2019
DOI: 10.3991/ijim.v13i01.9900
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment

Abstract: the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The suggested system used interactive technologies to assist students in choosing universities that fit their educational talents, and experiences. Mobile Cloud Computing, a new future technology for wireless services, emerged from the growing expansion of mobile devices and mobile-based systems and cloud computing [12]. The authors in [13] investigated the potential for creating a portable system to aid the deaf and other persons in communicating and learning via portable gadgets.…”
Section: Related Work and Appsmentioning
confidence: 99%
“…The suggested system used interactive technologies to assist students in choosing universities that fit their educational talents, and experiences. Mobile Cloud Computing, a new future technology for wireless services, emerged from the growing expansion of mobile devices and mobile-based systems and cloud computing [12]. The authors in [13] investigated the potential for creating a portable system to aid the deaf and other persons in communicating and learning via portable gadgets.…”
Section: Related Work and Appsmentioning
confidence: 99%
“…This information could be used to attack the software application, its network host or its users. Various security mechanisms utilized to prevent information leakages, such as Authentication [21,22], Access Control (Authorization), Logging and Intrusion Detection [23,24], Auditability, SQL Injection [25][26][27][28], Data Validation, and Security Tests [29,30].…”
Section: External Threats (Information Leakage)mentioning
confidence: 99%
“…Mobile Cloud Computing (MCC), is a combination of Mobile Computing and Cloud Computing (CC) and is introduced to make mobile devices resource-full [3]; [4]. MCC permits cloud computing resource platforms such as Amazon EC2, Microsoft Azure, and Google AppEngine used to overcome the dearth of native resource restrictions in mobile devices.…”
Section: Introductionmentioning
confidence: 99%