Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:2 Issue:3 Year: 08 April,2014 Pages:120-129
Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the immigrate which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for anomalous behavior detection through the observation of host and network data. To check our procedure, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm and URL Filter to find out from those programs the anomalous behaviour that arise.
Mobile cloud computing mobile cloud infrastructure movable cloud service scenarios anomalous behaviour monitoring system learning.
[1] Monitoring and Detecting Anomalous Behaviour in Mobile
Cloud Infrastructure 1Taehyun Kim, 1Yeongrak Choi, Seunghee Han, 3Jae Yoon
Chung, 3Jonghwan Hyun, 3Jian Li, and 1James Won-Ki Hong
[2] Scott Paquette, Paul T.Jaegar, Susan C.Wilson. Identifying the security risks
associated with governmental use of cloud computing, Journal of Government
Information Quarterly 27, pages 245-253, April, 2010.
[3] Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Stanford, David Koestar, Patti
Reynolds.“Cloud Computing: A new business paradigm for biomedical information
sharing”. Journal of Biomedical Informatics 43, pages 342-353, August, 2008.
[4] Ann Cavoukian, Information and Privacy Commissioner of Ontario. “Privacy in the
Clouds”, A White Paper on Privacy and Digital Identity, 2009.
[5] R Gellman. “Cloud Computing and Privacy”. Presented at the World Privacy Forum,
2009.
[6] Subra Kumaraswamy, Shahed Latif and Tim Mather. “Cloud Security and
Privacy: An Enterprise Perspective on Risks and Compliance”. Published by O’Reilly,
1st edition, September, 2009.
[7] Dan Svantesson, Roger Clarke. “Privacy and consumer
risks in cloud computing”. Privacy consumer risks journal, pages 391-397, July, 2010.
[8] Kim Zetter. “Medical Records: Stored in the Cloud, Sold on the open Market”, Journal
of privacy, crime and security, pages 223-256, March, 2009.
[9] Roger Clarke. “Evaluation of Google’s Statement against the privacy
Statement Template of 19 December 2005”,