Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Data theft detection mobile cloud computing

ABSTRACT

Nowadays most of the mobiles services changes to cloud-based mobile


services with richer communication and high flexibility. Here we present
combination of mobile devices and cloud services to introduction of new mobile
cloud infrastructure. we first define new mobile cloud services through mobile
cloud infrastructure and discuss possible security threats through the use of several
service scenarios. Then, we propose a methodology and architecture for detecting
abnormal behavior through the monitoring of both host and network data.
.

Existing System

For normal mobile devices, nowadays vaccine applications detect malware


through a signature based method, It detects malware in a short space of time with
high accuracy, but they cannot detect new malware this signature is unknown or
has been modified. Therefore vaccine applications cannot detect and prohibit them
with only signature-based method in the future. When a malware is compromised
on a virtual mobile instance, it can be delivered to other virtual mobile instances in
the same mobile cloud infrastructure. if the network has without monitoring the
malware will appear spread over the entire infrastructure.
Proposed System

Here we present combination of mobile devices and cloud services to


introduction of new mobile cloud infrastructure. Here ,We focuses on the
abnormal behavior detection in mobile cloud infrastructure. To validate our
methodology, we built a test bed for mobile cloud infrastructure, intentionally
installed malicious mobile programs onto several virtual mobile instances, and then
successfully detected the abnormal behavior that arose from those malicious
programs.

Implementation

Implementation is the stage of the project when the theoretical design is


turned out into a working system. Thus it can be considered to be the most
critical stage in achieving a successful new system and in giving the user,
confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the
existing system and it’s constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover methods.

Main Modules:-

1. User Module :

In this module, Users are having authentication and security to access the
detail which is presented in the ontology system. Before accessing or searching
the details user should have the account in that otherwise they should register
first.

2. Abnormal Behavior Detection :

If any intruder entered the stolen password and some details for the getting
the hall tickets to make abnormal behaviour by mismatch unique getting the hall
tickets to make abnormal behaviour by mismatch unique number through to
alert the owner this is for another abnormal behaviour detection methods .

3. Malware Data :

The malware applications to obtain abnormal data in our mobile cloud


infrastructure. We installed the malware onto two hosts and ran it. It gathers
location coordinate and device identifiers, and sends the information to its server.
The malware target affecting each mobile instance as zombie, and there are many
other malware which have the same purpose although their functionality and
behavior are little different from each other. This kind of malware is more
threatening to mobile cloud infrastructure because there are lots of similar virtual
mobile instances and they are closely connected to each other.

4. Collecting Behavior Data

Abnormal behavior with our collected data set. This is for maintaining
behavioral data is very important. If any misbehavior in collected of datas it make
several problems in our database so we provide data maintaining by test
environment and network information.

Configuration:-
H/W System Configuration:-

Processor - Pentium –III

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard


Mouse - Two or Three Button Mouse

Monitor - SVGA

S/W System Configuration:-

 Operating System :Windows95/98/2000/XP


 Application Server : Tomcat5.0/6.X

 Front End : HTML, Java, Jsp


 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.

You might also like