The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite many applications, mobile cloud computinginduces privacy concerns. In particular, when mobile device usersoffload the computation of a mobile app to the cloud, they may notwant the cloud service provider (CSP) to know what kind of appthey are using, since that information might be used to infer theirpersonal activities and living habits. One possible way for the CSPto learn the type of an...
Offloading has emerged as a promising idea to allow resource-constrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks...
It is standard practice in enterprises to analyze large amounts of logs to detect software failures and malicious behaviors. Mobile applications pose a major challenge to centralized monitoring as network and storage limitations prevent fine-grained logs to be stored and transferred for off-line analysis. In this paper we introduce EMMA, a framework for automatic anomaly detection that enables security...
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
With the proliferation of mobile devices, spatial crowdsourcing is rising as a new paradigm that enables individuals to participate in tasks related to some locations in the physical world. Nevertheless, how to allocate these tasks to proper mobile users and improve communication efficiency are critical in spatial crowdsourcing. In this paper, we propose Fo-DSC, a fog-based deduplicated spatial crowdsourcing...
When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics...
Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities...
This scheme is a method for controlling functionality of a mobile device. The operation of the element function of the mobile device is blocked by a blocking code, and the operation of the blocked element function is unblocked by an unblocking code. The blocking code is a code used to block the operation of the element function of the mobile device in an area in which a user is located, and the unblocking...
Mobile Marketing is a powerful means to grow business. Tremendous increase in the count of mobile users has motivated the mobile marketing to high level in the last several years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted major attention of mobile users and the businessman now a days. Signal Processing is used to get latitude and longitude of...
Internet traffic has been dramatically increasing due to development of IT technology and increase in the number of Internet service users. The existing TCP/IP network architecture has problems in terms of scalability and security. Therefore, to solve the traffic, scalability and security problems, novel network paradigms are being surveyed. Among these paradigms, Content-Centric Networking (CCN)...
The current security models on mobile devices do not provide the level of protection required to handle sensitive data, such as protected healthcare information. In this paper, we introduce a Distributed Android Security Framework (DASF). DASF is a custom security framework for Android-based mobile devices that allows the enforcement of dynamic security policies on an application's privileges and...
Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for mobile...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm...
We present an approach for dynamically outsourcing and composing security functions for mobile devices, according to the network behavior of their running applications. Applications are characterized from a network point of view using data mining and clustering techniques with the aim to select their appropriate security functions. Software-defined networking mechanisms are employed to chain the selected...
Mobile Cloud Computing is a very important trend nowadays. It merges the cloud computing technologies with mobile devices to overcome the limitations of these devices such as limited battery life time, limited processing and storage capabilities. The tasks that need massive computations can be performed on the cloud efficiently and the results will be sent back to the mobile device, this way, the...
Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored. The concept of port-based authentication using IEEE 802.1x restricts access and may provide statistical data about users...
This paper presents a novel authentication scheme called MINHO, which protects users from unauthorized access even when their passwords have been stolen. At the same time, MINHO detects any tries for unauthorized access by attackers. Our idea is to use a mobile phone to send a request with specific parameters to the service provider before the actual authentication process, then, the service provider...
Thanks to the improvement of the wireless communication technology, mobile devices have played a crucial role in the people's lives. Mobile Cloud Computing refers to an infrastructure where data processing and storage happen outside the mobile device. Despite this, data storage and data sharing are not fully supported by the mobile devices because of their limitations like the limited storage capacity,...
Mobile phone's short message services technology is being leveraged to provide branchless banking in developed countries. These SMS-based services reach areas where bank branches or auto telling machines would not be feasible thereby enabling financial inclusion among the unbanked and low-income earners. However, the vulnerability of its service delivery platform makes it attractive to fraudsters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.