2020
DOI: 10.1016/j.future.2019.06.026
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-edge based data security architecture for sharing and analysing cyber threat information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
50
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(51 citation statements)
references
References 14 publications
0
50
0
1
Order By: Relevance
“…Both studies address the studies conducted towards this aim in the EU project of Collaborative and Confidential Information Sharing and Analysis for Cyber Protection (C3ISP). Based on the C3ISP framework, where four pilot projects offered a wide range of use cases to test security and trust requirements prior to CTI sharing, [13] proposed a five-level trust model for a cloud-edge based data sharing infrastructure. The results, although slightly premature, showed that both data analytics and data sanitisation can be performed while testing several deployment models.…”
Section: Related Workmentioning
confidence: 99%
“…Both studies address the studies conducted towards this aim in the EU project of Collaborative and Confidential Information Sharing and Analysis for Cyber Protection (C3ISP). Based on the C3ISP framework, where four pilot projects offered a wide range of use cases to test security and trust requirements prior to CTI sharing, [13] proposed a five-level trust model for a cloud-edge based data sharing infrastructure. The results, although slightly premature, showed that both data analytics and data sanitisation can be performed while testing several deployment models.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding another limitation, in Reference [8], the difficulty related to the lack of confidence from organizations in sharing sensitive CTI data is addressed. Chadwick, et al [8] introduces a trust model among organizations combined with a data sharing and analysis framework allowing a confidential exchange of data. Irrespective of some limitations, the results presented show the achievement of expected results.…”
Section: Related Work and Definitionsmentioning
confidence: 99%
“…Considering the presented scenario, the idea of Cyber Threat Intelligence (CTI) has been rapidly popularizing and is often posed as a new solution for applying effective security to enterprise [7]. Any valuable information that can be used to identify, characterize or assist in the response to cyber threats is commonly referred to as cyber threat information and the analysis of this type of information can produce intelligence to inform the user about threats to their system [8]. Within the limitations of the CTI approach, there is the heterogeneity of the data involved [9,10], and the massive amount of data for collection [11].…”
Section: Introductionmentioning
confidence: 99%
“…Some of the major cloud security breaches include security at the physical level, virtual level, and, more importantly, web-based in tier level virtualized cloud data centers [13,14]. Furthermore, there are security gaps that exist between end-user and vendor assessments of cloud security, privacy, and transparency [15]. Similarly, the majority of enterprises with sensitive data such as banks, financial institutions, insurance companies, etc., are also very reluctant to choose cloud computing services and platforms as their primary concern rotate around the integrity, privacy, secrecy, and confidentiality of their data being stored and accessed from the cloud platform [16].…”
Section: Introductionmentioning
confidence: 99%