2020
DOI: 10.3390/electronics9071172
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies

Abstract: Collecting and preserving the smart environment logs connected to cloud storage is challenging due to the black-box nature and the multi-tenant cloud models which can pervade log secrecy and privacy. The existing work for log secrecy and confidentiality depends on cloud-assisted models, but these models are prone to multi-stakeholder collusion problems. This study proposes ’PLAF,’ a holistic and automated architecture for proactive forensics in the Internet of Things (IoT) that considers the security and priva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 51 publications
0
25
0
1
Order By: Relevance
“…The main advantage of fog computing is the reduction of the end to end latency of an application. This study complements the existing architecture [15][16][17][18][19][20][21][22][23][24] which is based on SOA. The work creates a system which consists of three layers such as user-end, fog end and cloud end as shown in Figure 1.…”
Section: The Proposed Solutionmentioning
confidence: 89%
“…The main advantage of fog computing is the reduction of the end to end latency of an application. This study complements the existing architecture [15][16][17][18][19][20][21][22][23][24] which is based on SOA. The work creates a system which consists of three layers such as user-end, fog end and cloud end as shown in Figure 1.…”
Section: The Proposed Solutionmentioning
confidence: 89%
“…us, privacy preservation is becoming more important [77][78][79]. In addition, intelligent IoT applications enhanced with cloud, edge, and fog computing increasingly deal with personal information to provide intelligent services, and many studies on personal information protection and data protection are being conducted [80][81][82][83].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…A SERIOUS concentration has been made in the vehicular ad hoc network (VANET) technology [1], [2] since 1990s, and especially in the last decade, many advancements have been seen. Internet of Things (IoT) has been deployed (and being deployed) in various domains, such as agriculture [3], [4], healthcare [5]- [8], cloud computing [9], [10], edge computing [11], smart cities [12]- [14], smart homes [15], etc [16], [17]. However, VANETs in combination with IoT is a familiar research topic and has attracted attention from the research community at large [18].…”
Section: Introductionmentioning
confidence: 99%