A Context-Adaptive Security Framework for Mobile Cloud Computing

Mobile cloud computing is an emerging area in the cloud computing paradigm, comprising several modes of communication that are governed by varying security standards. WBAN (Wireless Body Area Networks), RFID (Radio Frequency IDentification) and VANET (Vehicular Ad-hoc NETworks) are three example applications that could be based on mobile cloud computing. Considering the fact that the security mechanisms in different applications are highly heterogeneous while the cloud server is common to these applications, we devised a context-adaptive security framework that could be deployed at the cloud premises to provide an additional security layer to mobile cloud computing systems. Furthermore, the framework provides varied techniques to improve the quality of service and reliability of mobile cloud computing. Technically, this multicomponent context-adaptive framework accepts the traffic in different communication modes, prevents attacks by randomly choosing pre-defined algorithms, learns from previous attacks using cognitive model, and rearranges the cloud service model as a self-healing system.

[1]  Hoi-Jun Yoo,et al.  A 5.5mW IEEE-802.15.6 wireless body-area-network standard transceiver for multichannel electro-acupuncture application , 2013, 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers.

[2]  Yingxu Wang Cognitive computing and World Wide Wisdom (WWW+) , 2010, 9th IEEE International Conference on Cognitive Informatics (ICCI'10).

[3]  Rick Huhn,et al.  Security Standards for the RFID Market , 2005, IEEE Secur. Priv..

[4]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[5]  Lu Chen,et al.  Analysis of VANET security based on routing protocol information , 2013, 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP).

[6]  Tsong-Ho Wu A passive protected self-healing mesh network architecture and applications , 1994, TNET.

[7]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[8]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[9]  Giorgio Metta,et al.  Safe and effective learning: A case study , 2010, 2010 IEEE International Conference on Robotics and Automation.

[10]  S. S. Chapade,et al.  Securing Cloud Servers Against Flooding Based DDOS Attacks , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[11]  Chee Siang Ang,et al.  Theories of learning: a computer game perspective , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..

[12]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[13]  T. H. Noh End-to-end self-healing SDH/ATM networks , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[14]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[15]  Leonardo Badia,et al.  Cognition-based networks: Applying cognitive science to multimedia wireless networking , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[16]  José Manuel Galán,et al.  Techniques to Understand Computer Simulations: Markov Chain Analysis , 2009, J. Artif. Soc. Soc. Simul..

[17]  Srinivas Sampalli,et al.  A security suite for wireless body area networks , 2012, ArXiv.

[18]  Qiang Ye,et al.  A light-weight authentication scheme based on message digest and location for mobile cloud computing , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[19]  Markus Jakobsson,et al.  Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.

[20]  Kee-Young Yoo,et al.  A lightweight multi-user authentication scheme based on cellular automata in cloud environment , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).

[21]  Konstantinos Markantonakis,et al.  Considerations for mobile authentication in the Cloud , 2011, Inf. Secur. Tech. Rep..

[22]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).