skip to main content
10.1145/3647444.3647896acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Leverging graphbased Analysis and Deep learning for Dynamic cloud forensic profiling operations

Published: 13 May 2024 Publication History

Abstract

As cloud computing environments become increasingly complex and ubiquitous, the need for robust, real-time, and adaptive forensic capabilities becomes paramount. Cloud-based threats continue to evolve, thereby challenging traditional forensic methods. The inadequacy of existing techniques not only compromises security but also hampers the timely identification of cyber threats, leading to potentially severe financial and operational consequences. Current approaches to cloud forensics often rely on isolated data sources and traditional machine learning techniques, which limit their adaptability and contextual awareness. These methods suffer from several limitations, including a lack of real-time processing capabilities, insufficient coverage of heterogeneous data sources, and limited effectiveness in handling dynamic cloud configurations. This paper presents a novel framework that leverages Long Short-Term Memory (LSTM) based Graph Analysis for relational data processing, Deep Q-Network (DQN) for intelligent decision-making, and Gated Recurrent Units (GRU) coupled with Recurrent Neural Networks (RNN) for dynamic user profiling operations. This synergistic approach offers a unique combination of adaptability, real-time processing operations, and deep contextual understandings. We demonstrate that our framework improves the precision of attack event classification by 4.5%, accuracy by 8.3%, recall by 4.9%, and the Area under the Curve (AUC) by 5.5% across various scenarios. These advancements contribute significantly to minimizing false positives and false negatives, enhancing real-time threat identification and user-specific anomaly detection processes. By addressing the shortcomings of existing methods, this paper paves the way for a new generation of adaptive, efficient, and effective cloud forensic systems, thereby significantly augmenting the security posture of modern cloud computing environments.

References

[1]
M. A. M. Ahsan, A. W. B. A. Wahab, M. Y. I. B. Idris, S. Khan, E. Bachura and K. -K. R. Choo. 2021. "CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics," in IEEE Transactions on Sustainable Computing, vol. 6, no. 2, pp. 184-196.
[2]
X. -J. Lin, L. Sun and H. Qu, 2021 "Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2773-2775, 2021.
[3]
J. Shen, P. Zeng, K. -K. R. Choo and C. Li, 2023 "A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1156-1168. 3236451.
[4]
Y. Yang, Y. Chen, F. Chen and J. Chen, 2022 "An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1359-1371.
[5]
K. Zhang, Z. Jiang, J. Ning and X. Huang, 2022, "Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1771-1784.
[6]
X. Liu, X. Fu, X. Du, B. Luo and M. Guizani, 2023 "Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes," in IEEE Transactions on Network and Service Management, vol. 20, no. 2, pp. 945-960, June
[7]
C. Wang, D. Wang, Y. Duan and X. Tao, 2023 "Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2961-2976. on Services Computing, vol. 15, no. 3, pp. 1206-1219, 1 May-June 2022.
[8]
Y. Miao, Q. Huang, M. Xiao and W. Susilo, 2022"Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3663-3676. 3211642.
[9]
S. Ma, Y. Zhong and Q. Huang, 2022 "Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3758-3772.
[10]
Y. Yang, L. Zhang, Y. Zhao, K. -K. R. Choo and Y. Zhang, 2022"Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 317-331, 2022. 3140657.
[11]
H. Shuai and Q. Liu, 2023. "Geometry-Injected Image-Based Point Cloud Semantic Segmentation," in IEEE Transactions on Geoscience and Remote Sensing, vol. 61, pp. 1-10, 2023, Art no. 5701510.
[12]
K. Yang, J. Shu and R. Xie, 2022 "Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 71-84, 2023.
[13]
B. Chen, T. Xiang, D. He, H. Li and K. -K. R. Choo2022, "BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3171-3184, 2023.
[14]
W. Yang and Y. Zhu2020, "A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 100-115, 2021.
[15]
M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty and M. Ryan, 2020."Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment," in IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7704-7715, Nov. 2021.
[16]
S. Li, Y. Zhang, C. Xu and K. Chen.2021, "Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2564-2565.
[17]
Y. Zheng, "SetRkNN 2022: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud, " in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 888-903.
[18]
S. Xu, J. Ning, X. Huang, J. Zhou and R. H. Deng, 2021 "Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4746-4761.
[19]
K. Zhang, X. Wang, J. Ning and X. Huang, 2022 "Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 449-462.
[20]
M. Oqaily 2019, "SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2486-2505, 1 Sept.-Oct. 2021.
[21]
Y. Zheng, 2023 "PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2030-2045, 2023.
[22]
D. Bhattacharya, F. Currim and S. Ram, 2021 "Evaluating Distributed Computing Infrastructures: An Empirical Study Comparing Hadoop Deployments on Cloud and Local Systems," in IEEE Transactions on Cloud Computing, vol. 9, no. 3, pp. 1075-1088, 1 July-Sept.
[23]
W. A. Mahrous, M. Farouk and S. M. Darwish, 2021 "An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash," in IEEE Access, vol. 9, pp. 151327-151336, 2021.
[24]
W. Liu, X. Liu, Z. Li, B. Liu, R. Yu and L. Wang, 2022 "Retrofitting LBR Profiling to Enhance Virtual Machine Introspection," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2311-2323, 2022.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 35
    Total Downloads
  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)8
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media