cloud computing model is taking advantage of trusted platform module functionality. A new system of remote evidence for safe mobile device in the background of cloud base clarification has been suggested to improve the safety rank. The results show promising methods to support and protect current and future mobile device within cloud network devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sarker, I.H., Kayes, A.S., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data. 7, 41 (2020)
Khoulimi, H., Lahby, M., Benammar, O.: An overview of explainable artificial intelligence for Cyber Security. Stud. Comput. Intell. 31–58 (2022)
Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Sec. Appl. 50,(2020)
Chen, D., Wawrzynski, P., Lv, Z.: Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustain. Cities Soc. 66,(2021)
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł, Cetin, F., Basim, H.N.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62, 82–97 (2020)
Roopak, M., Yun Tian, G., Chambers, J.: Deep learning models for cyber security in IOT Networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). (2019)
Yohanandhan, R.V., Elavarasan, R.M., Manoharan, P., Mihet-Popa, L.: Cyber-physical power system (CPPS): a review on modeling, simulation, and analysis with cyber security applications. IEEE Access 8, 151019–151064 (2020)
Corallo, A., Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts. Comput. Ind. 114, 103165 (2020)
Shaukat, K., et al.: Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13, 2509 (2020)
Ullah, F., et al.: Cyber security threats detection in Internet of Things using deep learning approach. IEEE Access 7, 124379–124389 (2019)
Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018)
Dasgupta, D., Akhtar, Z., Sen, S.: Machine learning in cybersecurity: a comprehensive survey. J. Defense Model. Simul. Appl. Methodol. Technol. 19, 57–106 (2020)
Jalali, M.S., Kaiser, J.P.: Cybersecurity in hospitals: a systematic, Organizational Perspective. J. Med. Internet Res. 20, e10059 (2018)
Xu, S.: Cybersecurity dynamics: a foundation for the Science of Cybersecurity. Proactive and Dynamic Network Defense. 1–31 (2019)
Formosa, P., Wilson, M., Richards, D.: A principlist framework for cybersecurity ethics. Comput. Secur. 109,(2021)
Alnasser, A., Sun, H., Jiang, J.: Cyber security challenges and solutions for V2X communications: a survey. Comput. Netw. 151, 52–67 (2019)
Nafea, R.A., Amin Almaiah, M.: Cyber security threats in cloud: literature review. In: 2021 International Conference on Information Technology (ICIT). (2021)
Zhu, S., Saravanan, V., Muthu, B.A.: Achieving data security and privacy across healthcare applications using cyber security mechanisms. Electron. Libr. 38, 979–995 (2020)
Chadwick, D.W., et al.: A cloud-edge based data security architecture for sharing and analysing cyber threat information. Futur. Gener. Comput. Syst. 102, 710–722 (2020)
Hamid, O.K., Abduljabbar, R.B., Alhyani, N.J.: Fast and robust approach for data security in communication channel using pascal matrix. Indonesian J. Electr. Eng. Comput. Sci. 19, 248 (2020)
Rajasekharaiah, K.M., Dule, C.S., Sudarshan, E.: Cyber security challenges and its emerging trends on latest technologies. In: IOP Conference Series: Materials Science and Engineering. 981, 022062 (2020)
Yang, L., Li, J., Elisa, N., Prickett, T., Chao, F.: Towards big data governance in cybersecurity. Data-Enabled Discov. Appl. 3, 10 (2019)
Abduljabbar, R.B., Hamid, O.K., Alhyani, N.J.: Features of genetic algorithm for plain text encryption. Int. J. Electr. Comput. Eng. (IJECE). 11, 434 (2021)
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310–222354 (2020)
Jiang, Y., Atif, Y.: A selective ensemble model for Cognitive Cybersecurity analysis. J. Netw. Comput. Appl. 193, 103210 (2021)
Gawade, A., Shekokar, N.M.: Impact of cyber security threats on IOT Applications. Cyber Security Threats and Challenges Facing Human Life. 71–80 (2022)
Salih, A., Zeebaree, S.T., Ameen, S., Alkhyyat, A., Shukur, H.M.: A survey on the role of Artificial Intelligence, Machine Learning and deep learning for cybersecurity attack detection. In: 2021 7th International Engineering Conference Research and Innovation amid Global Pandemic (IEC). (2021)
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., Basim, H.N.: Cyber Security Awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62, 82–97 (2020).
Mendhurwar, S., Mishra, R.: Integration of social and IOT technologies: architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 15, 565–584 (2019)
Mantha, B.R.K., de Soto, B.G.: Cyber security challenges and vulnerability assessment in the construction industry. In: Proceedings of the Creative Construction Conference 2019. (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hamid, O.K., Abduljabbar, R.B., Dawood, A.Q., Naghmash, M.S., Alhyani, N.J. (2023). Advanced Security Technique in Presence of Open Communication System and Cyber Era. In: Al-Sharafi, M.A., Al-Emran, M., Al-Kabi, M.N., Shaalan, K. (eds) Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. ICETIS 2022. Lecture Notes in Networks and Systems, vol 584. Springer, Cham. https://doi.org/10.1007/978-3-031-25274-7_39
Download citation
DOI: https://doi.org/10.1007/978-3-031-25274-7_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25273-0
Online ISBN: 978-3-031-25274-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)