Secure storage model for digital forensic readiness

Please be advised that the site will be down for maintenance on Sunday, September 1, 2024, from 08:00 to 18:00, and again on Monday, September 2, 2024, from 08:00 to 09:00. We apologize for any inconvenience this may cause.

Show simple item record

dc.contributor.author Singh, Avinash
dc.contributor.author Ikuesan, Richard Adeyemi
dc.contributor.author Venter, H.S. (Hein)
dc.date.accessioned 2022-11-23T08:42:37Z
dc.date.available 2022-11-23T08:42:37Z
dc.date.issued 2022-02
dc.description.abstract Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environment and access to the evidence are secure. Attackers can go to extreme lengths to cover up their tracks, which is a serious concern to digital forensics – particularly digital forensic readiness. If an attacker gains access to the location where evidence is stored, they could easily alter the evidence (if not remove it altogether). Even though integrity checks can be performed to ensure that the evidence is sound, the collected evidence may contain sensitive information that an attacker can easily use for other forms of attack. To this end, this paper proposes a model for securely storing digital evidence captured pre- and post-incident to achieve reactive forensics. Various components were considered, such as integrity checks, environment sandboxing, strong encryption, two-factor authentication, as well as unique random file naming. A proof-of-concept tool was developed to realize this model and to prove its validity. A series of tests were conducted to check for system security, performance, and requirements validation, Overall, the results obtained showed that, with minimal effort, securing forensic artefacts is a relatively inexpensive and reliable feat. This paper aims to standardize evidence storage, practice high security standards, as well as remove the need to create new systems that achieve the same purpose. en_US
dc.description.department Computer Science en_US
dc.description.uri https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 en_US
dc.identifier.citation A. Singh, R. A. Ikuesan and H. Venter, "Secure Storage Model for Digital Forensic Readiness," in IEEE Access, vol. 10, pp. 19469-19480, 2022, doi: 10.1109/ACCESS.2022.3151403. en_US
dc.identifier.issn 2169-3536 (online)
dc.identifier.other 10.1109/ACCESS.2022.3151403
dc.identifier.uri https://repository.up.ac.za/handle/2263/88450
dc.language.iso en en_US
dc.publisher Institute of Electrical and Electronics Engineers en_US
dc.rights This work is licensed under a Creative Commons Attribution Non Commercial No Derivatives 4.0 License. en_US
dc.subject Digital forensics en_US
dc.subject Encryption en_US
dc.subject Secure storage en_US
dc.subject Standards organizations en_US
dc.subject Digital forensics readiness en_US
dc.subject Integrity verification en_US
dc.subject Digital forensics soundness en_US
dc.subject Cloud computing en_US
dc.title Secure storage model for digital forensic readiness en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record