Abstract
Diverse researches following the advancement of IT technology and emergence of smart devices are common in current research. In particular, the most commercialized smart device, the smart phone, provides convenient communication among users due to easy portability and real-time information sharing within a diverse system. Moreover, spatial and temporal use of smart devices greatly increased because these devices are capable of performing the same functions as a desktop personal computer, making smart phones extremely popular. However, research on smart phones has mainly focused on the convenience of the services offered on these devices, while the issue of security has been neglected. Smart phones are vulnerable to diverse, malicious attacks, which have increased as new functions are developed and commonly used. For this reason, a number of applications were developed to detect a variety of malicious codes in smart phones and prevent private information leakage. However, due to the difficulties of recognizing and responding to attacks, such as advanced persistent threats (APTs), an intelligent security model is urgently required. This paper suggests intelligent security model of smart phone based on human behavior in mobile cloud computing to detect diverse types of malicious code in smart phones and respond to advanced attacks, such as APTs. The suggested intelligent security model of smart phone securely protects users from private information leaks and illegal billing action. Moreover, intelligent response to malicious, difficult-to-detect code is provided by a user behavior-based intelligent analysis, which makes it possible to shut down network, registry, drive, and system accessibility and to notify users to respond to malicious attacks.




Similar content being viewed by others
References
Jeong, Y.-S., Kim, H.-W., & Jang, H. J. (2013). Adaptive resource management scheme for monitoring of CPS. Journal of Supercomputing, 66(1), 57–69.
Gil, J.-M., Park, J. H., & Jeong, Y.-S. (2013). Data center selection based on neuro-fuzzy inference systems in cloud computing environments. Journal of Supercomputing, 66(3), 1194–1214.
Pattaranantakul, M., Sanguannam, K., Sangwongngam, P., & Vorakulpipat, C. (2015). Efficient key management protocol for secure RTMP video streaming toward trusted quantum network. ETRI Journal, 37(4), 696–706.
Degefa, F. B., & Won, D. (2013). Extended key management scheme for dynamic group in multi-cast communication. Journal of Convergence, 4(4), 7–13.
Malkawi, M. I. (2013). The art of software systems development: Reliability, availability, maintainability, performance (RAMP). Human-Centric Computing and Information Sciences, 3(22), 1–17.
Lee, S.-H., & Lee, I.-Y. (2013). A secure index management scheme for providing data sharing in cloud storage. Journal of Information Processing Systems, 9(2), 287–300.
Shrivastava, N., & Kumar, G. (2013). A survey on cost effective multi-cloud storage in cloud computing. International Journal of Advanced Research in Computer Engineering and Technology, 2(4), 1405–1409.
Truong, T.-T., Tran, M.-T., & Duong, A.-D. (2012). Improvement of the more efficient & secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. Journal of Convergence, 3(2), 25–36.
Dahane, A., Berrached, N.-E., & Loukil, A. (2015). A virtual laboratory to practice mobile wireless sensor networks: A case study on energy efficient and safe weighted clustering algorithm. Journal of Information Processing Systems, 11(2), 205–228.
Singh, R., Singh, P., & Duhan, M. (2014). An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-Centric Computing and Information Sciences, 4(7), 1–14.
Kim, H.-W., Kim, J.-H., Park, J. H., & Jeong, Y.-S. (2014). Time pattern locking scheme for secure multimedia contents in human-centric device. The Scientific World Journal, 2014, 1–9.
Gaonkar, P. E., Bojewar, S., & Das, J. A. (2013). A survey: Data storage technologies. International Journal of Engineering Science and Innovative Technology, 2(2), 547–554.
Dong, B., Zheng, Q., Tian, F., Chao, K., Ma, R., & Anane, R. (2012). An optimized approach for storing and accessing small files on cloud storage. Journal of Network and Computer Applications, 35(6), 1847–1862.
Chattopadhyay, M., Dan, P. K., & Mazumdar, S. (2014). Comparison of visualization of optimal clustering using self-organizing map and growing hierarchical self-organizing map in cellular manufacturing system. Applied Soft Computing, 22, 528–543.
Mohammed, J. (2014). Evolution of the next generation of technologies: Mobile and ubiquitous computing. International Journal of Advanced Research in Science, Engineering and Technology, 1(5), 247–253.
Park, J. H., Kim, H.-W., & Jeong, Y.-S. (2014). Efficiency sustainability resource visual simulator for clustered desktop virtualization based on cloud infrastructure. Sustainability, 6, 8079–8091.
Kim, H.-W., Park, J. H., & Jeong, Y.-S. (2015). Human-centric storage resource mechanism for big data on cloud service architecture. Journal of Supercomputing. doi:10.1007/s11227-015-1390-3.
Duan, H., Yu, S., Mei, M., Zhan, W., & Li, L. (2015). CSTORE: A desktop-oriented distributed public cloud storage system. Computers and Electrical Engineering. doi:10.1016/j.compeleceng.2014.11.001.
Suarez-Tangil, G., Conti, M. (2014). Detecting targeted smart phone malware with behavior-triggering stochastic models. In Proceedings of 19th European symposium on research in computer security, 7–11 (pp. 183–201). Wroclaw, Poland.
Raveendranath, R., Rajamani, V., & Datta, S. K. (2014) Android malware attacks and countermeasures: Current and future directions. In Proceedings of 2014 international conference on control, instrumentation, communication and computational technologies, 10–11 (pp. 137–143). IEEE, Kanyakumari.
Luo, T., Hao, H., Du, W., Wang, Y., & Yin, H. (2011). Attacks on WebView in the android system. In Proceedings of 27th annual computer security applications conference, 5–9 (pp. 343–352). Orlando, FL, USA.
Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In Proceedings of 2012 IEEE symposium on security and privacy, 20–23 (pp. 95–109). IEEE, San Francisco, CA.
Kim, H., Smith, J., & Shin, K. G. (2010). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the international conference on mobile systems, applications, and services, 15–18 (pp. 239–252). ACM, Breckenridge, Colorado, USA.
Mu, J., Cui, A., & Rao, J. (2013). Android mobile security-threats and protection. In Proceedings of international conference on computer, networks and communication engineering (ICCNCE 2013), 23–24 (pp. 683–686). Atlantis Press, Beijing, China.
Louk, M., Lim, H., & Lee, H. (2014). An Analysis of security system for intrusion in smart phone environment. The Scientific World Journal, 2014 (pp. 1–12), Article ID 983901.
Mohd Foozy, C. F., Ahmad, R., & Abdollah, M. F. (2013). Phishing detection taxonomy for mobile device. International Journal of Computer Science Issues, 10(1), 338–344.
Seo, S.-H., Gupta, A., Sallam, A. M., Bertino, E., & Yim, K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38, 43–53.
Acknowledgments
This work was supported by Institute for Information and Communications Technology Promotion (IITP) Grant funded by the Korea government (MSIP) (No. B0101-15-1293, Cyber targeted attack recognition and trace-back technology based-on long-term historic analysis of multi-source data).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Moon, D., Kim, I., Joo, J.W. et al. Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing. Wireless Pers Commun 91, 1697–1710 (2016). https://doi.org/10.1007/s11277-015-3121-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3121-8