Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions

Mobile cloud computing (MCC) allows smart mobile devices (SMD) to access the cloud resources in order to offload data from smartphones and to acquire computational services for application processing. A distinctive factor in accessing cloud resources is the communication link. However, the communica...

Full description

Saved in:
Bibliographic Details
Main Authors: Zakira, Inayat, Abdullah, Gani, Nor Badrul, Anuar, Shahid, Anwar, Muhammad Khurram , Khan
Format: Article
Language:English
English
Published: Springer 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/17196/1/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions-Abstract.pdf
http://umpir.ump.edu.my/id/eprint/17196/7/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions.pdf
http://umpir.ump.edu.my/id/eprint/17196/
https://link.springer.com/article/10.1007/s13369-016-2400-3
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile cloud computing (MCC) allows smart mobile devices (SMD) to access the cloud resources in order to offload data from smartphones and to acquire computational services for application processing. A distinctive factor in accessing cloud resources is the communication link. However, the communication links between SMD and cloud resources are weak, which allows intruders to perform malicious activities by exploiting their vulnerabilities. This makes security a key challenge in the MCC environment. Several intrusion detection and response systems (IDRSs) are adapted to address the exploitation of vulnerabilities that affect smartphones, communication links between cloud resources and smartphones, as well as cloud resources. In this article, we discuss the cloud-based IDRS in the context of SMD and cloud resources in the MCC infrastructure. The stringent security requirements are provided as open issues along with possible solutions. The article aims at providing motivations for researchers, academicians, security administrators, and cloud service providers to discover mechanisms, frameworks, standards, and protocols to address the challenges faced by cloud-based IDRS for SMD.