Skip to main content
Top
Published in: The Journal of Supercomputing 10/2018

02-05-2018

Next-generation cybersecurity through a blockchain-enabled federated cloud framework

Authors: Olumide O. Malomo, Danda B. Rawat, Moses Garuba

Published in: The Journal of Supercomputing | Issue 10/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Minimizing the breach detection gap (BDG) for cyber-attacks is a big concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Cyber defense solutions are advancing to combat risks and attacks from traditional to next-generation advanced defense protection solutions. However, many individuals, organizations and businesses continue to be hit by new waves of global cyber-attacks. In this paper, we present a blockchain-enabled federated cloud computing framework that uses the Dempster–Shafer theory to reduce BDG by continuously monitoring and analyzing the network traffics against cyber-attacks. We evaluate the proposed approach using numerical results, and the proposed approach outperforms the traditional approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang Y-M (2009) Security challenges in an increasingly connected world Wang Y-M (2009) Security challenges in an increasingly connected world
2.
go back to reference Government Accountability Office (GAO), Center for Science, Technology, and Engineering Report to Congressional Requesters: Internet of Things Status and implications of an increasingly connected world Government Accountability Office (GAO), Center for Science, Technology, and Engineering Report to Congressional Requesters: Internet of Things Status and implications of an increasingly connected world
3.
go back to reference FTC Staff Reporting, “Internet of Things: Privacy and Security in a Connected World” FTC Staff Reporting, “Internet of Things: Privacy and Security in a Connected World”
4.
go back to reference EndGame (2016) Mind the Detection Gap: Three things SOC teams must consider for earliest detection of unknown threats EndGame (2016) Mind the Detection Gap: Three things SOC teams must consider for earliest detection of unknown threats
5.
go back to reference Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Iss Inf Warf Secur Res 1:80 Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Iss Inf Warf Secur Res 1:80
6.
go back to reference SANS Institute (2014) Killing advanced threats in their tracks: an intelligent approach to attack prevention SANS Institute (2014) Killing advanced threats in their tracks: an intelligent approach to attack prevention
7.
go back to reference Silvey L (2016) Cybersecurity and data breach: impact on business in Illinois Silvey L (2016) Cybersecurity and data breach: impact on business in Illinois
8.
go back to reference Kaspersky Lab. (2017) Damage control: the cost of security breaches IT security risks special report series Kaspersky Lab. (2017) Damage control: the cost of security breaches IT security risks special report series
9.
go back to reference Germano JH, Goldman ZK (2014) After the breach: cybersecurity liability risk Germano JH, Goldman ZK (2014) After the breach: cybersecurity liability risk
10.
go back to reference Experis (2014) Security breaches: is anyone safe? Experis (2014) Security breaches: is anyone safe?
11.
go back to reference Valdetero J, Zetoony D, Cave B (2014) Data security breaches incident preparedness and response Valdetero J, Zetoony D, Cave B (2014) Data security breaches incident preparedness and response
12.
go back to reference Ponemon Institute (2011) Reputation impact of a data breach Ponemon Institute (2011) Reputation impact of a data breach
13.
go back to reference NTT Com Security (2016) Security Breaches—what’s the real cost to your business? Risk:Value Report NTT Com Security (2016) Security Breaches—what’s the real cost to your business? Risk:Value Report
16.
go back to reference Phan B Seven key features to help you stop advanced evasion techniques at the firewall Senior Security Architect, McAfee Phan B Seven key features to help you stop advanced evasion techniques at the firewall Senior Security Architect, McAfee
17.
go back to reference Matrosov A, Rodionov E (2013) Advanced evasion techniques by Win32/Gapz Matrosov A, Rodionov E (2013) Advanced evasion techniques by Win32/Gapz
18.
go back to reference OECD (2010) The changing consumer and market landscape OECD (2010) The changing consumer and market landscape
19.
go back to reference KPMG (2017) The changing landscape of disruptive technologies KPMG (2017) The changing landscape of disruptive technologies
20.
go back to reference Stratton AM, Wong KW (1997) Issues essential to world web market Stratton AM, Wong KW (1997) Issues essential to world web market
21.
22.
go back to reference Narayanan A, Miller A (2016) Cryptocurrencies, blockchains, and smart contracts; hardware for deep learning Narayanan A, Miller A (2016) Cryptocurrencies, blockchains, and smart contracts; hardware for deep learning
23.
go back to reference Lemieux VL (2018) Trusting records: is blockchain technology the answer? Lemieux VL (2018) Trusting records: is blockchain technology the answer?
24.
go back to reference Dinh TT, Wang J, Chen G, Liu R, Ooi BC, Tan K (2017) BLOCKBENCH: a framework for analyzing private blockchain Dinh TT, Wang J, Chen G, Liu R, Ooi BC, Tan K (2017) BLOCKBENCH: a framework for analyzing private blockchain
25.
go back to reference Li W, Fedorov S, Sforzin A, Karame GO Towards scalable and private industrial blockchains Li W, Fedorov S, Sforzin A, Karame GO Towards scalable and private industrial blockchains
26.
go back to reference Emmadi N, Narumanchi H (2017) Reinforcing immutability of permissioned blockchains with keyless signatures. Infrastructure Emmadi N, Narumanchi H (2017) Reinforcing immutability of permissioned blockchains with keyless signatures. Infrastructure
27.
go back to reference Stiller B, Bocek T Blockchains and smart contracts—a valuable alternative for distributed data bases Stiller B, Bocek T Blockchains and smart contracts—a valuable alternative for distributed data bases
28.
go back to reference Digitalogy (2017) All you need to know about blockchain! Digitalogy (2017) All you need to know about blockchain!
29.
go back to reference Tapscott D, Tapscott A (2017) How blockchain will change organization Tapscott D, Tapscott A (2017) How blockchain will change organization
30.
go back to reference Ding CH, Nutanong S, Buyya R Peer-to-peer networks for content sharing Ding CH, Nutanong S, Buyya R Peer-to-peer networks for content sharing
31.
32.
go back to reference Norta A (2015) Creation of smart-contracting collaborations for decentralized autonomous organization Norta A (2015) Creation of smart-contracting collaborations for decentralized autonomous organization
34.
go back to reference Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
35.
go back to reference Pilkington M (2015) Blockchain technology: principles and applications Pilkington M (2015) Blockchain technology: principles and applications
36.
go back to reference Hull R (2017) Blockchain: distributed event-based processing in a data-centric world Hull R (2017) Blockchain: distributed event-based processing in a data-centric world
37.
go back to reference Gervais A, Karame GO, Wust K (2016) On the security and performance of proof of work blockchains Gervais A, Karame GO, Wust K (2016) On the security and performance of proof of work blockchains
38.
go back to reference Larimer D (2013) Transactions as proof-of-stake Larimer D (2013) Transactions as proof-of-stake
39.
go back to reference Milutinovic M, Wu H, He H, Kanwal M (2016) Proof of luck: an efficient blockchain consensus protocol Milutinovic M, Wu H, He H, Kanwal M (2016) Proof of luck: an efficient blockchain consensus protocol
40.
go back to reference Cachin C (2016) Architecture of the hyperledger blockchain fabric Cachin C (2016) Architecture of the hyperledger blockchain fabric
41.
go back to reference Mazieres D (2016) The stellar consensus protocol: a federated model for internet-level consensus Mazieres D (2016) The stellar consensus protocol: a federated model for internet-level consensus
42.
go back to reference Baliga A (2017) Understanding blockchain consensus models Baliga A (2017) Understanding blockchain consensus models
45.
go back to reference Sentz K, Ferson S (2002) Combination of Evidence in Dempster–Shafer theory, April 2002 Sentz K, Ferson S (2002) Combination of Evidence in Dempster–Shafer theory, April 2002
46.
go back to reference Horneman A, Dell N (2014) Smart collection and storage method for network traffic data Horneman A, Dell N (2014) Smart collection and storage method for network traffic data
47.
go back to reference He J (2015) Dempster–Shafer theory of evidence He J (2015) Dempster–Shafer theory of evidence
48.
go back to reference Rawat DB, Njilla L, Kwiat K, Kamhoua CA (2018) iShare: Blockchain Based Privacy-aware Multi-Agent Information Sharing Games for Cybersecurity. In: Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. Maui, Hawaii, USA, March 5–8, 2018 Rawat DB, Njilla L, Kwiat K, Kamhoua CA (2018) iShare: Blockchain Based Privacy-aware Multi-Agent Information Sharing Games for Cybersecurity. In: Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. Maui, Hawaii, USA, March 5–8, 2018
49.
go back to reference Rawat DB, Alshaikhi A (2018) “Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints.” In: Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium, Maui, Hawaii, USA, March 5–8, 2018 Rawat DB, Alshaikhi A (2018) “Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints.” In: Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium, Maui, Hawaii, USA, March 5–8, 2018
Metadata
Title
Next-generation cybersecurity through a blockchain-enabled federated cloud framework
Authors
Olumide O. Malomo
Danda B. Rawat
Moses Garuba
Publication date
02-05-2018
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 10/2018
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2385-7

Other articles of this Issue 10/2018

The Journal of Supercomputing 10/2018 Go to the issue

Premium Partner