Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

被引:85
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Tao, Lixin [1 ]
Zhu, Yongxin [2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
基金
美国国家科学基金会;
关键词
intrusion detection; mobile cloud computing; security; heterogeneous; 5G; PERFORMANCE; SYSTEM; VIRTUALIZATION; PROTECTION; ATTACKS;
D O I
10.1002/sec.1224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3049 / 3058
页数:10
相关论文
共 50 条
  • [1] Communicating While Computing [Distributed mobile cloud computing over 5G heterogeneous networks]
    Barbarossa, Sergio
    Sardellitti, Stefania
    Di Lorenzo, Paolo
    IEEE SIGNAL PROCESSING MAGAZINE, 2014, 31 (06) : 45 - 55
  • [2] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [3] EMC: Emotion-Aware Mobile Cloud Computing in 5G
    Chen, Min
    Zhang, Yin
    Li, Yong
    Mao, Shiwen
    Leung, Victor C. M.
    IEEE NETWORK, 2015, 29 (02): : 32 - 38
  • [4] Mobile Cloud Computing in 5G: Emerging Trends, Issues, and Challenges
    Wang, Xianbin
    Han, Guangjie
    Du, Xiaojiang
    Rodrigues, Joel J. P. C.
    IEEE NETWORK, 2015, 29 (02): : 4 - 5
  • [5] Sleeping Cell Detection for Resiliency Enhancements in 5G/B5G Mobile Edge-Cloud Computing Networks
    Ming, Zhao
    Li, Xiuhua
    Sun, Chuan
    Fan, Qilin
    Wang, Xiaofei
    Leung, Victor C. M.
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (03)
  • [6] Mobile Agents with Cryptographic Traces for Intrusion Detection in the Cloud Computing
    Idrissi, Hind
    Ennahbaoui, Mohammed
    Souidi, El Mamoun
    El Hajji, Said
    INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 179 - 186
  • [7] Vehicular Cloud Computing in the Dawn of 5G
    Falchetti, Angelo
    Azurdia-Meza, Cesar
    Cespedes, Sandra
    2015 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2015, : 301 - 305
  • [8] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [9] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing
    Bakshi, Aditya
    Sunanda
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378
  • [10] A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges
    Kene, Snehal G.
    Theng, Deepti P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 227 - 232