Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Anusha VC, Rutuja Karate, Prof. Hrishikesh Mogare
DOI Link: https://doi.org/10.22214/ijraset.2024.63399
Certificate: View Certificate
As digital forensics has advanced, it has now become a crucial aspect of cloud computing. The standard process for digital forensics includes five key steps: identifying the problem, collecting relevant data, investigating the crime scene, analyzing the evidence, and documenting the case. However, performing digital forensics in the cloud presents unique challenges, especially related to security and privacy. This paper reviews different digital forensics methods, particularly focusing on cloud computing. One approach we highlight is the use of blockchain technology in cloud forensics. Blockchain\'s decentralized, tamper-proof ledger enhances the security and integrity of forensic evidence, ensuring reliable chain of custody and improving the credibility and admissibility of evidence in legal proceedings. Cloud forensics offers significant advantages such as large storage capacity, powerful computing abilities, and tools to identify criminal activities, which are crucial for thorough investigations. We examine the problems and challenges at each stage of the cloud forensics process and discuss how blockchain technology can provide effective solutions. Our goal is to help new researchers better understand these issues and encourage the development of new ideas to address the challenges in cloud forensics.
I. INTRODUCTION
The reliance on cyberspace, particularly the internet, has significantly increased in recent years. Technological advancements have given rise to new paradigms such as fog and cloud computing, with cloud computing being one of the most widely used today. Cloud computing has created numerous economic opportunities and introduced promising technologies that are now essential in modern computing. This paradigm allows for the private storage of large amounts of data and helps ensure data security over the internet.
However, investigating large-scale cloud data can be challenging if an attacker targets the cloud network. To address these challenges, a new field called digital cloud forensics has emerged. Cloud forensics combines traditional digital forensics with cloud computing, leveraging networks, digital storage devices, and computers to identify and investigate criminal activities. This integration of digital forensics with cloud technologies is known as cloud forensics [1,3].
Cloud forensics aims to identify crimes committed in the cloud and conduct investigations with minimal complexity. Over the years, various branches of digital forensics have developed, including computer forensics, network forensics, mobile device forensics, digital image forensics, digital audio forensics, and memory forensics. Traditional forensic investigation methods are often less effective due to the decentralized nature of data processing. Integrating digital forensics with cloud computing addresses these limitations but also introduces new challenges [2,7].
The investigation process in any platform typically involves several phases: identifying the problem, collecting data, examining the crime scene, analyzing the evidence, and presenting the case findings. Research indicates that implementing cloud-based digital forensics is complex, with numerous issues and challenges at each stage. These challenges include accessing logs, collecting stable data, handling vast amounts of data, recreating crime scenarios, navigating multinational laws, and presenting evidence in court [5,6].
This paper provides a detailed review of the issues and challenges in each phase of the cloud forensics process. Solutions such as maintaining logs, using separate planes for cloud data retrieval, and legislative measures are suggested [4,10].
Given the growing interest in cloud forensics, this paper aims to conduct a thorough analysis based on existing literature, presenting an analytical review of the major challenges, existing solutions, and open problems in the field. The review includes the concept of cloud digital forensics, Blockchain-based approaches in digital forensics, the issues and challenges in cloud-based forensics, and possible blockchain solutions to these problems.
Blockchain technology, known for its potential to preserve and track the chain of custody in digital forensics, enables stakeholders to create a digital ledger for documenting and storing transactions over a distributed network. This can ensure the security and privacy of digital evidence in cloud forensics [9,10].
A. Cloud computing
Cloud computing is a term used to describe technology, services, and applications that deliver hosted services over the internet, transforming them into a self-service utility. According to the National Institute of Standards and Technology (NIST), cloud computing is "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [13]. " Cloud computing services are generally divided into three main categories based on what they offer to the end user:
B. Cloud Forensic
Cloud forensics involves the growing use of networks, digital devices for storage, and computers in identification of several criminal activities being performed in both Hi-Tech and traditional forensics [1]. The traditional digital forensics process is integrated with Cloud-based technologies which are often referred to as Cloud forensics.
In short, cloud forensics is the combination of digital forensics with cloud computing [2].
Cloud forensics is an application inside the framework of digital forensics which identifies the crimes performed on the cloud and performs the required investigation with minimum overhead and complications.
The cloud computing evolution poses several challenges and issues mostly in digital forensics and crime investigation. The investigation process for any kinds of platform includes several phases such as- identification of problem, data collection, examination of crime scenes, and analysis of the investigation and presentation of the case findings [6,8].
C. Digital Forensic
Digital forensics is a field within forensic science focused on using digital data (created, stored, and transmitted by computers) as evidence in investigations and legal cases. The first Digital Forensics Research Workshop in New York in 2001 defined it as: “The use of scientifically derived and proven methods to preserve, collect, validate, identify, analyze, interpret, document, and present digital evidence from digital sources to help construct events found to be criminal or to anticipate unauthorized actions that could disrupt planned operations [13].”
McKemmis defines digital forensics as the “process of identifying, preserving, analyzing, and presenting digital evidence in a way that is legally acceptable.[13]”
Digital Forensic involves main 3 Steps and first step involves the different Activities as follows:
The second step Chain of Custody tracks the collection and handling of evidence, documenting who collected it, when, and why. This ensures the evidence remains reliable for legal use.
The final Documentation step involves continuously recording details about the evidence, including where it was found and its condition. Accurate documentation is crucial for future investigations and legal cases.
D. Blockchain
A block chain is a distributed ledger technique in which a plurality of peers manage and store data by mutually agreed rules. The nodes (peers) that want to manage the data participate in the P2P network and each node can verify the integrity of the block. Each peer can create a block, where the block of the first successful peer propagates to all peers, and if all the peers agree that the block is justified, the block is added to all peers. If the new block is properly created, it means that the verification of the previous block is also completed. Therefore, the longer the block length, the higher the reliability of the entire block. Verification of the integrity of a block can also verify that all past blocks are correct by comparing the hash value. However, this does not guarantee that the block is completely trustworthy, and that it has been acknowledged that it has done a lot of work proofing. Therefore, the more peers participating, the safer it is [11,12].
New blocks are created using the Proof of Work (PoW) or Proof of Stake (PoS) method. The PoW method is a task to find a hash value that satisfies a certain condition, and it is operated by adjusting the degree of difficulty for an average of 10 minutes in case of Bitcoin. The PoS method is a method for saving the cost and maintenance cost of hardware equipment and is a concept to solve the problem of PoW method in the field of cryptocurrency. Recently, cryptocurrency has been developed that combines both methods properly due to system maintenance cost and security problems. In addition, research is underway to apply not only cryptocurrency but also the fields that need to guarantee the integrity of data. For example, the blockchain based digital content distribution system, using blockchain for medical data access management, a framework for preventing double-financing[13], blockchains and smart contratcs for the Internet of Things are researched [12,13,14].
II. CLOUD FORENSICS AND CHALLENGES
A. Identification
Determining the type of crime, software and hardware used by the suspect and possible evidence locations. In a cloud computing environment, identifying the digital forensic requirements to conduct a sound investigation is considered to be the main building block in the process of identification.
The first step in computer forensic in identification of the case and it involves two main steps as evidence and incident identification, which will be helpful to prove the incident that has happened in the case scenario. Identification is reporting of malicious activity in cloud such as illegal use of cloud for storing files, deleting files and so on.
This phase arise in cloud by the complaint made by individual, by CSP authority reporting misuse of cloud or any other. Digital evidence is both fragile and volatile in context of cloud therefore requires the attention of special personnel and methods in order to ensure that evidence data can be proper isolated and evaluated [5].
Logs play a vital role in an investigation. Having access to log files in order to identify an incident is the first priority for the investigators. In cloud environments where data are stored in unknown locations due to systems’ distribution locating logs is a hard and painful process. The availability of system statutes and logs files is depending on the cloud service model. It is not feasible in SaaS and PaaS models due to the limited access which the client has; whereas it is partly applicable in the IaaS model as the client has access to the Virtual Machine (VM) which behaves like an actual machine. Many CSPs do not provide services to gather logs and sometimes intentionally hide the details from customers [12].
2. Volatile Data
When the power is turned off, volatile data cannot sustain. Likewise, when a VM is turned off or restarted, all the data will be lost unless the image is stored somewhere. This reflects to the loss of important evidence such as registry entries, processes and temporary internet files. volatile data that resides within the virtual environment including registry entries and temporary internet files are likely to be lost when the IaaS’s customer restarts their machines. The extra storage can be utilized in data-recovery, data-safety for client and ease the data collection for investigators. For this reason, it should be globalized between CSPs in order to provide the Clients with their persistent storage. In case an adversary launches an attack on a VM with no persistent storage synchronization, when the attack is completed, the adversary can shut down the Virtual Machine instance leading to a complete loss of volatile data, if no further countermeasures are installed.
3. Dependence on CSP
CSPs are responsible for helping and assisting the investigators and the clients with all the information and evidence they can get in their cloud infrastructures. Both customers and investigators are heavily depended upon the CSP in collecting the digital evidence from cloud computing environment as they have limited control on the system. The problem arises when the CSPs are not willing to provide the information reside in their premises. In SaaS and PaaS we need to depend on the CSP to identify, preserve and collect all the evidence that could lead us to the incident. Another major issue is the CSPs dependence on third parties. CSPs sign contracts with other CSPs in order to be able to use their services. This means that the investigation has to cover all the parties involved with an immediate impact to the chain of custody.
B. Data Collection & Preservation
Data collection refers to physical acquisition of forensic data. Any digital forensic procedure consists of physically taking the custody of hard disk being investigated and then taking bitwise copy of same maintaining the integrity of data. But in case of cloud this is impossible. Physical seizure is difficult and dependent step in cloud. The investigator has to contact CSP for physical acquisition of data which is distributed among many data centers. According to data collection phase of cloud forensics should also consider the storage capacity for collecting evidence. The amount of data for evidence would be large due to distributed and wide nature of cloud. The author suggests collecting the evidence a separate cloud can be used because data would be very large. Another issue in evidence collection and preservation is chain of custody which is nothing but a path that shows how evidence was collected and preserved and analyzed. Due to remote nature of cloud this property again violates the digital forensic rule [9].
C. Analysis& Examination
Analysis: Organizing the evidence and it involves analysis of the devices for evidence as digital clues. The investigator interprets and correlates the data to know the fact and draw conclusion whether the evidence is proved or not. This phase consists of analysis of logs collected from different layers of cloud. In context of cloud this phase has significant challenges. First is the decentralized log mechanism which is spread over multiple tiers of cloud. The logs are located over different servers at different data center location. Again the logs are sometimes volatile in nature due to virtualization property of cloud.
Examination: Organizing the evidence involves examination of the devices for evidence as digital clues. The investigator extracts the information for examination of the case and inspects the extracted data and their characteristic. Studying the collected data and its attributes. Current computer forensics practices examine well-structured storage e.g., hard disks; however, in cloud computing a significant proportion of the target data may be held in memory/network dumps and/or log files [6].
However, regeneration event can be used where a snapshot is done due to occurrence of every attack.
D. Presentation
Finally, the investigator prepares the reports from the findings about the findings of the investigation and makes it appropriate enough with evidence to finally present it to the court. Presentation is the phase of presenting data in front of jury as evidence for crime provenance. Due black box and abstract nature of cloud the jury member is unable to understand the validity of evidence in cloud. The findings will be presented to either the management of an organization or a court of law [10].
III. BLOCKCHAIN BASED SOLUTION
Blockchain technology has become a revolutionary tool for enhancing security and privacy in various fields such as eHealth, IoT, industries, and voting. It operates as a decentralized, shared, and tamper-proof ledger on a peer-to-peer network.
Initially popularized by Bitcoin, blockchain records transactions in blocks, which are then verified through a process called Proof of Work. Incorporating blockchain into Digital Forensics and Incident Response (DFIR) can significantly improve the credibility and admissibility of evidence by maintaining an immutable chain of custody [10].
A. Blockchain-Based Forensic Solutions
A proposed framework uses blockchain to store evidence securely and manage data integrity, comparing its efficiency with existing cryptocurrencies. Simulation and TPS (transactions per second) calculations using Hyperledger are suggested for future improvements.
2. Digital Evidence Processing with IoT:
A system integrating blockchain with IoT forensics enhances the credibility, legitimacy, and non-repudiation of evidence. It includes cryptographic solutions to address identity privacy concerns and employs smart contracts for various forensic transactions. Future work includes testing the system in a diverse IoT environment.
3. IoT Forensic Chain (IoTFC):
This platform provides proof of presence and privacy for forensic investigations, ensuring traceability and auditability of evidence. IoT devices submit evidence to the blockchain, documenting the origin, storage, examination, and presentation of the evidence.
4. IaaS Cloud Blockchain Technology
This approach solves centralized evidence collection issues by distributing evidence across multiple peers in the blockchain. It includes advanced security measures like Secure Ring Verification based Authentication (SRVA), Sensitivity Aware Deep Elliptic Curve Cryptography (SA-DECC), and Secure Hashing Algorithm-3 (SHA-3). The system allows users to track their data through Fuzzy based Smart Contracts (FCS) and constructs Logical Proof Graphs (LGoE) for evidence analysis.
5. Log Protection and Auditing
Maintaining the confidentiality of log files is crucial for incident monitoring. A public model using a third-party auditor verifies the accuracy of cloud logs without revealing log content. The system aggregates log block tags using a Merkle hash tree, storing the root node on the blockchain to prevent tampering. This method reduces computational costs and enhances the security audit of cloud logs.
Blockchain technology offers significant advantages for cloud forensics by providing a secure, transparent, and immutable way to handle digital evidence. These benefits make blockchain-based solutions far superior to traditional methods, ensuring that digital evidence remains credible, verifiable, and tamper-proof throughout the forensic process.
Blockchain technology offers significant advantages for cloud forensics by providing a secure, transparent, and immutable way to handle digital evidence. These benefits make blockchain-based solutions far superior to traditional methods, ensuring that digital evidence remains credible, verifiable, and tamper-proof throughout the forensic process.
B. Tools For Cloud Forensics
FROST is a forensics tool for the OpenStack cloud computing platform. This tool acquires data from API logs, virtual disks and guest firewall logs in order to carry out the digital forensic investigation. FROST provides Infrastructure-as-aService (IaaS) cloud. This tool stores the log data in Hash trees and returns it in Cryptographic form. It works at the cloud management plane and hence does not need to interact with the operating system inside the guest virtual machines. Therefore no trust is needed in these machines. The FROST tools are user driven so no interaction of the forensic examiners and customers with the Cloud service providers are needed for law enforcement. The latest features of these tools allow forensic experts to extract the required forensic data from the OpenStack cloud without the provider’s interaction. The outline has an extensible arrangement of scientific goals, including the future expansion of other information safeguarding methods, revelation techniques, checking procedures, measurements and reviewing abilities [11].
Hence, clients of open cloud administrations do not require the help of their cloud supplier for any forensic examination.
Law authorization depends on the bulky and tedious court order procedure to acquire cloud information, and requires the cloud supplier to execute every inquiry in the interest of the requester. In [11] it has been reasoned that the administration plane is an alluring answer for client driven scientific abilities since it gives access to criminological information without expecting to believe the visitor virtual machine (VM) or the hypervisor, and without requiring help from the cloud supplier. Putting away and getting reliable proof from anoutsider supplier is non-paltry.
Its commitments are-
So we can say that FROST suite for OpenStack is a collection of forensic tools which is integrated into the management plane of a cloud architecture. These tools can be used by law enforcement, cloud consumers, law enforcement and forensic investigators for acquiring trustworthy forensic data independent of the cloud provider. This tool can also be used for metrics, real-time monitoring or auditing. User accessible concrete capabilities are offered by FROST. While numerous organizations are still reluctant to embrace cloud arrangements in light of security concerns, FROST arms them with capable and quick reaction capacities. All commercial cloud services should be using these types of tools so that the cloud forensic problems can be solved.
IV. PROPOSED SOLUTION IMPLEMENTATION
Blockchain technology can address several challenges in cloud forensics by providing a secure, transparent, and immutable way to track and verify digital evidence. Here is a real example where blockchain technology is applied to solve cloud forensic challenges:
Example: Guardtime's Blockchain-Based Integrity Solutions for Cloud Forensics
Company Overview: Guardtime, an Estonia-based company, provides blockchain-based solutions to ensure data integrity and security. Their technology is used in various sectors, including government, healthcare, and cybersecurity.
Challenges Faced by Guardtime in Cloud Forensics and Blockchain-Based Solutions:
A. Challenges
Solution: Guardtime's KSI blockchain timestamps and cryptographically hashes every piece of data, such as log entries or files. These hashes are aggregated and anchored in the KSI blockchain.
Benefit: This creates a tamper-evident record, ensuring the integrity and authenticity of the data. Any alteration attempts would change the hash value, which would no longer match the hash stored in the blockchain.
2. Tamper-Evidence and Verification:
Solution: The KSI blockchain enables investigators to verify the integrity of the data by comparing its hash to the blockchain record.
Benefit: This ensures that the data has not been tampered with since it was recorded. Any discrepancies in the hash values would indicate potential tampering.
3. Immutable Audit Trail:
Solution: The blockchain creates an immutable audit trail of all digital events and data.
Benefit: Forensic investigators can use this audit trail to track the history of digital evidence, proving the chain of custody and authenticity of the data, which is critical for legal proceedings.
4. Compliance and Reporting:
Solution: Organizations can log all relevant events and activities in the KSI blockchain.
Benefit: This provides a verifiable and immutable record, helping organizations demonstrate compliance with regulatory requirements and enhancing transparency.
5. Data Provenance:
Solution: The blockchain tracks and verifies the provenance of digital assets, including their origin and any modifications.
Benefit: This ensures a comprehensive and tamper-proof history of data changes, allowing investigators to establish the authenticity and integrity of the digital evidence.
B. Real-World Deployment Examples:
By using blockchain technology, Guardtime addresses key challenges in cloud forensics, such as ensuring data integrity, maintaining an immutable audit trail, and verifying the authenticity of digital evidence. This real-world application demonstrates the practical benefits of integrating blockchain into forensic investigations in cloud environments.
Forensic investigators are facing huge challenges to cope with the criminal activities, which were not as complex in traditional forensic approach as the cloud, due to its complex structure. The paper identified the challenges in cloud forensic and the cutting edge solutions to counter these challenges found on the literature have been discussed. Given the growing interest in cloud forensics, this paper aims to conduct a thorough analysis based on existing literature, presenting an analytical review of the major challenges, existing solutions, and open problems in the field. The review includes the concept of cloud digital forensics, IoT-based approaches in digital forensics, the issues and challenges in cloud-based forensics, and possible blockchain solutions to these problems.
[1] Cloud forensics: identifying the major issues and challenges S Simou, C Kalloniatis, E Kavakli, S Gritzalis Advanced Information Systems Engineering: 26th International Conference, CAiSE …, 2014 [2] Cloud forensics: a review of challenges, solutions and open problems S Alqahtany, N Clarke, S Furnell, C Reich 2015 international conference on cloud computing (ICCC), 2015 [3] Technical challenges of cloud forensics and suggested solutions MY Arafat, B Mondal, S Rani Int. J. Sci. Eng. Res, 2017 [4] PDF] Block chain based data logging and integrity management system for cloud forensics JH Park, JY Park, EN Huh Computer Science & Information Technology, 2017 [5] Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014). Cloud Forensics: Identifying the Major Issues and Challenges. In: Jarke, M., et al. Advanced Information Systems Engineering. CAiSE 2014. Lecture Notes in Computer Science, vol 8484. Springer, Cham. https://doi.org/10.1007/978-3-319-07881-6_19 [6] A survey on cloud forensics challenges and solutions S Simou, C Kalloniatis, S Gritzalis, H Mouratidis Security and Communication Networks, 2016•Wiley Online Library [7] Cloud forensics issues and opportunities A Aminnezhad, A Dehghantanha, MT Abdullah, M Damshenas International Journal of Information Processing and Management, 2013•academia.edu [8] Cloud forensics solutions: A review S Simou, C Kalloniatis, E Kavakli, S Gritzalis Advanced Information Systems Engineering Workshops: CAiSE 2014 International …, 2014•Springer [9] Cloud forensics: a review of challenges, solutions and open problems S Alqahtany, N Clarke, S Furnell, C Reich 2015 international conference on cloud computing (ICCC), 2015•ieeexplore.ieee.org [10] Could block chain technology help resolve the cloud forensic problem? Y Zhao, B Duncan - Cloud Computing, 2018 - researchgate.net [11] A blockchain-based process provenance for cloud forensics Y Zhang, S Wu, B Jin, J Du 2017 3rd IEEE international conference on computer and …, 2017•ieeexplore.ieee.org [12] Block chain based data logging and integrity management system for cloud forensics JH Park, JY Park, EN Huh - Computer Science & Information Technology, 2017 - csitcp.net [13] Cloud forensics: identifying the major issues and challenges S Simou, C Kalloniatis, E Kavakli, S Gritzalis Advanced Information Systems Engineering: 26th International Conference, CAiSE …, 2014•Springer [14] Cloud forensics: issues and challenges JJ Shah, LG Malik 2013 6th International Conference on Emerging Trends in …, 2013•ieeexplore.ieee.org
Copyright © 2024 Anusha VC, Rutuja Karate, Prof. Hrishikesh Mogare. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET63399
Publish Date : 2024-06-21
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here