Skip to main content

A Fog-Based Collusion Detection System

  • Conference paper
  • First Online:
  • 1090 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 895))

Abstract

The threat of malicious software (malware) programs on users’ privacy is now worse than ever. Some malwares can even collude to increase their permissions through sharing, making it easier to breach users’ privacy. However, detecting malware on a mobile phone consumes a considerable amount of a mobile phone’s energy. While the advancements of cloud technology make it possible to transmit malware data to the cloud for analysis, transmitting large amounts of data contributes to the energy consumption problem of mobile phones. Therefore, this study proposes a fog-based computing technique that targets intelligent collusion attacks and intelligently controls the collection and transmission behavior to reduce the amount of data that is transmitted to lower the energy consumption of mobile phones. This study conducts experiments using an official application and compares it with other methods. The experimental results show that the proposed method transmits less data than other methods and saves the energy consumption of mobile phones.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutor. 16(2), 925–941 (2014)

    Article  Google Scholar 

  2. Wang, D., Cheng, H., He, D., Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst. J. 12(1), 916–925 (2018)

    Article  Google Scholar 

  3. Bhandari, S., Jaballah, W.B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M.S., Mosbah, M., Conti, M.: Android inter-app communication threats and detection techniques. Comput. Secur. 70, 392–421 (2017)

    Article  Google Scholar 

  4. Chen, H., Su, J., Qiao, L., Zhang, Y., Xin, Q.: Malware collusion attack against machine learning based methods: issues and countermeasures. In: ICCCS, vol. 5, pp. 465–477 (2018)

    Google Scholar 

  5. Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: ACSAC 2010, pp. 347–356 (2010)

    Google Scholar 

  6. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: SPSM@CCS 2011, pp. 15–26 (2011)

    Google Scholar 

  7. Xu, M., Ma, Y., Liu, X., Lin, F.X., Liu, Y.: AppHolmes: detecting and characterizing app collusion among third-party android markets. In: WWW 2017, pp. 143–152 (2017)

    Google Scholar 

  8. Kashefi, I., Kassiri, M., Salleh, M.: Preventing collusion attack in android. Int. Arab J. Inf. Technol. 12(6A), 719–727 (2015)

    Google Scholar 

  9. Gupta, H., Dastjerdi, A.D., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw. Pract. Exper. 47(9), 1275–1296 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the Ministry of Science and Technology (MOST), Taiwan, under MOST Grants: 107-2221-E-194-022 – & 105-2221-E-194-014-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo-Chao Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hsiung, PY., Li, C.H., Chang, S.H., Cheng, BC. (2020). A Fog-Based Collusion Detection System. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_41

Download citation

Publish with us

Policies and ethics