Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies

Collecting and preserving the smart environment logs connected to cloud storage is challenging due to the black-box nature and the multi-tenant cloud models which can pervade log secrecy and privacy. The existing work for log secrecy and confidentiality depends on cloud-assisted models, but these models are prone to multi-stakeholder collusion problems. This study proposes ’PLAF,’ a holistic and automated architecture for proactive forensics in the Internet of Things (IoT) that considers the security and privacy-aware distributed edge node log preservation by tackling the multi-stakeholder issue in a fog enabled cloud. We have developed a test-bed to implement the specification, as mentioned earlier, by incorporating many state-of-the-art technologies in one place. We used Holochain to preserve log integrity, provenance, log verifiability, trust admissibility, and ownership non-repudiation. We introduced the privacy preservation automation of log probing via non-malicious command and control botnets in the container environment. For continuous and robust integration of IoT microservices, we used docker containerization technology. For secure storage and session establishment for logs validation, Paillier Homomorphic Encryption, and SSL with Curve25519 is used respectively. We performed the security and performance analysis of the proposed PLAF architecture and showed that, in stress conditions, the automatic log harvesting running in containers gives a 95% confidence interval. Moreover, we show that log preservation via Holochain can be performed on ARM-Based architectures such as Raspberry Pi in a very less amount of time when compared with RSA and blockchain.

[1]  Siguang Chen,et al.  Latency‐minimum offloading decision and resource allocation for fog‐enabled Internet of Things networks , 2020, Trans. Emerg. Telecommun. Technol..

[2]  Wen-Chuan Lee,et al.  Trojaning Attack on Neural Networks , 2018, NDSS.

[3]  Thar Baker,et al.  The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey , 2019, Sensors.

[4]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[5]  Nadra Guizani,et al.  Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.

[6]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[7]  Mohsen Guizani,et al.  A Lightweight Privacy-Aware IoT-Based Metering Scheme for Smart Industrial Ecosystems , 2021, IEEE Transactions on Industrial Informatics.

[8]  Ikram Ud Din,et al.  Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things , 2019, IEEE Access.

[9]  Ragib Hasan,et al.  Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service , 2016, IEEE Transactions on Dependable and Secure Computing.

[10]  Hein S. Venter,et al.  On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges , 2018 .

[11]  Muhammad Khurram Khan,et al.  Multi‐tier authentication schemes for fog computing: Architecture, security perspective, and challenges , 2019, Int. J. Commun. Syst..

[12]  Mohsen Guizani,et al.  Spammer Detection and Fake User Identification on Social Networks , 2019, IEEE Access.

[13]  Alan T. Sherman,et al.  Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .

[14]  Eoghan Casey,et al.  IoT forensic challenges and opportunities for digital traces , 2019, Digit. Investig..

[15]  Eui-Nam Huh,et al.  eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics , 2019, Symmetry.

[16]  Chung-Yi Lin,et al.  Secure logging framework integrating with cloud database , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[17]  Byung-Seo Kim,et al.  The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.

[18]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[19]  Joel J. P. C. Rodrigues,et al.  Energy and performance aware fog computing: A case of DVFS and green renewable energy , 2019, Future Gener. Comput. Syst..

[20]  Zahid Anwar,et al.  Digital Forensics for Eucalyptus , 2011, 2011 Frontiers of Information Technology.

[21]  Murad Khan,et al.  ELC: Edge Linked Caching for content updating in information-centric Internet of Things , 2020, Comput. Commun..

[22]  Abhishek Kumar,et al.  Space-code bloom filter for efficient per-flow traffic measurement , 2004, IEEE INFOCOM 2004.

[23]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[24]  George Sibiya,et al.  Digital forensic readiness in a cloud environment , 2013, 2013 Africon.

[25]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[26]  Mohsen Guizani,et al.  Machine learning in the Internet of Things: Designed techniques for smart cities , 2019, Future Gener. Comput. Syst..

[27]  You-Jin Song,et al.  A Study on the Design of Fog Computing Architecture Using Sensor Networks , 2018, Sensors.

[28]  Haleem Farman,et al.  Toward Integrating Vehicular Clouds with IoT for Smart City Services , 2019, IEEE Network.

[29]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[30]  Abdullah Gani,et al.  Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges , 2019, IEEE Access.

[31]  Alecsandru Patrascu,et al.  Logging for Cloud Computing Forensic Systems , 2015, Int. J. Comput. Commun. Control.

[32]  Constandinos X. Mavromoustakis,et al.  Joint Task Offloading and Resource Allocation for Delay-Sensitive Fog Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[33]  Abdellah Ezzati,et al.  A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing , 2018, FNC/MobiSPC.

[34]  Javier López,et al.  IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations , 2018, Sensors.

[35]  Carsten Maple,et al.  Named Data Networking for Efficient IoT-based Disaster Management in a Smart Campus , 2020 .

[36]  Gholamhossein Ekbatanifard,et al.  Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology , 2019, IEEE Access.

[37]  Ikram Ud Din,et al.  RTS: A Robust and Trusted Scheme for IoT-Based Mobile Wireless Mesh Networks , 2020, IEEE Access.

[38]  Raffael Marty,et al.  Cloud application logging for forensics , 2011, SAC.

[39]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[40]  Mohsen Guizani,et al.  StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks , 2020, IEEE Access.

[41]  Ikram Ud Din,et al.  SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things , 2020, Sensors.

[42]  Mohsen Guizani,et al.  Integrating Fog Computing with VANETs: A Consumer Perspective , 2019, IEEE Communications Standards Magazine.

[43]  Ainuddin Wahid Abdul Wahab,et al.  CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics , 2018, IEEE Transactions on Sustainable Computing.