Skip to main content

Text Mining for Suspicious Contents in Mobile Cloud Computing Environment

  • Conference paper
  • First Online:
Advances in Ubiquitous Networking (UNet 2015)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 366))

Included in the following conference series:

  • 1064 Accesses

Abstract

Mobile devices, such as tablets and smartphones, have become the main computing platform for many people. Ubiquitous computing, as a concept, has developed with the emerging of cloud computing technology that has forced the mobile devices industry to prerequisite the bringing of cloud computing to mobile domain. Mobile Cloud Computing MCC is a service that allows users of mobile devices high availability of their personal applications as well as their own content, everywhere and anytime. Unfortunately, malicious people take advantage of this technological achievement in the sense that they store all illegal information on cloud in order to hide all digital illegal records justifying their illicit acts served by their mobile devices. What is more, mobile forensic expertise on those mobile devices cannot be accomplished by digital investigators of law enforcement, simply because all the storage is done in the cloud. In this vein, Mobile Cloud Computing MCC technology is a double-edged weapon; it has made life easier on one hand. And, it has complicated the work of law enforcement authorities to find truth, on the other hand. In cloud environment, malicious users can be stored several and various formats of suspicious content (text, image, video…), so in this work we will focus only on textual content. Text mining is an effective way to add semantics aspect to this communication’s form presenting a significant research challenge. Similarity approach is used in text analysis to detect suspicious text contents in cloud storage. So, in this paper we will present a state-of-the-art and research challenges of mobile cloud computing. We will also discuss the problem of data management and data analysis on a cloud environment. Ultimately, we will suggest an approach to come up with the aforementioned problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perry, R., Hatcher, E., Mahowald, R., Hendrick, S.: Force.com cloud platform drives huge time to market and cost savings, IDC White Paper, International Data Corporation, Framingham, Massachusetts (2009). (thecloud.appirio.com/rs/appirio/images/IDC_Force.com_ROI_Study.pdf)

    Google Scholar 

  2. http://www.mobilecloudcomputingforum.com (accessed on July 15, 2012)

  3. Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland (2006)

    Google Scholar 

  4. Digital Forensics Research Workshop. A Road Map for Digital Forensics Research (2001). www.dfrws.org

  5. http://en.wikipedia.org/wiki/Mobile_device_forensics (accessed on January 5, 2015)

  6. Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft), Special Publication 800-145 (Draft), National Institute of Standards and Technology, Gaithersburg, Maryland (2011)

    Google Scholar 

  7. Dykstra, J.: Mapping the forensic standard ISO/IEC 27037 to cloud computing. In: Proceedings of the AAFS 66th Annual Scientific Meeting, Seattle, WA, February 2014

    Google Scholar 

  8. http://apprenda.com/library/paas/iaas-paas-saas-explained-compared/ (accessed on January 05, 2015)

  9. http://cloudcomputingnews.in/making-sense-of-the-cloud-saas-paas-and-iaas-explained/ (accessed on January 5, 2015)

  10. http://www.clouderpc.com/making-sense-of-the-cloud-saas-paas-and-iaas-explained/#.VOciQubz3fI (accessed on January 5, 2015)

  11. Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Proceedings of the 7th IFIP International Conference on Digital Forensics (2011)

    Google Scholar 

  12. Alami, S., Elbeqqali, O.: Detecting Suspicious Profiles Using Text Analysis Within Social Media. Journal of Theoretical and Applied Information Technology 73(3), March 31, 2015

    Google Scholar 

  13. Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130–137 (1980)

    Article  Google Scholar 

  14. Kaufman, L., Rousseeuw, P.J.: Finding groups in data: An introduction to cluster analysis. WILEY-Interscience (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salim Alami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Alami, S., Elbeqqali, O. (2016). Text Mining for Suspicious Contents in Mobile Cloud Computing Environment. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-990-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-989-9

  • Online ISBN: 978-981-287-990-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics