Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 483 Accesses

Abstract

In this chapter, we aim to measure the resilience of mobile cloud services to malware. Since the cloud is intended to provide real-time services to mobile users, we introduce a new metric, resilience factor, to denote the maximally allowable percentage of malware-infected nodes in the network such that a required ratio of cloud service requests can still be processed on time. We find that for mobile cloud services, there exists a cutoff point on network bandwidth B, below which the resilience factor is an increasing function of B, and beyond which the resilience factor decreases on the order of 1∕B. Such a dichotomy demonstrates another perspective on developing network infrastructures for mobile cloud computing: although low bandwidth in current cellular networks is viewed as a primary drawback to support mobile cloud services, increasing bandwidth can, on the other hand, jeopardize malware resilience. In addition, we show via experiments that in malware epidemics, if B is less than the cutoff point, service quality is deteriorated mainly by network congestion (especially at mobility hotspots), thereby leading to heterogeneous malware resilience across the network; if B is larger than the cutoff point, malware-induced cloud overload becomes the performance bottleneck that can result in global service degradation. Our results encourage deployment of countermeasures in both the network and cloud to effectively defend against malware attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Angin P, Bhargava BK (2011) Real-time mobile-cloud computing for context-aware blind navigation. Int J Next Gener Comput 2:1–13

    Google Scholar 

  2. Bahl P, Han RY, Li LE, Satyanarayanan M (2012) Advancing the state of mobile cloud computing. In: Proceedings of ACM workshop on mobile cloud computing & services

    Book  Google Scholar 

  3. Bhadauria R, Sanyal S (2012) Survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 47:47–66

    Google Scholar 

  4. Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535–547

    Article  Google Scholar 

  5. Chun BG, Maniatis P (2010) Dynamically partitioning applications between weak devices and clouds. In: Proceedings of ACM workshop on mobile cloud computing & services

    Book  Google Scholar 

  6. Constantinescu L, Kim J, Feng D (2012) SparkMed: a framework for dynamic integration of multimedia medical data into distributed m-health systems. IEEE Trans Inf Technol Biomed 16(1):40–52

    Article  Google Scholar 

  7. Cox PA (2011) Build a more secure, mobile cloud environment – common mobile cloud vulnerabilities and solutions to secure them. developerWorks

    Google Scholar 

  8. Cuervo E, Balasubramanian A, ki Cho D (2010) MAUI: making smartphones last longer with code offload. In: Proceedings of ACM Mobisys 2010

    Google Scholar 

  9. Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13:1587–1611

    Article  Google Scholar 

  10. Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of ACM workshop on security and privacy in smartphones and mobile devices

    Book  Google Scholar 

  11. Hadoop (2015). http://hadoop.apache.org/

  12. Iosup A, Yigitbasi N, Epema D (2011) On the performance variability of production cloud services. In: Proceedings of IEEE/ACM international symposium on cluster, cloud and grid computing

    Book  Google Scholar 

  13. Jung E, Wang Y, Prilepov I, Maker F, Liu X, Akella V (2010) User-profile-driven collaborative bandwidth sharing on mobile phones. In: Proceedings of ACM workshop on mobile cloud computing & services

    Book  Google Scholar 

  14. Juniper Networks (2011) Malicious mobile threats report 2010/2011

    Google Scholar 

  15. Kavulya S, Tan J, Gandhi R, Narasimhan P (2010) An analysis of traces from a production MapReduce cluster. In: Proceedings of IEEE/ACM international conference on cluster, cloud and grid computing

    Book  Google Scholar 

  16. Khouzani MR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: Proceedings of IEEE INFOCOM ’11

    Google Scholar 

  17. Kounelis I, Lochner J, Shaw D, Scheer S (2012) Security of service requests for cloud based m-commerce. In: Proceedings of international convention MIPRO ’12

    Google Scholar 

  18. Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43:51–56

    Article  Google Scholar 

  19. Lookout Mobile Security (2011) Mobile threat report

    Google Scholar 

  20. McAfee Labs (2011) McAfee threats report: third quarter 2011

    Google Scholar 

  21. Mulliner C, Seifert JP (2010) Rise of the iBots: owning a telco network. In: Proceedings of international conference on malicious and unwanted software

    Google Scholar 

  22. Ra M, Sheth A, Mummert L, Pillai P, Wetherall D, Govindan R (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of ACM Mobisys 2011

    Google Scholar 

  23. Rhee I, Shin M, Hong S, Lee K, Kim S, Chong S (2009) CRAWDAD data set ncsu/mobilitymodels (v. 2009-07-23)

    Google Scholar 

  24. Storm (2015). http://storm-project.net/

  25. Tan J, Meng X, Zhang L (2012) Performance analysis of coupling scheduler for MapReduce/Hadoop. In: Proceedings of IEEE INFOCOM ’12

    Google Scholar 

  26. Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, Porta TL (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of ACM conference on computer and communications security (CCS)

    Google Scholar 

  27. Xiao Y, Hui P, Savolainen P (2011) CasCap: cloud-assisted context-aware power management for mobile devices. In: Proceedings of the second international workshop on mobile cloud computing and services

    Book  Google Scholar 

  28. Zohar E, Cidon I, Mokryn O (2011) The power of prediction: cloud bandwidth and cost reduction. In: Proceedings of ACM SIGCOMM ’11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Lu, Z., Wang, W., Wang, C. (2015). Understanding the Resilience of Mobile Cloud Services to Malware. In: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-23288-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23288-1_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23287-4

  • Online ISBN: 978-3-319-23288-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics