Efficient and reliable forensics using intelligent edge computing

被引:25
作者
Razaque, Abdul [1 ]
Aloqaily, Moayad [2 ]
Almiani, Muder [3 ]
Jararweh, Yaser [4 ]
Srivastava, Gautam [5 ,6 ]
机构
[1] Int Informat Technol Univ, Dept Comp Engn & Informat Secur, Alma Ata, Kazakhstan
[2] Al Ain Univ, Fac Engn, Abu Dhabi, U Arab Emirates
[3] Gulf Univ Sci & Technol, Kuwait, Kuwait
[4] Jordan Univ Sci & Technol, Irbid, Jordan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[6] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 118卷
关键词
Intelligent edge computing; Reliability and efficiency; Cloud computing; Peer-to-peer edges; Security; Forensics framework; CLOUD; FRAMEWORK; ENVIRONMENT;
D O I
10.1016/j.future.2021.01.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to reduce the use of computing resources in the network, as well as support information sharing and intercommunication efforts within the network. Secure edge computing methodologies are applied in both open and heterogeneous network systems to protect them from many potential security threats. However, these approaches only provide passive protection for normal edge computing operations, and fail to address the security measures of several applications, particularly forensics in industrial settings. Forensics applications running on edge computing must be capable of support taking legal action against invaders for malicious damage or information theft. This paper proposes an efficient and reliable forensics framework (ERFF) to address industrial intelligent edge computing critical for the industry 4.0 implementation plan. The proposed ERFF consists of a detective module and validation model, with the detective module responsible for detecting the interaction between the client terminal and the edge resource, which means the investigator is capable of gathering the evidence securely. The security-validation model integrated with ERFF is far safer than sharing common key-based cryptographic approaches. The proposed conceptual framework is tested with Live Digital Forensic Framework for a Cloud (LDF2C), and results are compared with other existing industrial frameworks that fulfill fundamental ISO/IEC 17025 accreditation requirements, including Legal Reliable Forensic Framework (LRFF), Source Identification Network Forensics Framework (SINFF) and Logging Framework for Cloud Computing Forensic (LFCCF)). These frameworks were designed to support the digital forensic requirements of industry and academia, and experimental results validate the effectiveness of the proposed framework from reliability and efficiency perspectives as well as realistic scenarios (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:230 / 239
页数:10
相关论文
共 30 条
[1]   A Blockchain-Based Decentralized Composition Solution for IoT Services [J].
Al Ridhawi, Ismaeel ;
Aloqaily, Moayad ;
Boukerche, Azzedine ;
Jaraweh, Yaser .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[2]   A continuous diversified vehicular cloud service availability framework for smart cities [J].
Al Ridhawi, Ismaeel ;
Aloqaily, Moayad ;
Kantarci, Burak ;
Jararweh, Yaser ;
Mouftah, Hussein T. .
COMPUTER NETWORKS, 2018, 145 :207-218
[3]   Improving fog computing performance via Fog-2-Fog collaboration [J].
Al-khafajiy, Mohammed ;
Baker, Thar ;
Al-Libawy, Hilal ;
Maamar, Zakaria ;
Aloqaily, Moayad ;
Jararweh, Yaser .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :266-280
[4]   DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques [J].
Borisenko, Konstantin ;
Smirnov, Andrey ;
Novikova, Evgenia ;
Shorov, Andrey .
ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2016, 9728 :197-211
[5]   Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System [J].
Chen, Zhen ;
Han, Fuye ;
Cao, Junwei ;
Jiang, Xin ;
Chen, Shuo .
TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (01) :40-50
[6]  
ELHOSENY M, 2017, IEEE T SUSTAIN COMPU
[7]   AlmaNebula: a computer forensics framework for the Cloud [J].
Federici, Corrado .
4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 :139-146
[8]   Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV [J].
Feng, Chaosheng ;
Yu, Keping ;
Aloqaily, Moayad ;
Alazab, Mamoun ;
Lv, Zhihan ;
Mumtaz, Shahid .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13784-13795
[9]   Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics [J].
Horsman, Graeme .
COMPUTERS & SECURITY, 2018, 73 :294-306
[10]  
Hu D., 2020, FUTURE GENER COMP SY