A Study on Mobile Cloud Anomaly Detection Model
The mobile cloud service is inevitable alternative which provides mobile device users with high computing power and large storage. The cloud servers provide various services such as IaaS, PaaS and SaaS to mobile device users seamlessly and the situation means that the device’s apps or mobile browser can interact with the VMs in clouds at anytime and anyplace. In this mobile cloud environment, our concern is the abnormal access of cloud resources. Since the users of cloud services pay based on the usage of the cloud resources, if there are a certain kind of malicious access to the cloud resources, it can cause financial damages to mobile cloud users. Especially, the mobile devices are always turned on, even if we are moving around the street. Thus the malicious behavior of mobile device can do more harm to users compared to PC-based cloud services. This research suggests an anomaly detection model in mobile cloud services. In our suggested model, the users’ behavior and resource usages are considered and the model contains the usual behaviors and resource usages as the users’ profile which is supposed to be compared with the current users’ behavior for detecting the abnormalities. The research result gives insight to security managers about monitoring factors and recognizing the anomaly in the mobile cloud service.
KeywordsMobile Device Virtual Machine Cloud Service Access Network Anomaly Detection
Unable to display preview. Download preview PDF.
- 1.Chun, B.-G., Maniatis, P.: Augmented Smartphone Applications Through Clone Cloud Execution. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems, HotOS (2009)Google Scholar
- 2.Balakrishnan, M., Mohomed, I., Ramasubramanian, V.: Where’s that Phone?: Geolo-catingIP Addresses on 3G Networks. In: Proceedings of IMC (2009)Google Scholar
- 3.Wojtczuk, R.: Adventures with a certain Xen vulnerability. Technical Report, Invisible Things Lab (2008)Google Scholar
- 4.Rutkowska, J.: Security challenges in virtualized environments (April 2008), http://www.invisiblethingslab.com
- 5.Criscione, C.: Virtually Pwned Pentesting Virtualization. In: BlackHat Conference, USA (2010)Google Scholar