Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues
Abdullah Ayub Khan
Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan
Search for more papers by this authorAsif Ali Laghari
Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan
Search for more papers by this authorShafique Awan
Department of Computing Science & Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh, Pakistan
Search for more papers by this authorAwais Khan Jumani
Department of Computer Science, ILMA University Karachi, Sindh, Pakistan
Search for more papers by this authorAbdullah Ayub Khan
Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan
Search for more papers by this authorAsif Ali Laghari
Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan
Search for more papers by this authorShafique Awan
Department of Computing Science & Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh, Pakistan
Search for more papers by this authorAwais Khan Jumani
Department of Computer Science, ILMA University Karachi, Sindh, Pakistan
Search for more papers by this authorShibin David
Search for more papers by this authorR. S. Anand
Search for more papers by this authorV. Jeyakrishnan
Search for more papers by this authorM. Niranjanamurthy
Search for more papers by this authorSummary
This chapter studies the cloud security issues in network forensics and a large-scale machine-to-machine (M2M) communication impact on the fourth industrial revolution. The parameters help to gather, analyze, and document information about incidentals security and network-based crime activities. It also supports the solving of a complication related to the network traffic in the cloud, virtual machine dynamic migration, virtual resources of cloud clients, provides an environment like multi-tenancy, does not infringe on the security and protection of other cloud users, and most important, avoids transferring costs of large sets of data and processed directly. Cloud security and M2M communication permit the discovery of the best conceivable security configuration, improve communication, self-monitoring, and diagnose cloud security issues without the need for human intervention. Restrictions and crucial points are emphasized to arrange for initial forensics investigations and also further studies in this area. This chapter presents a model that is generic in nature for network forensics in the cloud environment as well as defines prototype artifact that articulates the M2M communication security issue that impacts on fourth industrial revolution application. We validate the architecture prototype with an implementation based on the OpenNebula Hypervisor web-based interface and the NetworkMiner analysis framework.
References
- Sun, Panjun. “Research on cloud computing service based on trust access control.” International Journal of Engineering Business Management 12 (2020): 1847979019897444.
- Siddiqui, Shadab, Manuj Darbari, and Diwakar Yagyasen. “ A comprehensive study of challenges and issues in cloud computing.” In Soft Computing and Signal Processing, pp. 325-344. Springer, Singapore, 2019.
- Chong, Ngo Yang. “ Cloud Computing Challenges in a General Perspective.” Journal of Computing and Management Studies 3 (2019).
- Meghanathan, Natarajan, Sumanth Reddy Allam, and Loretta A. Moore. “ Tools and techniques for network forensics.” arXiv preprint arXiv:1004.0570 (2010).
- Garfinkel, Simson. “Network forensics: Tapping the internet.” IEEE Internet Computing 6 (2002): 60-66.
- Sikos, Leslie F. “Packet analysis for network forensics: a comprehensive survey.” Forensic Science International: Digital Investigation 32 (2020): 200892.
- Frank, Alejandro Germán, Lucas Santos Dalenogare, and Néstor Fabián Ayala. “Industry 4.0 technologies: Implementation patterns in manufacturing companies.” International Journal of Production Economics 210 (2019): 15-26.
- Bassi, Lorenzo. “Industry 4.0: Hope, hype or revolution?.” In 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI), pp. 1-6. IEEE, 2017.
- Lasi, Heiner, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. “ Industry 4.0.” Business & Information Systems Engineering 6, no. 4 (2014): 239-242.
-
Vaidya, Saurabh, Prashant Ambad, and Santosh Bhosle. “Industry 4.0–a glimpse.” Procedia Manufacturing
20 (2018): 233-238.
10.1016/j.promfg.2018.02.034 Google Scholar
- Agolla, Joseph Evans. “Human capital in the smart manufacturing and industry 4.0 revolution.” Digital Transformation in Smart Manufacturing (2018): 41-58.
- Bahrin, Mohd Aiman Kamarul, Mohd Fauzi Othman, Nor Hayati Nor Azli, and Muhamad Farihin Talib. “Industry 4.0: A review on industrial automation and robotic.” Jurnal Teknologi 78, no. 6-13 (2016).
- Varghese, Anitha, and Deepaknath Tandur. “ Wireless requirements and challenges in Industry 4.0.” In 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 634-638. IEEE, 2014.
-
Lee, Jay, Hossein Davari, Jaskaran Singh, and Vibhor Pandhare. “Industrial Artificial Intelligence for industry 4.0-based manufacturing systems.” Manufacturing Letters
18 (2018): 20-23.
10.1016/j.mfglet.2018.09.002 Google Scholar
- Lo, Anthony, Yee Wei Law, and Martin Jacobsson. “A cellular-centric service architecture for machine-to-machine (M2M) communications.” IEEE wireless communications 20, no. 5 (2013): 143-151.
- Wu, Geng, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson. “M2M: From mobile to embedded internet.” IEEE Communications Magazine 49, no. 4 (2011): 36-43.
- Laghari, Asif Ali, Hui He, Asiya Khan, Neetesh Kumar, and RupakKharel. “Quality of experience framework for cloud computing (QoC).” IEEE Access 6 (2018): 64876-64890.
- Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. “A view of cloud computing.” Communications of the ACM 53, no. 4 (2010): 50-58.
- Laghari, Asif Ali, Hui He, Muhammad Shafiq, and Asiya Khan. “ Assessing effect of Cloud distance on end user's Quality of Experience (QoE).” In 2016 2nd IEEE international conference on computer and communications (ICCC), pp. 500-505.IEEE, 2016.
- Laghari, Asif Ali, Hui He, Imtiaz A. Halepoto, M. SullemanMemon, and Sajida Parveen. “Analysis of quality of experience frameworks for cloud computing.” IJCSNS 17, no. 12 (2017): 228.
- Kumar, Vishal, Asif Ali Laghari, ShahidKarim, Muhammad Shakir, and Ali Anwar Brohi. “Comparison of fog computing & cloud computing.” International Journal of Mathematical Sciences and Computing (IJMSC) 5, no. 1 (2019): 31-41.
- Manvi, Sunilkumar S., and Gopal Krishna Shyam. “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.” Journal of Network and Computer Applications 41 (2014): 424-440.
- Adhikari, Mainak, Sudarshan Nandy, and Tarachand Amgoth. “Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud.” Journal of Network and Computer Applications 128 (2019): 64-77.
-
Pereira, T., L. Barreto, and A. Amaral. “Network and information security challenges within Industry 4.0 paradigm.” Procedia manufacturing
13 (2017): 1253-1260.
10.1016/j.promfg.2017.09.047 Google Scholar
- Zhong, Ray Y., Xun Xu, Eberhard Klotz, and Stephen T. Newman. “Intelligent manufacturing in the context of industry 4.0: a review.” Engineering 3, no. 5 (2017): 616-630.
- Preuveneers, Davy, and Elisabeth Ilie-Zudor. “The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.” Journal of Ambient Intelligence and Smart Environments 9, no. 3 (2017): 287-298.
-
Stock, Tim, and Günther Seliger. “Opportunities of sustainable manufacturing in industry 4.0.” Procedia Cirp
40 (2016): 536-541.
10.1016/j.procir.2016.01.129 Google Scholar
- Gebhardt, Tobias, and Hans P. Reiser. “ Network forensics for cloud computing.” In IFIP International Conference on Distributed Applications and Interoperable Systems, pp. 29-42. Springer, Berlin, Heidelberg, 2013.
- Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. “ Managing security of virtual machine images in a cloud environment.” In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96. 2009.
- Crowell, Susan F., Jason A. Nikolai, and Andrew T. Thorstensen. “ Virtual machine trust isolation in a cloud environment.” U.S. Patent Application 13/969,705, filed February 19, 2015.
- Scott-Nash, Mark E. “ Roots-of-trust for measurement of virtual machines.” U.S. Patent 9,053,059, issued June 9, 2015.
- Ramarathinam, Aravind, and Srivatsan Parthasarathy. “ Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal.” U.S. Patent 9,342,326, issued May 17, 2016.
- Kent, Karen, Suzanne Chevalier, Tim Grance, and Hung Dang. “Guide to integrating forensic techniques into incident response.” NIST Special Publication 10, no. 14 (2006): 800-86.
- Milojičić, Dejan, Ignacio M. Llorente, and Ruben S. Montero. “Opennebula: A cloud management tool.” IEEE Internet Computing 15, no. 2 (2011): 11-14.
- Ismaeel, Salam, Ali Miri, Dharmendra Chourishi, and SM Reza Dibaj. “ Open source cloud management platforms: A review.” In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 470-475. IEEE, 2015.
- Dargahi, Tooska, Ali Dehghantanha, and Mauro Conti. “Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.” In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 185-204. Syngress, 2017.
- Barrowclough, John Patrick, and Rameez Asif. “Securing cloud hypervisors: A survey of the threats, vulnerabilities, and countermeasures.” Security and Communication Networks 2018 (2018).
-
Stergiou, Christos L., Andreas P. Plageras, Konstantinos E. Psannis, and Brij B. Gupta. “Secure machine learning scenario from big data in cloud computing via internet of things network.” In Handbook of Computer Networks and Cyber Security, pp. 525-554. Springer, Cham, 2020.
10.1007/978-3-030-22277-2_21 Google Scholar
- Chang, David Yu, Messaoud Benantar, John Yow-Chun Chang, and Vishwanath Venkataramappa. “Authentication and authorization methods for cloud computing security.” U.S. Patent 8,769,622 issued July 1, 2014.
- Xue, Colin Ting Si, and Felicia Tiong Wee Xin. “Benefits and challenges of the adoption of cloud computing in business.” International Journal on Cloud Computing: Services and Architecture
6, no. 6 (2016): 1-15.
10.5121/ijccsa.2016.6601 Google Scholar