Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July-September 2023, Volume 38 Issue 4
    Article

    BLENDED SECURITY PROTOCOL FOR EVIDENCE INTEGRITY PRESERVATION IN CLOUD FORENSICS USING BLOCKCHAIN TECHNOLOGY
    Siva Rama Krishna T1.* A. S. N. Chakravarthy2
    Journal of Data Acquisition and Processing, 2023, 38 (4): 1432-1460 . 

    Abstract

    Abstract: Cloud computing is termed as an emerging technology in the recent days due to advanced applications. In cloud, the security issues are increasing, which modelled a new concept as cloud forensics. The cloud forensic is an intelligent adaption of digital forensic, which can defeat crimes. Meanwhile, the centralized compilation of evidence and its perpetuation reduces feasibility of digital verification. This paper devises a novel forensic method, namely Evidence Integrity Preservation method using cloud-assisted blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. For preserving the system from illegitimate users, the Elliptical curve cryptography (ECC) method is incorporated. Here, the system consists of five different entities, namely Hypervisor (VMM), Node controller, log ledger, IPFS file storage, and Smart contract. The proposed method involves six different phases, such as Log File creation phase, Key Setup and exchange phase, Evidence setup and control phase, integrity assurance phase, Agreement validation and confidential file release and blockchain-based communication phase. This model incorporates Interplanetary File System (IPFS) for the effective data sharing between cloud owner and investigator. The proposed Evidence Integrity Preservation method provides superior performance in contrast to other methods with maximal detection rate of 0.9 and minimal memory of 1342176 bytes.

    Keyword

    Cloud computing, Blockchain, Security, Privacy preservation, Cloud forensics


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved
.