[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Islam et al., 2019 - Google Patents

A comprehensive data security and forensic investigation framework for cloud-iot ecosystem

Islam et al., 2019

View PDF
Document ID
14090103106783767138
Author
Islam M
Mahin M
Khatun A
Roy S
Kabir S
Debnath B
Publication year
Publication venue
GUB J. Sci. Eng

External Links

Snippet

The rapid growth of cloud and IoT has various security associated issues that can withhold its extensive acceptance. Based on this premise, this paper has presented comprehensive data security and DFI framework for the CloudIoT ecosystem. In our proposed framework we …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Yaqoob et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges
Mostafavi et al. Fog computing architectures, privacy and security solutions
Badsha et al. Privacy preserving cyber threat information sharing and learning for cyber defense
Islam et al. A comprehensive data security and forensic investigation framework for cloud-iot ecosystem
Akter et al. Cloud forensics: Challenges and blockchain based solutions
Islam et al. digital forensic investigation framework for internet of things (IoT): A Comprehensive Approach
Razaque et al. Efficient and reliable forensics using intelligent edge computing
Jayaraman et al. RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
Li et al. An efficient blind filter: Location privacy protection and the access control in FinTech
Qatawneh et al. Dfim: A New digital forensics investigation model for internet of things
Sarwar et al. A survey on privacy preservation in fog-enabled internet of things
Trocoso-Pastoriza et al. Orchestrating collaborative cybersecurity: a secure framework for distributed privacy-preserving threat intelligence sharing
Aljawarneh Formulating models to survive multimedia big content from integrity violation
Kondepogu et al. Secure E-health record sharing using blockchain: a comparative analysis study
Preuveneers et al. Privacy-preserving polyglot sharing and analysis of confidential cyber threat intelligence
Adeniyi et al. A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Isha et al. Multilayered architecture for secure communication and transmission for internet of things
Nuthakki et al. A Study on Security Issues and Attacks, Challenges and Future Improvements in Cloud-based IoT
Şentürk et al. IoT security with blockchain: A review
Li et al. Blockchain and OR Based Data Sharing Solution for Internet of Things
Jose et al. Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
Dubey et al. Fuzzy logic based intelligent data sensitive security model for big data in healthcare
Rahmat et al. A Comprehensive Survey on Securing Big Data
Alfaw et al. Risk Management for 5G-Enabled Internet of Things by Using Machine Learning: A Survey
Kanika et al. Security Integration in Big Data Life Cycle