Abstract
Mobile devices, such as tablets and smartphones, have become the main computing platform for many people. Ubiquitous computing, as a concept, has developed with the emerging of cloud computing technology that has forced the mobile devices industry to prerequisite the bringing of cloud computing to mobile domain. Mobile Cloud Computing MCC is a service that allows users of mobile devices high availability of their personal applications as well as their own content, everywhere and anytime. Unfortunately, malicious people take advantage of this technological achievement in the sense that they store all illegal information on cloud in order to hide all digital illegal records justifying their illicit acts served by their mobile devices. What is more, mobile forensic expertise on those mobile devices cannot be accomplished by digital investigators of law enforcement, simply because all the storage is done in the cloud. In this vein, Mobile Cloud Computing MCC technology is a double-edged weapon; it has made life easier on one hand. And, it has complicated the work of law enforcement authorities to find truth, on the other hand. In cloud environment, malicious users can be stored several and various formats of suspicious content (text, image, video…), so in this work we will focus only on textual content. Text mining is an effective way to add semantics aspect to this communication’s form presenting a significant research challenge. Similarity approach is used in text analysis to detect suspicious text contents in cloud storage. So, in this paper we will present a state-of-the-art and research challenges of mobile cloud computing. We will also discuss the problem of data management and data analysis on a cloud environment. Ultimately, we will suggest an approach to come up with the aforementioned problems.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perry, R., Hatcher, E., Mahowald, R., Hendrick, S.: Force.com cloud platform drives huge time to market and cost savings, IDC White Paper, International Data Corporation, Framingham, Massachusetts (2009). (thecloud.appirio.com/rs/appirio/images/IDC_Force.com_ROI_Study.pdf)
http://www.mobilecloudcomputingforum.com (accessed on July 15, 2012)
Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland (2006)
Digital Forensics Research Workshop. A Road Map for Digital Forensics Research (2001). www.dfrws.org
http://en.wikipedia.org/wiki/Mobile_device_forensics (accessed on January 5, 2015)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft), Special Publication 800-145 (Draft), National Institute of Standards and Technology, Gaithersburg, Maryland (2011)
Dykstra, J.: Mapping the forensic standard ISO/IEC 27037 to cloud computing. In: Proceedings of the AAFS 66th Annual Scientific Meeting, Seattle, WA, February 2014
http://apprenda.com/library/paas/iaas-paas-saas-explained-compared/ (accessed on January 05, 2015)
http://cloudcomputingnews.in/making-sense-of-the-cloud-saas-paas-and-iaas-explained/ (accessed on January 5, 2015)
http://www.clouderpc.com/making-sense-of-the-cloud-saas-paas-and-iaas-explained/#.VOciQubz3fI (accessed on January 5, 2015)
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Proceedings of the 7th IFIP International Conference on Digital Forensics (2011)
Alami, S., Elbeqqali, O.: Detecting Suspicious Profiles Using Text Analysis Within Social Media. Journal of Theoretical and Applied Information Technology 73(3), March 31, 2015
Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130–137 (1980)
Kaufman, L., Rousseeuw, P.J.: Finding groups in data: An introduction to cluster analysis. WILEY-Interscience (1990)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Alami, S., Elbeqqali, O. (2016). Text Mining for Suspicious Contents in Mobile Cloud Computing Environment. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-287-990-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-989-9
Online ISBN: 978-981-287-990-5
eBook Packages: EngineeringEngineering (R0)