首页> 外文期刊>Future generation computer systems >A cloud-edge based data security architecture for sharing and analysing cyber threat information
【24h】

A cloud-edge based data security architecture for sharing and analysing cyber threat information

机译:基于云边缘的数据安全架构,用于共享和分析网络威胁信息

获取原文
获取原文并翻译 | 示例
       

摘要

Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are increasingly linked. Providing effective cyber-security requires cooperation and collaboration among all the entities involved. Increasing the amount of cyber threat information (CTI) available for analysis allows better prediction, prevention and mitigation of cyber-attacks. However, organizations are deterred from sharing their CTI over concerns that sensitive and confidential information may be revealed to others. We address this concern by providing a flexible framework that allows the confidential sharing of CFI for analysis between collaborators. We propose a five-level trust model for a cloud-edge based data sharing infrastructure. The data owner can choose an appropriate trust level and CTI data sanitization approach, ranging from plain text, through anonymization/pseudonymization to homomorphic encryption, in order to manipulate the CTI data prior to sharing it for analysis. Furthermore, this sanitization can be performed by either an edge device or by the cloud service provider, depending upon the level of trust the organization has in the latter. We describe our trust model, our cloud-edge infrastructure, and its deployment model, which are designed to satisfy the broadest range of requirements for confidential CTI data sharing. Finally we briefly describe our implementation and the testing that has been carried out so far by four pilot projects that are validating our infrastructure. (C) 2019 The Authors. Published by Elsevier B.V.
机译:网络攻击影响着我们生活的方方面面。随着网络和物理世界之间的联系越来越紧密,这些攻击不仅对网络安全而且对安全都造成严重后果。提供有效的网络安全需要所有相关实体之间的合作与协作。可用于分析的网络威胁信息(CTI)数量的增加可以更好地预测,预防和缓解网络攻击。但是,由于担心敏感和机密信息可能会泄露给他人,因此组织无法共享其CTI。我们通过提供一个灵活的框架来解决此问题,该框架允许CFI进行机密共享以在合作者之间进行分析。我们为基于云边缘的数据共享基础结构提出了五级信任模型。数据所有者可以选择适当的信任级别和CTI数据清理方法,从纯文本到匿名/伪别名再到同态加密,以在共享CTI数据进行分析之前对其进行操作。此外,根据组织对后者的信任程度,可以由边缘设备或云服务提供商执行此清理。我们描述了我们的信任模型,云边缘基础结构及其部署模型,这些模型旨在满足机密CTI数据共享的最广泛要求。最后,我们简要描述了我们的实施以及迄今为止通过四个验证我们的基础架构的试点项目所进行的测试。 (C)2019作者。由Elsevier B.V.发布

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号