Abstract
This chapter presents the Cyber-Trust cyber-threat intelligence, detection, and mitigation platform, which delivers solutions for enhancing the security of the Internet of things, showcasing its value for law enforcement agencies (LEAs) and how they will be assisted in accessing, viewing, and receiving information that potentially holds digital evidence of specific cyber-crimes against Internet service providers and smart homes, in a timely manner. We present how information from different software components (e.g. Blockchain), when integrated based on the needs of the end-users, can greatly assist in the detection and correlation of digital evidence and the collaboration between the LEAs and providers. The challenges imposed by the national and European legislation are further discussed along with possible ways to address these shortcomings via the Cyber-Trust platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In this chapter, by referring to Internet service providers, the authors refer to Internet access providers and telecommunications providers.
References
Cyber-Trust: D2.3 Cyber-Trust Use Case Scenarios, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D2.3.pdf. Accessed 18 Feb 2020, [p. 02].
IBM: Define and implement an IoT Security Strategy, IBM, [Online] available: https://www.ibm.com/internet-of-things/trending/iot-security. Accessed 01 Jul 2019, [p. 02].
IBM Security connect, manage and analyze IoT data with Watson IoT Platform, Watson Internet of Things, IBM, [Online] available: https://www.ibm.com/internet-of-things/solutions/iot-platform, 2019. Accessed 01 Jul 2019, [p. 02].
Murphy J. (2016). Enhanced Security Controls for IBM Watson IoT Platform, IBM Watson IoT Platform IBM [Online] available: https://developer.ibm.com/iotplatform/. Accessed 01 Jul 2019, [p. 02].
J. Clark, IBM and Whirpool: an innovative partnership, Internet of Things blog, IBM, [Online] available: https://www.ibm.com/blogs/internet-of-things/whirlpool/, 2016. Accessed 01 Jul 2019, [p. 02].
IBM X-Force Red Vulnerability Management Services, IBM Security, IBM, [Online] available: https://www.ibm.com/security/services/vulnerability-scanning, 2019. Accessed 01 Jul 2019, [p. 03].
Motorola solutions, CYBERSECURITY: Protect critical network infrastructure from cyber threats, Motorola, [Online] available: https://www.motorolasolutions.com/en_xp/managed-support-services/cybersecurity.html. Accessed 01 Jul 2019, [p. 03].
Prasad R. IoT Infrastructre, Empowered by F5’s IoT solution”, F5, [Online] available: https://www.f5.com/company/blog/iot-infrastructure-empowered-by-f5s-iot-solution. Accessed 01 Jul 2019, [p. 03].
Intel IoT Security and Scalability on Intel IoT Platform, [Online] available: https://www.intel.com/content/www/us/en/internet-of-things/iot-platform.html. Accessed 01 Jul 2019, [p. 03].
AWS Cloud Services, [Online] available: https://aws.amazon.com/iot/. Accessed 01 Jul 2019, [p. 03].
Ericsson IoT platform, [Online] available: https://www.ericsson.com/en/internet-of-things/iot-platform, Accessed 30 Jul 2019, [p. 03].
Seriot, Secure and Safe Internet of Things [Online] available: https://seriot-project.eu/, 2018, Accessed 01 Jul 2019, [p. 03].
SOFIE, Secure Open Federation for Internet Everywhere, [Online] available: https://www.sofie-iot.eu/, 2018. Accessed 01 Jul 2019, [p. 03].
SOFIE, State of the Art in Blockchain Technology and IoTSystems, [Online] available: https://www.sofie-iot.eu/news/state-of-the-art-in-blockchain-technology-and-iot-systems, 2018. Accessed 01 Jul 2019, [p. 03].
REACT, REactively Defending against Advanced Cybersecurity Threats, [Online] available: http://react-h2020.eu/, 2019. Accessed 04 07 2019, [p. 04].
Astrid, AddreSsing ThReats for virtuallseD services, [Online] available: https://www.astrid-project.eu/, 2019. Accessed 04 Jul 2019, [p. 04].
SPEAR, Secure and PrivatE smArt gRid, [Online] available: https://www.spear2020.eu/, 2017. Accessed 04 Jul 2019, [p. 04].
SecureIoT, [Online] available: https://secureiot.eu/, 2019. Accessed 04 Jul 2019, [p. 04].
CHARIOT, [Online] available: https://www.chariotproject.eu/About#LivingLabs, 2017. Accessed 04 Jul 2019, [p. 04].
SEMIoTICS framework, [Online] available: https://www.semiotics-project.eu. Accessed 04 Jul 2019, [p. 04].
GHOST project, [Online] available: https://www.ghost-iot.eu/ghost-project. Accessed 04 Jul 2019, [p. 04].
Cyber-Trust, D2.4 Cyber-Trust end-user requirements, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D2.4.pdf. Accessed 18 Feb 2020, [p. 05].
Hyperledger Fabric, [Online] available: https://www.hyperledger.org/projects/fabric. Accessed 04 Jul 2019, [p. 09], [p. 11].
Cyber-Trust, D7.2 CYBER-TRUST distributed ledger architecture, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D7.2.pdf. Accessed 18 Feb 2020, [p. 09].
Cyber-Trust, D7.3 CYBER-TRUST authority and publishing management, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D7.3.pdf. Accessed 18 Feb 2020, [p. 10].
Brotsis S. (2019). Blockchain solutions for forensic evidence preservation in IoT environments. In: 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 2019, pp. 110–114, [p. 11].
Cyber-Trust, D7.5 CYBER-TRUST information and evidence storage, [p. 11]
Acknowledgements
| Cyber-Trust project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this chapter reflects only the author’s view, and the European Union is not responsible for any use that might be made of such content. |
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bilali, V.G. et al. (2021). Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-69460-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69459-3
Online ISBN: 978-3-030-69460-9
eBook Packages: EngineeringEngineering (R0)