PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Preserving Integrity of Evidence with Blockchain Technology in Cloud Forensics for Immigration Management

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
As the popularity of cloud computing increases, safety concerns are growing as well. Cloud forensics (CF) is a smart adaptation of the digital forensics model that is used for fighting the related offenses. This paper proposes a new forensic method relying on a blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. In order to protect the system against illegitimate users, an improved blowfish method is applied. In this particular instance, the system is made up of five distinct components: hypervisor (VMM), IPFS file storage, log ledger, node controller, and smart contract. The suggested approach includes six phases: creation of the log file, key setup and exchange, evidence setup and control, integrity assurance, agreement validation and confidential file release, as well as blockchain-based communication. To ensure efficient exchange of data exchange between the cloud provider and the client, the methodology comprises IPFS. The SSA (FOI-SSA) model, integrated with forensic operations, is used to select the keys in the best possible way. Finally, an analysis is conducted to prove the effectiveness of the proposed FOI-SSA technique.
Rocznik
Tom
Strony
78--87
Opis fizyczny
Bibliogr. 43 poz., rys., tab.
Twórcy
  • GITAM School of Engineering, Visakhapatanam, Andhra Pradesh, India
  • GITAM School of Engineering, Visakhapatanam, Andhra Pradesh, India
Bibliografia
  • [1] S. Rane and A. Dixit, “BlockSLaaS: Blockchain assisted secure logging-as-a-service for cloud forensics”, Proceedings of International Conference on Security & Privacy, pp. 77– 88, 2019 (https://doi.org/10.1007/978-981-13-7561-3_6).
  • [2] P. Jain, “Decentralize log file storage and integrity preservation using blockchain”, International Journal of Computer Science and Information Technologies, vol. 11, no. 2, pp. 21– 30, 2020 (https://ijcsit.com/docs/Volume%2011/vol11issue02/ijcsit2020110202.pdf).
  • [3] M. Pourvahab and G. Ekbatanifard, “Digital forensics architecture for evidence collection and provenance preservation in IaaS cloud environment using SDN and blockchain technology”, IEEE Access, vol. 7, pp. 153349–153364, 2019 (https://doi.org/10.1109/ACCESS.2019.2946978).
  • [4] N. Dalezios, S. Shiaeles, N. Kolokotronis, and B. Ghita, “Digital forensics cloud log unification: Implementing CADF in Apache CloudStack”, Journal of Information Security and Applications, vol. 54, pp. 102555, 2020 (https://doi.org/10.1016/j.jisa.2020.102555).
  • [5] C. Stelly and V. Roussev, “SCARF: A container-based approach to cloud-scale digital forensic processing”, Digital Investigation, vol. 22, pp. S39–S47, 2017 (https://doi.org/10.1016/j.diin.2017.06.008).
  • [6] J.H. Park, J.Y. Park, and E.N. Huh, “Blockchain based data logging and integrity management system for cloud forensics”, Computer Science & Information Technology, vol. 149, 2017 (https://doi.org/10.5121/csit.2017.71112).
  • [7] T.K. Dasaklis, F. Casino, and C. Patsakis, “SoK: Blockchain solutions for forensics”, in Technology Development for Security Practitioners, B. Akhgar, D. Kavallieros, and E. Sdongos, Eds. Springer Cham, 2021, pp. 21– 40 (https://doi.org/10.1007/978-3-030-69460-9_2).
  • [8] M. Irfan, H. Abbas H, Y. Sun, A. Sajid, and M. Pasha, “A framework for cloud forensics evidence collection and analysis using security information and event management”, Security and Communication Networks, vol. 9, no. 16, pp. 3790– 3807, 2016 (https://doi.org/10.1002/sec.1538).
  • [9] A.C. Kumar and R. Vimala, “Load balancing in cloud environment exploiting hybridization of chicken swarm and enhanced raven roosting optimization algorithm”, Multimedia Research, vol. 3, no. 1, pp. 45– 55, 2020 (https://doi.org/10.46253/j.mr.v3i 1.a5).
  • [10] R. Battistoni, R. Di Pietro, and F. Lombardi, “CURE-Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments”, Computer Communications, vol. 91, pp. 29– 43, 2016 (https://doi.org/10.46253/j.mr.v3i1.a5).
  • [11] H. Mahdi, et. al, “Vehicular Networks Performance Evaluation Based on Downlink Scheduling Algorithms for High-Speed Long Term Evolution–Vehicle”, International Journal of Interactive Mobile Technologies, vol. 15, no. 21 , 2021 (https://doi.org/10.3991/ijim.v15i21.22475).
  • [12] Chao Lina, at al., “BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for Industry 4.0”, Journal of Network and Computer Applications, vol. 116, pp. 42– 52, 2018 (https://doi.org/10.1016/j.jnca.2018.05.005).
  • [13] D.F. Maesa, P. Mori, and L. Ricci, “A blockchain based approach for the definition of auditable access control systems”, Computers and Security, vol. 84, pp. 93–119 , 2019 (https://doi.org/10.1016/j.cose.2019.03.016).
  • [14] P.T. Duy, H. Do Hoang, N.B. Khanh, and V.H. Pham, “Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for SDN forensics using blockchain”, Proceedings of 2019 6 th NAFOSTED Conference on Information and Computer Science (NICS), pp. 416–421 , 2019 (https://doi.org/10.1109/NICS48868.2019.9023852).
  • [15] G.G. Dagher, J. Mohler, M. Milojkovic, and P.B. Marell, “Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology”, Sustainable Cities and Society, vol. 39, pp. 283–297 , 2018 (https://doi.org/10.1016/j.scs.2018.02.014).
  • [16] Hao Gu, L. Wanxin, Mark Nejad, and Chien-Chung Shen, “Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture”, 2019 IEEE International Conference on Blockchain, 2019 (https://doi.org/10.1109/Blockchain.2019.00015).
  • [17] B. Prasanalakshmi., A. Kannammal, and R. Sridevi, “Multimodal biometric cryptosystem involving face, fingerprint and palm vein”, International Journal of Computer Science Issues (IJCSI), vol. 8, no. 4. pp. 604, 2011 (URL: http://ijcsi.org/papers/IJCSI-8-4-1-604-610.pdf).
  • [18] S. Kokilavani, M.D. Vignesh, E. Surya, A. Narendran, and B. Prasanalakshmi, “Enhanced biometric smart key scheme for smart card authentication”, 2014 International Conference on Communication and Signal Processing, pp. 1589–1592 . IEEE, 2014 (https://doi.org/10.1109/ICCSP.2014.6950116).
  • [19] V. Rupapara, F. Rustam, H.F. Shahzadehmood, A. Ashraf, and G.S. Choi, “Impact of SMOTE on imbalanced text features for toxic comments classification using RVVC model”, IEEE Access, vol. 9, pp. 78621–78634 (https://doi.org/10.1109/ACCESS.2021.3083638).
  • [20] M. Irfan, H. Abbas, and W. Iqbal, “Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment”, Proceedings of 2015 IEEE/ACIS 14 th International Conference on Computer and Information Science (ICIS), pp. 15–21, 2015 (https://doi.org/10.1109/ICIS.2015.7166563).
  • [21] K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to integrating forensic techniques into incident response”, NIST Special Publication, vol. 10, no. 14, pp. 800– 806, 2006 (https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf).
  • [22] S.K. Manoj and D.L. Bhaskari, “Cloud forensics – a framework for investigating cyber attacks in cloud environment”, Procedia Computer Science, vol. 85, pp. 149–154 , 2016 (https://doi.org/10.1016/j.procs.2016.05.202).
  • [23] M. Ma, G. Shi, and F. Li, “Privacy-Oriented Blockchain-based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario”, IEEE Access, vol. 7, pp. 34045 –34059, 2019 (https://doi.org/10.1109/ACCESS.2019.2904042).
  • [24] L. Pasquale, S. Hanvey, M. Mcgloin, and B. Nuseibeh, “Adaptive evidence collection in the cloud using attack scenarios”, Computers and Security, vol. 59, pp. 236– 54, 2016 (https://doi.org/10.1016/j.cose.2016.03.001).
  • [25] V.K, Netajihole and G.P. Bhole, “Optimal Containe Resource Allocation Using Hybrid SA-MFO Algorithm in Cloud Architecture”, Multimedia Research, vol. 3, no. 1, pp. 11– 20, 2020 (https://doi.org/10.46253/j.mr.v3i1.a2).
  • [26] A.C. Kumar and R. Vimala, “Load Balancing in Cloud Environment Exploiting Hybridization of Chicken Swarm and Enhanced Raven Roosting Optimization Algorithm”, Multimedia Research, vol. 3, no. 1, pp. 45 –55, 2020 (https://doi.org/10.46253/j.mr.v3i 1.a5).
  • [27] M.K. Mahesh, “Workflow scheduling using Improved Moth Swarm Optimization Algorithm in Cloud Computing”, Multimedia Research, vol. 3, no. 3, 2020 (https://doi.org/10.46253/j.mr.v3i 3.a5).
  • [28] M. Pourvahab and G. Ekbatanifard, “An efficient forensics architecture in software-defined networking-IoT using blockchain technology”, IEEE Access, vol. 7, pp. 99573– 99588, 2019 (DOI: 10.1109/AC-CESS.2019.2930345).
  • [29] P. Santra, P. Roy, D. Hazra, and P. Mahata, “Fuzzy data mining-based framework for forensic analysis and evidence generation in cloud environment”, Ambient Communications and Computer Systems, pp. 119–129, 2018 (https://doi.org/10.1007/978-981-10-7386-1_10).
  • [30] S. Aishwarya, R.S. Selvi, and R. Ilakkiya, “Secure public Auditing With Code-Regeneration In Multi Storage Cloud Architecture”, 2006 (https://ijartet.com/1370/v3s15ranganathancseit/conference).
  • [31] S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems”, IEEE Access, vol. 6 , pp. 38437– 38450, 2018 (https://doi.org/10.1109/ACCESS.2018.2851611).
  • [32] X. Qi, E.B. Sifah, K.O. Asamoah, J. Gao, X. Du, and M. Guizani, “MeDShare: Trust-less medical data sharing among cloud service providers via blockchain”, IEEE Access, vol. 5, pp. 14757– 14767, 2017 (https://doi.org/10.1109/ACCESS.2017.2730843).
  • [33] S. Zawoad, A.K. Dutta, and R. Hasan, “Towards building forensics enabled cloud through secure logging-as-a-service”, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 148– 62, 2015 (https://doi.org/10.1109/TDSC.2015.2482484).
  • [34] P.P. Srivastava, S. Goyal, and A. Kumar, “Analysis of various NoSql database”, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 539–544 , 2015 (Dhttps://doi.org/10.1109/ICGCIoT.2015.7380523).
  • [35] M. Agrawal and P. Mishra, “A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT), vol. 1, no. 6, 2012 (https://www.ijeat.org/wp-content/uploads/papers/v1i6/F0610071612.pdf).
  • [36] R.K. Meyers and A.H. Desoky, “An Implementation of the Blowfish Cryptosystem”, 2008 IEEE International Symposium on Signal Processing and Information Technology, 2008 (https://doi.org/10.1109/ISSPIT.2008.4775664).
  • [37] J-S. Chou and N-M. Nguyen, “FBI inspired meta-optimization”, Applied Soft Computing, vol. 93, 2020 (https://doi.org/10.1016/j.asoc.2020.106339).
  • [38] J. Xue and B. Shen, “A novel swarm intelligence optimization approach: sparrow search algorithm”, Systems Science & Control Engineering, vol. 8, no. 1, pp. 22– 34, 2020 (https://doi.org/10.1080/21642583.2019.1708830).
  • [39] M.M. Beno, I.R. Valarmathi, S.M. Swamy, and B.R. Rajakumar, “Threshold prediction for segmenting tumour from brain MRI scans”, International Journal of Imaging Systems and Technolog, vol. 24, no. 2, pp. 129– 137, 2014 (https://doi.org/10.1002/ima.22087).
  • [40] T. Renjith and M.J.S. Rangachar, “Hybrid Optimization based DBN for Face Recognition using Low-Resolution Images”, Multimedia Research, vol. 1, no. 1, pp. 33–43, 2018 (https://doi.org/10.46253/j.mr.v1i1.a5).
  • [41] J. Devagnanam, N.M. Elango, “Optimal Resource Allocation of Cluster using Hybrid Grey Wolf and Cuckoo Search Algorithm in Cloud Computing”, Journal of Networking and Communication Systems, vol. 3 , no. 1, pp. 31– 40, 2020 (https://doi.org/10.46253/jnacs.v3i1.a4).
  • [42] S.K.M. Shareef and R.S. Rao, “A Hybrid Learning Algorithm for Optimal Reactive Power Dispatch under Unbalanced Conditions”, Journal of Computational Mechanics Power System and Control, vol. 1, no. 1, pp. 26–33, 2018 (https://doi.org/10.46253/j.mr.v1i1.a5).
  • [43] P. Purnaye and V. Kulkarni, ”BiSHM: Evidence detection and preservation model for cloud forensics”, Open Computer Science, vol. 12, no. 1, 2022, pp. 154–170 (https://doi.org/10.1515/comp- 2022-0241).
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c05dc688-58e5-4961-8041-59eea20e41c8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.