• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2021, Volume: 14, Issue: 8, Pages: 725-737

Original Article

Disaster recovery and risk management over private networks using data provenance: Cyber security perspective

Received Date:09 December 2020, Accepted Date:14 March 2021, Published Date:19 March 2021

Abstract

Objectives: To understand of data provenance applications towards cyber security for disaster recovery. To design an attack scenario with appropriate use cases using unified modeling language. To construct and analyze the data collected in the selected private computer network using appropriate graphical representation and comparing variables with null hypothesis. Methods: In the existing methods, presence of provenance data is not available with respect to network attack scenarios of risk management. Information security deals about disaster recovery in the form of business continuity planning, however nowhere it specifies about genesis data and its lineage. We propose a methodology for trouble shooting issues concerning over cyber physical systems in private networks. Findings: The process of resolving problems is linked with risk management for fairer and guaranteed continued communication as usual. Identity of the systems and users are considered random variables to understand the association between them. These random variables are picked from the provenance data maintained at the administrator login of a specific private network. This association analysis is unique and provides appropriate outcomes for good decision-making at the time of attack scenarios in risk management. Novelty: Simulations and their results are represented to show the correlation between risk management and data provenance in the cyber world. The uniqueness and novelty lies in design part of the problem statement with regards to provenance and disaster recovery for computer networks.

Keywords: Cyber security; data provenance; risk management; business continuity planning; information security

References

  1. Sharma S, Krishna CR, Sahay SK. Detection of advanced malware by machine learning techniques. In: Soft Computing: Theories and Applications. (pp. 333-342) Springer. 2019.
  2. Asri S, Pranggono B. Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure. Wireless Personal Communications. 2015;83(3):2211–2223. Available from: https://dx.doi.org/10.1007/s11277-015-2510-3
  3. Yu S. Distributed denial of service attack and defense. New York. Springer. 2014.
  4. Deshmukh RV, Devadkar KK. Understanding DDoS Attack & its Effect in Cloud Environment. Procedia Computer Science. 2015;49:202–210. Available from: https://dx.doi.org/10.1016/j.procs.2015.04.245
  5. Kumar P, Pateriya RK. A survey on SQL injection attacks, detection and prevention techniques. Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12). 2012. Available from: https://doi: 10.1109/ICCCNT.2012.6396096
  6. Morris R, Thompson K. Password security: A case history. Communications of the ACM. 1979;22:594–597. Available from: https://doi.org/10.1145/359168.359172
  7. Dhillon G, Syed R, Pedron C. Interpreting information security culture: An organizational transformation case study. Computers & Security. 2016;56:63–69. Available from: https://dx.doi.org/10.1016/j.cose.2015.10.001
  8. Herath T, Rao HR. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 2009;18(2):106–125. Available from: https://dx.doi.org/10.1057/ejis.2009.6
  9. Sommestad T, Karlzén H, Hallberg J. The theory of planned behavior and information security policy compliance. Journal of Computer Information Systems. 2019;59(4):344–353. Available from: https://www.tandfonline.com/doi/10.1080/08874417.2017.1368421
  10. Whitman ME, Mattord HJ. Principles of information security. Cengage Learning. Cengage Learning. 2011.
  11. Bhuyan FA, Lu S, Reynolds R, Zhang J, Ahmed I. A Security Framework for Scientific Workflow Provenance Access Control Policies. IEEE Transactions on Services Computing. 2019. Available from: https://dx.doi.org/10.1109/tsc.2019.2921586
  12. Elkhodr M, Alsinglawi B. Data provenance and trust establishment in the Internet of Things. Security and Privacy. 2020;3(3). Available from: https://dx.doi.org/10.1002/spy2.99
  13. Siddiqui MS, Rahman A, Nadeem A, M. A. Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters. International Journal of Advanced Computer Science and Applications. 2019;10(5). Available from: https://dx.doi.org/10.14569/ijacsa.2019.0100529
  14. Haque S, Atkison T. A Forensic Enabled Data Provenance Model for Public Cloud. Journal of Digital Forensics, Security and Law. 2018;13(3). Available from: https://dx.doi.org/10.15394/jdfsl.2018.1570
  15. Fowler M, Distilled UML. A brief guide to the Standard Object Modeling Language. 2003.
  16. Homer MS. An introduction to secondary data analysis with IBM SPSS statistics. Educational Review. 2018;70(2):251–252.

Copyright

© 2021 Pradeep Kumar et al.This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.