Chapter 2

Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues

Abdullah Ayub Khan

Abdullah Ayub Khan

Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan

Search for more papers by this author
Asif Ali Laghari

Asif Ali Laghari

Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan

Search for more papers by this author
Shafique Awan

Shafique Awan

Department of Computing Science & Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh, Pakistan

Search for more papers by this author
Awais Khan Jumani

Awais Khan Jumani

Department of Computer Science, ILMA University Karachi, Sindh, Pakistan

Search for more papers by this author
First published: 15 June 2021
Citations: 6

Summary

This chapter studies the cloud security issues in network forensics and a large-scale machine-to-machine (M2M) communication impact on the fourth industrial revolution. The parameters help to gather, analyze, and document information about incidentals security and network-based crime activities. It also supports the solving of a complication related to the network traffic in the cloud, virtual machine dynamic migration, virtual resources of cloud clients, provides an environment like multi-tenancy, does not infringe on the security and protection of other cloud users, and most important, avoids transferring costs of large sets of data and processed directly. Cloud security and M2M communication permit the discovery of the best conceivable security configuration, improve communication, self-monitoring, and diagnose cloud security issues without the need for human intervention. Restrictions and crucial points are emphasized to arrange for initial forensics investigations and also further studies in this area. This chapter presents a model that is generic in nature for network forensics in the cloud environment as well as defines prototype artifact that articulates the M2M communication security issue that impacts on fourth industrial revolution application. We validate the architecture prototype with an implementation based on the OpenNebula Hypervisor web-based interface and the NetworkMiner analysis framework.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.