Cloud-Centric Framework for isolating Big data as forensic evidence from IoT infrastructures

Cloud computing paradigm continues to revolutionize the way business processes are being conducted through the provision of massive resources, reliability across networks and ability to offer parallel processing. However, miniaturization, proliferation and nanotechnology within devices has enabled digitization of almost every object which eventually has seen the rise of a new technological marvel dubbed Internet of Things (IoT). IoT enables self-configurable/smart devices to connect intelligently through Radio Frequency Identification (RFID), WI-FI, LAN, GPRS and other methods by further enabling timeously processing of information. Based on these developments, the integration of the cloud and IoT infrastructures has led to an explosion of the amount of data being exchanged between devices which have in turn enabled malicious actors to use this as a platform to launch various cybercrime activities. Consequently, digital forensics provides a significant approach that can be used to provide an effective post-event response mechanism to these malicious attacks in cloud-based IoT infrastructures. Therefore, the problem being addressed is that, at the time of writing this paper, there still exist no accepted standards or frameworks for conducting digital forensic investigation on cloud-based IoT infrastructures. As a result, the authors have proposed a cloud-centric framework that is able to isolate Big data as forensic evidence from IoT (CFIBD-IoT) infrastructures for proper analysis and examination. It is the authors' opinion that if the CFIBD-IoT framework is implemented fully it will support cloud-based IoT tool creation as well as support future investigative techniques in the cloud with a degree of certainty.

[1]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[2]  Indrakshi Ray,et al.  A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[3]  Hein S. Venter,et al.  Adding event reconstruction to a Cloud Forensic Readiness model , 2015, 2015 Information Security for South Africa (ISSA).

[4]  Giancarlo Fortino Rende,et al.  Internet of things based on smart objects , 2014 .

[5]  S. Tripathy,et al.  Design challenges and security issues in the Internet of Things , 2015, 2015 IEEE Region 10 Symposium.

[6]  Giancarlo Fortino,et al.  Integration of agent-based and Cloud Computing for the smart objects-oriented IoT , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[7]  Nickson M. Karie,et al.  Building Ontologies for Digital Forensic Terminologies , 2016 .

[8]  Giancarlo Fortino,et al.  Towards Cyberphysical Digital Libraries: Integrating IoT Smart Objects into Digital Libraries , 2016, Management of Cyber Physical Objects in the Future Internet of Things.

[9]  Giancarlo Fortino,et al.  Internet of Things Based on Smart Objects, Technology, Middleware and Applications , 2014, Internet of Things Based on Smart Objects, Technology, Middleware and Applications.

[10]  Zaigham Mahmood,et al.  Cloud Computing: Concepts, Technology & Architecture , 2013 .

[11]  Nickson M. Karie,et al.  Measuring semantic similarity between digital forensics terminologies using web search engines , 2012, 2012 Information Security for South Africa.

[12]  Michele Zorzi,et al.  BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).

[13]  Carl Lagoze,et al.  Big Data, data integrity, and the fracturing of the control zone , 2014, Big Data Soc..

[14]  Raj Jain,et al.  An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments , 2015, IEEE Internet of Things Journal.

[15]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[16]  Dmitry Zegzhda,et al.  Achieving Internet of Things security via providing topological sustainability , 2015, 2015 Science and Information Conference (SAI).

[17]  Ragib Hasan,et al.  Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[18]  Nickson M. Karie,et al.  How an IoT-enabled “smart refrigerator” can play a clandestine role in perpetuating cyber-crime , 2017, 2017 IST-Africa Week Conference (IST-Africa).

[19]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[20]  Victor R. Kebande,et al.  A Cloud Forensic Readiness Model Using a Botnet as a Service , 2014 .