Advertisement

Text Mining for Suspicious Contents in Mobile Cloud Computing Environment

  • Salim AlamiEmail author
  • Omar Elbeqqali
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 366)

Abstract

Mobile devices, such as tablets and smartphones, have become the main computing platform for many people. Ubiquitous computing, as a concept, has developed with the emerging of cloud computing technology that has forced the mobile devices industry to prerequisite the bringing of cloud computing to mobile domain. Mobile Cloud Computing MCC is a service that allows users of mobile devices high availability of their personal applications as well as their own content, everywhere and anytime. Unfortunately, malicious people take advantage of this technological achievement in the sense that they store all illegal information on cloud in order to hide all digital illegal records justifying their illicit acts served by their mobile devices. What is more, mobile forensic expertise on those mobile devices cannot be accomplished by digital investigators of law enforcement, simply because all the storage is done in the cloud. In this vein, Mobile Cloud Computing MCC technology is a double-edged weapon; it has made life easier on one hand. And, it has complicated the work of law enforcement authorities to find truth, on the other hand. In cloud environment, malicious users can be stored several and various formats of suspicious content (text, image, video…), so in this work we will focus only on textual content. Text mining is an effective way to add semantics aspect to this communication’s form presenting a significant research challenge. Similarity approach is used in text analysis to detect suspicious text contents in cloud storage. So, in this paper we will present a state-of-the-art and research challenges of mobile cloud computing. We will also discuss the problem of data management and data analysis on a cloud environment. Ultimately, we will suggest an approach to come up with the aforementioned problems.

Keywords

Cloud computing Mobile Cloud Computing Digital forensics Mobile forensics Cloud forensics Text analysis Text mining Profiling 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Perry, R., Hatcher, E., Mahowald, R., Hendrick, S.: Force.com cloud platform drives huge time to market and cost savings, IDC White Paper, International Data Corporation, Framingham, Massachusetts (2009). (thecloud.appirio.com/rs/appirio/images/IDC_Force.com_ROI_Study.pdf)Google Scholar
  2. 2.
    http://www.mobilecloudcomputingforum.com (accessed on July 15, 2012)
  3. 3.
    Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland (2006)Google Scholar
  4. 4.
    Digital Forensics Research Workshop. A Road Map for Digital Forensics Research (2001). www.dfrws.org
  5. 5.
  6. 6.
    Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft), Special Publication 800-145 (Draft), National Institute of Standards and Technology, Gaithersburg, Maryland (2011)Google Scholar
  7. 7.
    Dykstra, J.: Mapping the forensic standard ISO/IEC 27037 to cloud computing. In: Proceedings of the AAFS 66th Annual Scientific Meeting, Seattle, WA, February 2014Google Scholar
  8. 8.
  9. 9.
  10. 10.
  11. 11.
    Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Proceedings of the 7th IFIP International Conference on Digital Forensics (2011)CrossRefGoogle Scholar
  12. 12.
    Alami, S., Elbeqqali, O.: Detecting Suspicious Profiles Using Text Analysis Within Social Media. Journal of Theoretical and Applied Information Technology 73(3), March 31, 2015Google Scholar
  13. 13.
    Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130–137 (1980)CrossRefGoogle Scholar
  14. 14.
    Kaufman, L., Rousseeuw, P.J.: Finding groups in data: An introduction to cluster analysis. WILEY-Interscience (1990)Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  1. 1.LIIAN LaboratorySidi Mohammed Ben Abdellah UniversityFezMorocco

Personalised recommendations