Secure storage model for digital forensic readiness

dc.contributor.authorSingh, Avinash
dc.contributor.authorIkuesan, Richard Adeyemi
dc.contributor.authorVenter, H.S. (Hein)
dc.contributor.emailasingh@cs.up.ac.zaen_US
dc.date.accessioned2022-11-23T08:42:37Z
dc.date.available2022-11-23T08:42:37Z
dc.date.issued2022-02
dc.description.abstractSecuring digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environment and access to the evidence are secure. Attackers can go to extreme lengths to cover up their tracks, which is a serious concern to digital forensics – particularly digital forensic readiness. If an attacker gains access to the location where evidence is stored, they could easily alter the evidence (if not remove it altogether). Even though integrity checks can be performed to ensure that the evidence is sound, the collected evidence may contain sensitive information that an attacker can easily use for other forms of attack. To this end, this paper proposes a model for securely storing digital evidence captured pre- and post-incident to achieve reactive forensics. Various components were considered, such as integrity checks, environment sandboxing, strong encryption, two-factor authentication, as well as unique random file naming. A proof-of-concept tool was developed to realize this model and to prove its validity. A series of tests were conducted to check for system security, performance, and requirements validation, Overall, the results obtained showed that, with minimal effort, securing forensic artefacts is a relatively inexpensive and reliable feat. This paper aims to standardize evidence storage, practice high security standards, as well as remove the need to create new systems that achieve the same purpose.en_US
dc.description.departmentComputer Scienceen_US
dc.description.urihttps://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639en_US
dc.identifier.citationA. Singh, R. A. Ikuesan and H. Venter, "Secure Storage Model for Digital Forensic Readiness," in IEEE Access, vol. 10, pp. 19469-19480, 2022, doi: 10.1109/ACCESS.2022.3151403.en_US
dc.identifier.issn2169-3536 (online)
dc.identifier.other10.1109/ACCESS.2022.3151403
dc.identifier.urihttps://repository.up.ac.za/handle/2263/88450
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rightsThis work is licensed under a Creative Commons Attribution Non Commercial No Derivatives 4.0 License.en_US
dc.subjectDigital forensicsen_US
dc.subjectEncryptionen_US
dc.subjectSecure storageen_US
dc.subjectStandards organizationsen_US
dc.subjectDigital forensics readinessen_US
dc.subjectIntegrity verificationen_US
dc.subjectDigital forensics soundnessen_US
dc.subjectCloud computingen_US
dc.titleSecure storage model for digital forensic readinessen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Singh_Secure_2022.pdf
Size:
2.58 MB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: