Detailed Information

Cited 4 time in webofscience Cited 4 time in scopus
Metadata Downloads

Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing

Authors
Moon, DaesungKim, IkkyunJoo, Jae WoongIm, Hyung JinPark, Jong HyukJeong, Young-Sik
Issue Date
Dec-2016
Publisher
SPRINGER
Keywords
Advanced persistent threat; Authentication; Intelligent security model; Mobile cloud computing
Citation
WIRELESS PERSONAL COMMUNICATIONS, v.91, no.4, pp 1697 - 1710
Pages
14
Indexed
SCIE
SCOPUS
Journal Title
WIRELESS PERSONAL COMMUNICATIONS
Volume
91
Number
4
Start Page
1697
End Page
1710
URI
https://scholarworks.dongguk.edu/handle/sw.dongguk/18097
DOI
10.1007/s11277-015-3121-8
ISSN
0929-6212
1572-834X
Abstract
Diverse researches following the advancement of IT technology and emergence of smart devices are common in current research. In particular, the most commercialized smart device, the smart phone, provides convenient communication among users due to easy portability and real-time information sharing within a diverse system. Moreover, spatial and temporal use of smart devices greatly increased because these devices are capable of performing the same functions as a desktop personal computer, making smart phones extremely popular. However, research on smart phones has mainly focused on the convenience of the services offered on these devices, while the issue of security has been neglected. Smart phones are vulnerable to diverse, malicious attacks, which have increased as new functions are developed and commonly used. For this reason, a number of applications were developed to detect a variety of malicious codes in smart phones and prevent private information leakage. However, due to the difficulties of recognizing and responding to attacks, such as advanced persistent threats (APTs), an intelligent security model is urgently required. This paper suggests intelligent security model of smart phone based on human behavior in mobile cloud computing to detect diverse types of malicious code in smart phones and respond to advanced attacks, such as APTs. The suggested intelligent security model of smart phone securely protects users from private information leaks and illegal billing action. Moreover, intelligent response to malicious, difficult-to-detect code is provided by a user behavior-based intelligent analysis, which makes it possible to shut down network, registry, drive, and system accessibility and to notify users to respond to malicious attacks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE