Next-generation Digital Forensics Challenges and Evidence Preservation Framework for IoT Devices Next-generation Digital Forensics Challenges Section Original Research
##plugins.themes.academic_pro.article.main##
Abstract
The proliferation of the Internet of Things devices in today’s environment generates huge amount of information about users and surroundings. Data produced by IoT devices attracts cybercriminals to perform malicious activity. The technologies like cloud and fog computing are emerging as the next-generation infrastructure for Internet of Things which may be challenging for digital investigation. In this paper, IoT and fog-based frameworks for digital forensics of IoT devices are explained and tools used in different levels of IoT such as physical level, cloud level, network level, and mobile application level are briefly discussed. The process of evidence collection and challenges in IoT forensics paradigms are well studied. For securing the extracted artifacts IoT evidence preservation framework is proposed (IoT-EvPF). Furthermore, the forensic challenges in a cloud computing environment and anti-forensics techniques used by cybercriminals to hide their identity and malicious activity are discussed. We have identified research gaps and provided a framework to encourage more thought and conversation about the difficulties of retrieving digital evidence from Fog Computing systems.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- AL-MASRI, E., BAI, Y., AND LI, J. 2018. A fog-based digital forensics investigation framework for IoT systems. Proceedings - 3rd IEEE International Conference on Smart Cloud, SmartCloud 2018, Institute of Electrical and Electronics Engineers Inc., 196–201. DOI: https://doi.org/10.1109/SmartCloud.2018.00040
- ALRUWAILI, F.F. 2021. Custodyblock: A distributed chain of custody evidence framework. Information (Switzerland) 12, 2, 1–12. DOI: https://doi.org/10.3390/info12020088
- ANUSH LAKSHMAN, S. AND EBENEZER, D. 2021. Integration of internet of things and drones and its future applications. Materials Today: Proceedings, Elsevier Ltd, 944–949. DOI: https://doi.org/10.1016/j.matpr.2021.05.039
- AROOJ, A., FAROOQ, M.S., AKRAM, A., IQBAL, R., SHARMA, A., AND DHIMAN, G. 2022. Big Data Processing and Analysis in Internet of Vehicles: Architecture, Taxonomy, and Open Research Challenges. Archives of Computational Methods in Engineering 29, 793–829. DOI: https://doi.org/10.1007/s11831-021-09590-x
- ATLAM, H.F., EL-DIN HEMDAN, E., ALENEZI, A., ALASSAFI, M.O., AND WILLS, G.B. 2020. Internet of Things Forensics: A Review. Internet of Things 11, May, 100220. DOI: https://doi.org/10.1016/j.iot.2020.100220
- ATZORI, L., IERA, A., AND MORABITO, G. 2010. The Internet of Things: A survey. Computer Networks 54, 15, 2787–2805. DOI: https://doi.org/10.1016/j.comnet.2010.05.010
- BANDIL, A. AND AL-MASRI, E. 2020. VTA-IH: A Fog-based Digital Forensics Framework. 2020 6th International Conference on Science in Information Technology: Embracing Industry 4.0: Towards Innovation in Disaster Management, ICSITech 2020, Institute of Electrical and Electronics Engineers Inc., 103–108. DOI: https://doi.org/10.1109/ICSITech49800.2020.9392064
- CHEEMA, S.M., ALI, M., PIRES, I.M., GONÇALVES, N.J., NAQVI, M.H., AND HASSAN, M. 2022. IoAT Enabled Smart Farming: Urdu Language-Based Solution for Low-Literate Farmers. Agriculture 12, 8, 1277. DOI: https://doi.org/10.3390/agriculture12081277
- CHEN, S., ZHAO, C., HUANG, L., YUAN, J., AND LIU, M. 2020. Study and implementation on the application of blockchain in electronic evidence generation. Forensic Science International: Digital Investigation 35, 301001. DOI: https://doi.org/10.1016/j.fsidi.2020.301001
- CORALLO, A., LAZOI, M., LEZZI, M., AND LUPERTO, A. 2022. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Computers in Industry 137. DOI: https://doi.org/10.1016/j.compind.2022.103614
- DUAN, H., ZHENG, Y., WANG, C., AND YUAN, X. 2019. Treasure collection on foggy islands: Building secure network archives for internet of things. IEEE Internet of Things Journal 6, 2, 2637–2650. DOI: https://doi.org/10.1109/JIOT.2018.2872461
- GARFINKEL, S. 2007. Anti-Forensics: Techniques, Detection and Countermeasures. .
- GOODISON, S.E., DAVIS, R.C., AND JACKSON, B.A. 2015. Digital Evidence and the U.S Criminal Justice System. .
- GUNDERSEN, J.H. 2022. Digital forensics on fog-based IoT devices. .
- HANDIGOL, N., HELLER, B., JEYAKUMAR, V., MAZÌ, D., AND MCKEOWN, N. I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. .
- HEGARTY, R. AND TAYLOR, M. 2021. Digital evidence in fog computing systems. Computer Law and Security Review 41. DOI: https://doi.org/10.1016/j.clsr.2021.105576
- HERENCSAR, N. 2022. Proliferation of Internet-of-Things Devices in Consumer Technologies. IEEE Consumer Electronics Magazine 11, 3, 4–5. DOI: https://doi.org/10.1109/MCE.2022.3169402
- HERMAN, M., IORGA, M., SALIM, A.M., ET AL. 2020. NIST cloud computing forensic science challenges. Gaithersburg, MD. DOI: https://doi.org/10.6028/NIST.IR.8006
- HOU, J., LI, Y., YU, J., AND SHI, W. 2020. A Survey on Digital Forensics in Internet of Things. IEEE Internet of Things Journal 7, 1–15. DOI: https://doi.org/10.1109/JIOT.2019.2940713
- IORGA, M., FELDMAN, L., BARTON, R., MARTIN, M.J., GOREN, N., AND MAHMOUDI, C. 2018. Fog computing conceptual model. Gaithersburg, MD. DOI: https://doi.org/10.6028/NIST.SP.500-325
- JAISWAL, C., NATH, M., AND KUMAR, V. 2014. Location-based security framework for cloud perimeters. IEEE Cloud Computing 1, 3, 56–64. DOI: https://doi.org/10.1109/MCC.2014.59
- JIA, C. AND DONG, F. 2022. Research on Intelligent collar animal husbandry health diagnosis service platform based on Cloud Computing. Institute of Electrical and Electronics Engineers (IEEE), 489–493. DOI: https://doi.org/10.23919/WAC55640.2022.9934457
- KEBANDE, V.R. AND RAY, I. 2016. A generic digital forensic investigation framework for Internet of Things (IoT). Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, 356–362. DOI: https://doi.org/10.1109/FiCloud.2016.57
- KHAN, M.N.A., ULLAH, S.W., KHAN, A.R., AND KHAN, K. 2018. Analysis of Digital Investigation Techniques in Cloud Computing Paradigm. International Journal of Next-Generation Computing 9, 3, 251–259.
- LI, S., QIN, T., AND MIN, G. 2019. Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems. IEEE Transactions on Computational Social Systems 6, 6, 1433–1441. DOI: https://doi.org/10.1109/TCSS.2019.2927431
- MASON, S. 2014. Electronic evidence: A proposal to reform the presumption of reliability and hearsay. Computer Law and Security Review 30, 1, 80–84. DOI: https://doi.org/10.1016/j.clsr.2013.12.005
- MEFFERT, C., CLARK, D., BAGGILI, I., AND BREITINGER, F. 2017. Forensic state acquisition from internet of things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. ACM International Conference Proceeding Series Part F1305. DOI: https://doi.org/10.1145/3098954.3104053
- MELL, P.M. AND GRANCE, T. 2011. The NIST definition of cloud computing. Gaithersburg, MD. DOI: https://doi.org/10.6028/NIST.SP.800-145
- MUKHERJEE, M., MATAM, R., SHU, L., ET AL. 2017. Security and Privacy in Fog Computing: Challenges. IEEE Access 5, 19293–19304. DOI: https://doi.org/10.1109/ACCESS.2017.2749422
- NOURA, H.N., SALMAN, O., CHEHAB, A., AND COUTURIER, R. 2020. DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Networks 98, 102061. DOI: https://doi.org/10.1016/j.adhoc.2019.102061
- ORIWOH, E., JAZANI, D., EPIPHANIOU, G., AND SANT, P. 2013. Internet of Things Forensics: Challenges and approaches. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013, 608–615. DOI: https://doi.org/10.4108/icst.collaboratecom.2013.254159
- ORIWOH, E. AND SANT, P. 2013. The forensics edge management system: A concept and design. Proceedings - IEEE 10th International Conference on Ubiquitous Intelligence and Computing, UIC 2013 and IEEE 10th International Conference on Autonomic and Trusted Computing, ATC 2013, 544–550. DOI: https://doi.org/10.1109/UIC-ATC.2013.71
- PAPAIOANNOU, M., KARAGEORGOU, M., MANTAS, G., ET AL. 2022. A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). Transactions on Emerging Telecommunications Technologies 33, 6. DOI: https://doi.org/10.1002/ett.4049
- RIJANTO, A. 2021. Blockchain technology adoption in supply chain finance. Journal of Theoretical and Applied Electronic Commerce Research 16, 7, 3078–3098. DOI: https://doi.org/10.3390/jtaer16070168
- ROMAN, R., LOPEZ, J., AND MAMBO, M. 2018. Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78, 680–698. DOI: https://doi.org/10.1016/j.future.2016.11.009
- SALAMA, U., YAO, L., AND PAIK, H.Y. 2022. A Multilevel Collective Framework for Internet of Things Digital Forensic Investigation. Computer 55, 2, 44–53. DOI: https://doi.org/10.1109/MC.2021.3095492
- SHI, W., CAO, J., ZHANG, Q., LI, Y., AND XU, L. 2016. Edge Computing: Vision and Challenges. IEEE Internet of Things Journal 3, 5, 637–646. DOI: https://doi.org/10.1109/JIOT.2016.2579198
- SINGH, R.M., AWASTHI, L.K., AND SIKKA, G. 2023. Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. ACM Computing Surveys 55, 3, 1–43. DOI: https://doi.org/10.1145/3494520
- TADDEO, M. 2019. Is Cybersecurity a Public Good? Minds and Machines 29, 349–354. DOI: https://doi.org/10.1007/s11023-019-09507-5
- TSAI, F.C. 2021. The application of blockchain of custody in criminal investigation process. Procedia Computer Science 192, 2779–2788. DOI: https://doi.org/10.1016/j.procs.2021.09.048
- TULI, S. AND JHA, N.K. 2022. DINI: data imputation using neural inversion for edge applications. Scientific Reports 12, 1. DOI: https://doi.org/10.1038/s41598-022-24369-1
- VALLENTIN VALLENTIN, M., PAXSON, V., AND SOMMER, R. 2016. VAST: A Unified Platform for Interactive Network Forensics. .
- WANG, Y., UEHARA, T., AND SASAKI, R. 2015. Fog computing: Issues and challenges in security and forensics. Proceedings - International Computer Software and Applications Conference, IEEE Computer Society, 53–59. DOI: https://doi.org/10.1109/COMPSAC.2015.173
- YAACOUB, J.P., NOURA, H., SALMAN, O., AND CHEHAB, A. 2020. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things (Netherlands) 11. DOI: https://doi.org/10.1016/j.iot.2020.100218