Efficient and reliable forensics using intelligent edge computing

作者: Yaser Jararweh , Abdul Razaque , Gautam Srivastava , Gautam Srivastava , Moayad Aloqaily

DOI: 10.1016/J.FUTURE.2021.01.012

关键词:

摘要: Abstract Due to the increasing awareness and use of cloud edge computing, society industries are beginning understand benefits they can provide. Cloud Edge future information management, have transformed Internet into an innovative interactive computing platform. The ultimate goal edge/cloud is reduce resources in network, as well support sharing intercommunication efforts within network. Secure methodologies applied both open heterogeneous network systems protect them from many potential security threats. However, these approaches only provide passive protection for normal operations, fail address measures several applications, particularly forensics industrial settings. Forensics applications running on must be capable taking legal action against invaders malicious damage or theft. This paper proposes efficient reliable framework (ERFF) intelligent critical industry 4.0 implementation plan. proposed ERFF consists a detective module validation model, with responsible detecting interaction between client terminal resource, which means investigator gathering evidence securely. security-validation model integrated far safer than common key-based cryptographic approaches. conceptual tested Live Digital Forensic Framework (LDF2C), results compared other existing frameworks that fulfill fundamental ISO/IEC 17025 accreditation requirements, including Legal Reliable (LRFF), Source Identification Network (SINFF) Logging Computing (LFCCF)). These were designed digital forensic requirements academia, experimental validate effectiveness reliability efficiency perspectives realistic scenarios

参考文章(30)
John Liederbach, Eric J. Fritsch, Robert W. Taylor, Digital Crime and Digital Terrorism ,(2005)
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, SIDNFF: Source identification network forensics framework for cloud computing international conference on consumer electronics. pp. 418- 419 ,(2015) , 10.1109/ICCE-TW.2015.7216975
Iqra Sattar, Muhammad Shahid, Younis Abbas, None, A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment International Journal of Computer Applications. ,vol. 115, pp. 23- 27 ,(2015) , 10.5120/20173-2370
Edewede Oriwoh, Paul Sant, The Forensics Edge Management System: A Concept and Design ubiquitous intelligence and computing. pp. 544- 550 ,(2013) , 10.1109/UIC-ATC.2013.71
Alecsandru Patrascu, Victor-Valeriu Patriciu, Logging framework for cloud computing forensic environments international conference on communications. pp. 1- 4 ,(2014) , 10.1109/ICCOMM.2014.6866662
Corrado Federici, None, AlmaNebula: A Computer Forensics Framework for the Cloud Procedia Computer Science. ,vol. 19, pp. 139- 146 ,(2013) , 10.1016/J.PROCS.2013.06.023
Ray Hunt, New developments in network forensics — Tools and techniques international conference on networks. pp. 376- 381 ,(2012) , 10.1109/ICON.2012.6506587
Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang, Shuo Chen, Cloud computing-based forensic analysis for collaborative network security management system Tsinghua Science & Technology. ,vol. 18, pp. 40- 50 ,(2013) , 10.1109/TST.2013.6449406
Konstantin Borisenko, Andrey Smirnov, Evgenia Novikova, Andrey Shorov, DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques industrial conference on data mining. pp. 197- 211 ,(2016) , 10.1007/978-3-319-41561-1_15