Abstract-Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resourceseverything from applications to data centers -over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.
RÉSUMÉ. L'objectif principale de cette étude est la définition d'une politique globale pour sécuriser l'environnement mobile, par la mise en place des procédures et des mécanismes de sécurités et de protection des dispositifs mobiles qui répondent mieux aux attentes des utilisateurs, que ce soit au niveau du trafic dans les réseaux mobiles, ou bien au niveaux des applications mobiles. Au niveau réseaux mobiles : L'étude s'intéresse principalement à limiter la propagation des malwares via SMS / MMS et e-mails. Il décrit les étapes menant à identifier, analyser et sécuriser le trafic dans les réseaux mobiles. A cet effet, un Framework MPSS (Mobile Phone Security Scheme) a été utilisé pour faire partie de l'infrastructure de l'opérateur télécom du réseau mobile. MPSS vise à augmenter le niveau de sécurité de l'information à travers le réseau de l'opérateur télécom et résoudre les problèmes liés aux ressources limitées sur les appareils mobiles. Au niveau des applications mobiles : L'étude propose un Firewall ALSD (Anti-Leak of Sensitive Data), permettant une protection fiable contre les fuites des données personnelles et professionnelles sensibles sur les dispositifs mobiles, ainsi il permet de notifier l'utilisateur. Cette solution intégrée au système d'exploitation mobile repose sur une analyse automatisée des applications mobiles du store des plateformes mobiles (Play Store, App Store …) ; Ce firewall permet de contrôler et de bloquer les requêtes malveillantes sur les données sensibles existantes dans le dispositif mobile tout en assurant le bon fonctionnement des applications installées sur le mobile. ABSTRACT. The main objective of this study is to definite a global policy to secure the mobile environment, by setting up procedures and mechanisms for the security and protection of mobile devices Which meets the user's needs, whether in terms of mobile networks traffic or at mobile applications level. At mobile networks level: The study focuses on limiting the malware spread via SMS, MMS and emails. It describes the steps involved identifying, analyzing and securing mobile network traffic. To this effect, the MPSS Framework (Mobile Phone Security Scheme) has been used to be part of the mobile telecom operator's infrastructure. MPSS aims to increase the level of information security through the telecom operator's network and to solve problems related to limited resources on mobile devices. At the mobile applications level: The study proposes the ALSD Firewall (Anti-Leak of Sensitive Data), allowing reliable protection against leakage of sensitive personal and professional data on mobile devices, thus notifying the user. This solution, integrated into the mobile OS, is based on the mobile applications automated analysis of the mobile platform store (Play Store, App Store ...); This firewall allows control and block malicious requests on sensitive data while ensuring the proper functioning of the applications installed on the mobile.
No abstract
No abstract
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.