Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption

被引:4
作者
Alashjaee, Abdullah Mujawib [1 ]
Alqahtani, Fahad [2 ]
机构
[1] Northern Border Univ, Fac Comp & Informat Technol, Dept Comp Sci, Rafha 91911, Saudi Arabia
[2] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Al Kharj 16278, Saudi Arabia
关键词
Cloud computing; Authentication; Digital forensics; Safety; Cryptography; Computer architecture; Security; Homomorphic encryption; Storage management; Key generation; encryption; decryption digital forensic architecture; multikey homomorphic encryption; EFFICIENT; INTERNET;
D O I
10.1109/ACCESS.2024.3369604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure storage model for digital forensics represents essential progress in the domain, addressing the major problems associated with protecting and maintaining digital evidence. This method employs recent encryption systems and optimal key generation methods to ensure the confidentiality and integrity of data throughout the investigative process. Cloud forensics is an intelligent development of digital forensics to be preserved against online hacking. But, centralized evidence gathered and preservation reduces the reliability of digital evidence. The architecture for digital forensics in an Infrastructure as a Service (IaaS) cloud platform is a crucial structure intended to simplify the collection and protection of evidence while preserving the integrity and origin of digital objects within cloud-based methods. This architecture integrates numerous modules and methods to address the exclusive tasks modeled by cloud computing (CC) environments in the framework of forensic investigations. This paper develops a new digital forensic architecture utilizing the Authentication with Optimal Key Generation Encryption (DFA-AOKGE) technique. The main intention of the DFA-AOKGE method is to use a BC-distributed design to allocate data between numerous peers for data collection and safe storage. Additionally, the DFA-AOKGE model uses the Secure Block Verification Mechanism (SBVM) for the authentication procedure. Also, the secret keys can be produced by the usage of the Enhanced Equilibrium Optimizer (EEO) model. Furthermore, the encryption of the data takes place using a multikey homomorphic encryption (MHE) approach and is then saved in the cloud server. The simulation value of the DFA-AOKGE methodology takes place in terms of different aspects. The simulation results exhibited that the DFA-AOKGE system shows prominent performance over other recent approaches in terms of different measures.
引用
收藏
页码:29738 / 29747
页数:10
相关论文
共 24 条
[1]   Personal authentication and cryptographic key generation based on electroencephalographic signals [J].
Abdel-Ghaffar, Eman A. ;
Daoudi, Mohamed .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02)
[2]   A Novel Blockchain Framework for Digital Forensics in Cloud Environment Using Multi-objective Krill Herd Cuckoo Search Optimization Algorithm [J].
Apirajitha, P. S. ;
Devi, R. Renuka .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (02) :1083-1098
[3]   Optimal Multisecret Image Sharing Using Lightweight Visual Sign-Cryptography Scheme With Optimal Key Generation for Gray/Color Images [J].
Bachiphale, Pramod M. ;
Zulpe, Nitish S. .
INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2025, 25 (03)
[4]   Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference [J].
Chen, Hao ;
Dai, Wei ;
Kim, Miran ;
Song, Yongsoo .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :395-412
[5]   Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing [J].
Deebak, B. D. ;
AL-Turjman, Fadi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 116 :406-425
[6]  
Du S. H., 2022, Secur. Commun. Netw., P1
[7]   TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks [J].
Guo, Jingjing ;
Liu, Zhiquan ;
Tian, Siyi ;
Huang, Feiran ;
Li, Jiaxing ;
Li, Xinghua ;
Igorevich, Kostromitin Konstantin ;
Ma, Jianfeng .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (11) :3548-3560
[8]   Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology [J].
Henge, Santosh Kumar ;
Jayaraman, Gitanjali ;
Sreedevi, M. ;
Rajakumar, R. ;
Rashid, Mamoon ;
Alshamrani, Sultan S. ;
Alnfiai, Mrim M. ;
AlGhamdi, Ahmed Saeed .
NETWORKS AND HETEROGENEOUS MEDIA, 2023, 18 (03) :1313-1334
[9]   Development and application of equilibrium optimizer for optimal power flow calculation of power system [J].
Houssein, Essam H. ;
Hassan, Mohamed H. ;
Mahdy, Mohamed A. ;
Kamel, Salah .
APPLIED INTELLIGENCE, 2023, 53 (06) :7232-7253
[10]  
Kashif Mohammad, 2023, 2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON), P79, DOI 10.1109/REEDCON57544.2023.10150684