Islam et al., 2019 - Google Patents
A comprehensive data security and forensic investigation framework for cloud-iot ecosystemIslam et al., 2019
View PDF- Document ID
- 14090103106783767138
- Author
- Islam M
- Mahin M
- Khatun A
- Roy S
- Kabir S
- Debnath B
- Publication year
- Publication venue
- GUB J. Sci. Eng
External Links
Snippet
The rapid growth of cloud and IoT has various security associated issues that can withhold its extensive acceptance. Based on this premise, this paper has presented comprehensive data security and DFI framework for the CloudIoT ecosystem. In our proposed framework we …
- 238000009114 investigational therapy 0 title abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yaqoob et al. | Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges | |
Mostafavi et al. | Fog computing architectures, privacy and security solutions | |
Badsha et al. | Privacy preserving cyber threat information sharing and learning for cyber defense | |
Islam et al. | A comprehensive data security and forensic investigation framework for cloud-iot ecosystem | |
Akter et al. | Cloud forensics: Challenges and blockchain based solutions | |
Islam et al. | digital forensic investigation framework for internet of things (IoT): A Comprehensive Approach | |
Razaque et al. | Efficient and reliable forensics using intelligent edge computing | |
Jayaraman et al. | RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud | |
Li et al. | An efficient blind filter: Location privacy protection and the access control in FinTech | |
Qatawneh et al. | Dfim: A New digital forensics investigation model for internet of things | |
Sarwar et al. | A survey on privacy preservation in fog-enabled internet of things | |
Trocoso-Pastoriza et al. | Orchestrating collaborative cybersecurity: a secure framework for distributed privacy-preserving threat intelligence sharing | |
Aljawarneh | Formulating models to survive multimedia big content from integrity violation | |
Kondepogu et al. | Secure E-health record sharing using blockchain: a comparative analysis study | |
Preuveneers et al. | Privacy-preserving polyglot sharing and analysis of confidential cyber threat intelligence | |
Adeniyi et al. | A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security | |
Isha et al. | Multilayered architecture for secure communication and transmission for internet of things | |
Nuthakki et al. | A Study on Security Issues and Attacks, Challenges and Future Improvements in Cloud-based IoT | |
Şentürk et al. | IoT security with blockchain: A review | |
Li et al. | Blockchain and OR Based Data Sharing Solution for Internet of Things | |
Jose et al. | Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique | |
Dubey et al. | Fuzzy logic based intelligent data sensitive security model for big data in healthcare | |
Rahmat et al. | A Comprehensive Survey on Securing Big Data | |
Alfaw et al. | Risk Management for 5G-Enabled Internet of Things by Using Machine Learning: A Survey | |
Kanika et al. | Security Integration in Big Data Life Cycle |