BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem

被引:33
作者
Awuson-David, Kenny [1 ]
Al-Hadhrami, Tawfik [2 ]
Alazab, Mamoun [3 ]
Shah, Nazaraf [1 ]
Shalaginov, Andrii [4 ]
机构
[1] Coventry Univ, Inst Future Transport & Cities, Priory St, Coventry CV1 5FB, W Midlands, England
[2] Nottingham Trent Univ, Sch Sci & Technol, Nottingham NG11 8NS, England
[3] Charles Darwin Univ, Coll Engn IT & Environm, Darwin, NT, Australia
[4] Norwegian Univ Sci & Technol Gjovik, Gjovik, Norway
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 122卷
关键词
Blockchain; DSRM; GDPR; Digital log evidence; Trustworthiness; Admissibility; BLOCKCHAIN; FRAMEWORK; SECURITY; METHODOLOGY; CHALLENGES;
D O I
10.1016/j.future.2021.03.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when, why and how a cyber adversary or an insider compromised a system by establishing the crime scene and reconstructing how the incident occurred. However, digital evidence acquisition in a cloud ecosystem is complicated and proven difficult, even with modern forensic acquisition toolkit. The multi-tenancy, Geo-location and Service-Level Agreement have added another layer of complexity in acquiring digital log evidence from a cloud ecosystem. In order to mitigate these complexities of evidence acquisition in the cloud ecosystem, we need a framework that can forensically maintain the trustworthiness and integrity of log evidence. In this paper, we design and implement a Blockchain Cloud Forensic Logging (BCFL) framework, using a Design Science Research Methodological (DSRM) approach. BCFL operates primarily in four stages: (1) Process transaction logs using Blockchain distributed ledger technology (DLT). (2) Use a Blockchain smart contract to maintain the integrity of logs and establish a clear chain of custody. (3) Validate all transaction logs. (4) Maintain transaction log immutability. BCFL will also enhance and strengthen compliance with the European Union (EU) General Data Protection Regulation (GDPR). The results from our single case study will demonstrate that BCFL will mitigate the challenges and complexities faced by digital forensics investigators in acquiring admissible digital evidence from the cloud ecosystem. Furthermore, an instantaneous performance monitoring of the proposed Blockchain cloud forensic logging framework was evaluated. BCFL will ensure trustworthiness, integrity, authenticity and non-repudiation of the log evidence in the cloud. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 69 条
[1]   Forensic-by-Design Framework for Cyber-Physical Cloud Systems [J].
Ab Rahman, Nurul Hidayah ;
Glisson, William Bradley ;
Yang, Yanjiang ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :50-59
[2]   Forensics framework for cloud computing [J].
Alex, M. Edington ;
Kishore, R. .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 60 :193-205
[3]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[4]   Multi-Tenancy in Cloud Computing [J].
AlJahdali, Hussain ;
Albatli, Abdulaziz ;
Garraghan, Peter ;
Townend, Paul ;
Lau, Lydia ;
Xu, Jie .
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, :344-351
[5]   A semantic-based methodology for digital forensics analysis [J].
Amato, Flora ;
Castiglione, Aniello ;
Cozzolino, Giovanni ;
Narducci, Fabio .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 138 :172-177
[6]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[7]  
[Anonymous], 2011, International Journal Multimedia and Image Processing, DOI DOI 10.20533/IJMIP.2042.4647.2011.0004
[8]   The power of a blockchain-based supply chain [J].
Azzi, Rita ;
Chamoun, Rima Kilany ;
Sokhn, Maria .
COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 135 :582-592
[9]  
Berberich M., 2016, European Data Protection Law Review (EDPL), V2, P422, DOI [10/gd247q, 10.21552/EDPL/2016/3/21]
[10]  
Birk D., 2011, 2011 6 IEEE INT WORK, P1