Font Size: a A A

Research On The Security Of Mobile Application Based On Cloud Computing

Posted on:2013-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:H L XuFull Text:PDF
GTID:2248330362470906Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the emergence of the mobile phone operating system, mobile phones ex-works still can beinstalled a third party program, which created a helpful condition for virus spreading. From the firstmobile phone viruses appeared in the year of2004, the kinds of mobile phone virus continuesincreasing and mobile phone virus has spreading to the entire world. High efficiency and low energyconsumption is the requirement of Mobile phone virus prevention, and the study of mobile virusprevention hot gradually in recent years, which mostly based on the experience of computer virusprevention, either improving the algorithm, or changing the work mode, in order to improve thealgorithm efficiency and reduce the consumption. According to the demand of mobile phone virusprevention, the author studied one new method of mobile phone virus prevention based on cloudcomputing technology.In this paper, based on the cloud computing technology, by improving the Host-based IntrusionPrevention System (HIPS), formed a cloud monitoring technology, and presented the basic model andwork flow, the realization of the cloud monitoring mechanism was discussed also. Changed themonitoring mode, from the active monitoring to passive, improved the working efficiency of the cloudmonitoring; Used the technology of black and white list to judge file property, reducing thecomplexity of judgment for knowing files; Order to analysis unknown file property, added a functionof file judgment, and presented a new method, a single step dangerous behavior analysis, to judge theunknown file property, reducing the communication frequency; Added a security strategy list over theoriginal security strategy library, improving the efficiency of the strategy matching; Moved thesecurity strategy library and the job of file judgment to the cloud services, reducing the occupation ofthe local resources; Changed the rule of setting security strategy, for different viruses making adifferent strategy, reducing the complexity of setting strategy. Through the proof by contradiction andthe theory of finite automaton, the author analyzed the security of the cloud monitoring technology,and the results show that its security is not worse than the existing monitoring technology.
Keywords/Search Tags:cloud computing, cloud security, mobile security, virus detection, behavior analysis, realtime monitoring
PDF Full Text Request
Related items