Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

被引:85
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Tao, Lixin [1 ]
Zhu, Yongxin [2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
基金
美国国家科学基金会;
关键词
intrusion detection; mobile cloud computing; security; heterogeneous; 5G; PERFORMANCE; SYSTEM; VIRTUALIZATION; PROTECTION; ATTACKS;
D O I
10.1002/sec.1224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3049 / 3058
页数:10
相关论文
共 83 条
  • [1] Ahuja S.P., 2012, Network and Communication Technologies, V1, P97
  • [2] Cost and benefit analysis of authentication systems
    Altinkemer, Kemal
    Wang, Tawei
    [J]. DECISION SUPPORT SYSTEMS, 2011, 51 (03) : 394 - 404
  • [3] Anbar Mohammed, 2011, Journal of Computer Science, V7, P1724, DOI 10.3844/jcssp.2011.1724.1728
  • [4] [Anonymous], 2012, Int. J. Comput. Appl., DOI [10.5120/7470-0475, DOI 10.5120/7470-0475]
  • [5] [Anonymous], 2010, PROC USENIX WORKSHOP
  • [6] [Anonymous], 2013, INT J COMPUTER APPL
  • [7] [Anonymous], 2013, International Journal of Engineering and Advanced Technology (IJEAT)
  • [8] Bakhtiari Majid, 2014, INT J COMPUTER APPL, V90, P29
  • [9] Barbu O.E., 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, P1
  • [10] Network virtualization for cloud computing
    Baroncelli, Fabio
    Martini, Barbara
    Castoldi, Piero
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2010, 65 (11-12): : 713 - 721