Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption

被引:4
作者
Alashjaee, Abdullah Mujawib [1 ]
Alqahtani, Fahad [2 ]
机构
[1] Northern Border Univ, Fac Comp & Informat Technol, Dept Comp Sci, Rafha 91911, Saudi Arabia
[2] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Al Kharj 16278, Saudi Arabia
关键词
Cloud computing; Authentication; Digital forensics; Safety; Cryptography; Computer architecture; Security; Homomorphic encryption; Storage management; Key generation; encryption; decryption digital forensic architecture; multikey homomorphic encryption; EFFICIENT; INTERNET;
D O I
10.1109/ACCESS.2024.3369604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure storage model for digital forensics represents essential progress in the domain, addressing the major problems associated with protecting and maintaining digital evidence. This method employs recent encryption systems and optimal key generation methods to ensure the confidentiality and integrity of data throughout the investigative process. Cloud forensics is an intelligent development of digital forensics to be preserved against online hacking. But, centralized evidence gathered and preservation reduces the reliability of digital evidence. The architecture for digital forensics in an Infrastructure as a Service (IaaS) cloud platform is a crucial structure intended to simplify the collection and protection of evidence while preserving the integrity and origin of digital objects within cloud-based methods. This architecture integrates numerous modules and methods to address the exclusive tasks modeled by cloud computing (CC) environments in the framework of forensic investigations. This paper develops a new digital forensic architecture utilizing the Authentication with Optimal Key Generation Encryption (DFA-AOKGE) technique. The main intention of the DFA-AOKGE method is to use a BC-distributed design to allocate data between numerous peers for data collection and safe storage. Additionally, the DFA-AOKGE model uses the Secure Block Verification Mechanism (SBVM) for the authentication procedure. Also, the secret keys can be produced by the usage of the Enhanced Equilibrium Optimizer (EEO) model. Furthermore, the encryption of the data takes place using a multikey homomorphic encryption (MHE) approach and is then saved in the cloud server. The simulation value of the DFA-AOKGE methodology takes place in terms of different aspects. The simulation results exhibited that the DFA-AOKGE system shows prominent performance over other recent approaches in terms of different measures.
引用
收藏
页码:29738 / 29747
页数:10
相关论文
共 24 条
[11]  
Khan S., 2021, Sci. Program., P1
[12]   Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications [J].
Kumar, Gulshan ;
Saha, Rahul ;
Lal, Chhagan ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 120 :13-25
[13]   Secure biometric authentication with de-duplication on distributed cloud storage [J].
Kumar, Vinoth M. ;
Venkatachalam, K. ;
Prabu, P. ;
Almutairi, Abdulwahab ;
Abouhawwash, Mohamed .
PEERJ COMPUTER SCIENCE, 2021, 7
[14]  
Liu ZQ, 2025, IEEE T VEH TECHNOL, V74, P1877, DOI [10.1109/TVT.2023.3340723, 10.1109/ICEPE-ST61894.2024.10792607]
[15]   Efficient Privacy-Preserving Spatial Data Query in Cloud Computing [J].
Miao, Yinbin ;
Yang, Yutao ;
Li, Xinghua ;
Wei, Linfeng ;
Liu, Zhiquan ;
Deng, Robert H. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) :122-136
[16]  
Nasreen A. H., 2023, J. Mobile Multimedia, V19, P679
[17]   Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things [J].
Nyangaresi, Vincent Omollo ;
Ahmad, Musheer ;
Alkhayyat, Ahmed ;
Feng, Wei .
EXPERT SYSTEMS, 2022, 39 (10)
[18]  
Rajashree V., Implementation of high speed and lightweight symmetrickey encryption algorithm-based authentication protocol for resource con-strained devices
[19]   Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC [J].
Raji, L. ;
Ramya, S. Thanga .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
[20]   Efficient and reliable forensics using intelligent edge computing [J].
Razaque, Abdul ;
Aloqaily, Moayad ;
Almiani, Muder ;
Jararweh, Yaser ;
Srivastava, Gautam .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 118 :230-239