A cloud-edge based data security architecture for sharing and analysing cyber threat information

被引:56
作者
Chadwick, David W. [1 ]
Fan, Wenjun [1 ]
Costantino, Gianpiero [2 ]
de Lemos, Rogerio [1 ]
Di Cerbo, Francesco [3 ]
Herwono, Ian [4 ]
Manea, Mirko [5 ]
Mori, Paolo [2 ]
Sajjad, Ali [4 ]
Wang, Xiao-Si [4 ]
机构
[1] Univ Kent, Canterbury CT2 7NF, Kent, England
[2] CNR, Pisa, Italy
[3] SAP Labs, Mougins, France
[4] BT, Ipswich IP5 3RE, Suffolk, England
[5] HPE, Cernusco S-N, Cernusco Sul Naviglio, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 102卷
基金
欧盟地平线“2020”;
关键词
Data security architecture; Data outsourcing; Cyber threat information; Edge computing; Cloud-edge trust; Cloud security; PRIVACY;
D O I
10.1016/j.future.2019.06.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are increasingly linked. Providing effective cyber-security requires cooperation and collaboration among all the entities involved. Increasing the amount of cyber threat information (CTI) available for analysis allows better prediction, prevention and mitigation of cyber-attacks. However, organizations are deterred from sharing their CTI over concerns that sensitive and confidential information may be revealed to others. We address this concern by providing a flexible framework that allows the confidential sharing of CFI for analysis between collaborators. We propose a five-level trust model for a cloud-edge based data sharing infrastructure. The data owner can choose an appropriate trust level and CTI data sanitization approach, ranging from plain text, through anonymization/pseudonymization to homomorphic encryption, in order to manipulate the CTI data prior to sharing it for analysis. Furthermore, this sanitization can be performed by either an edge device or by the cloud service provider, depending upon the level of trust the organization has in the latter. We describe our trust model, our cloud-edge infrastructure, and its deployment model, which are designed to satisfy the broadest range of requirements for confidential CTI data sharing. Finally we briefly describe our implementation and the testing that has been carried out so far by four pilot projects that are validating our infrastructure. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:710 / 722
页数:13
相关论文
共 37 条
[31]   Privacy-Preserving Detection of Sensitive Data Exposure [J].
Shu, Xiaokui ;
Yao, Danfeng ;
Bertino, Elisa .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) :1092-1103
[32]   Finding your Way in the Definition Fog: Towards a Comprehensive of Fog Computing [J].
Vaquero, Luis M. ;
Rodero-Merino, Luis .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (05) :27-32
[33]   A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems [J].
Wang, Shangping ;
Zhang, Yinglong ;
Zhang, Yaling .
IEEE ACCESS, 2018, 6 :38437-38450
[34]   A novel trust mechanism based on Fog Computing in Sensor-Cloud System [J].
Wang, Tian ;
Zhang, Guangxue ;
Bhuiyan, Md Zakirul Alam ;
Liu, Anfeng ;
Jia, Weijia ;
Xie, Mande .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :573-582
[35]   Information Security in Big Data: Privacy and Data Mining [J].
Xu, Lei ;
Jiang, Chunxiao ;
Wang, Jian ;
Yuan, Jian ;
Ren, Yong .
IEEE ACCESS, 2014, 2 :1149-1176
[36]   Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues [J].
Zhang, Jiale ;
Chen, Bing ;
Zhao, Yanchao ;
Cheng, Xiang ;
Hu, Feng .
IEEE ACCESS, 2018, 6 :18209-18237
[37]   A survey of coordinated attacks and collaborative intrusion detection [J].
Zhou, Chenfeng Vincent ;
Leckie, Christopher ;
Karunasekera, Shanika .
COMPUTERS & SECURITY, 2010, 29 (01) :124-140