A Fog-Based Digital Forensics Investigation Framework for IoT Systems

The increasing number of IoT devices is prompting the need to investigate digital forensic techniques that can be efficiently applied to solve computer-related crimes involving IoT devices. In digital forensics, it is common for forensic investigators to consider computing hardware and operating systems for forensic data acquisition. However, applying current forensic data acquisition techniques for further digital evidence analysis may not be applicable to some IoT devices. It is becoming increasingly challenging to determine what type of data should be collected from IoT devices and how traces from such devices can be leveraged by forensic investigators. In this paper, we introduce a fog-based IoT forensic framework (FoBI) that attempts to address the key challenges associated with digital IoT forensics. Throughout this paper, we discuss the overall architecture, use cases and implementation details of FoBI. We further use our FoBI framework to provide insights on improving the digital forensics processes involving IoT systems.

[1]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[2]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[3]  Safaa Hraiz Challenges of digital forensic investigation in cloud computing , 2017, 2017 8th International Conference on Information Technology (ICIT).

[4]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[5]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[6]  Adeel Anjum,et al.  A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..

[7]  Indrakshi Ray,et al.  A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[8]  Aderemi A. Atayero,et al.  Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .

[9]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[10]  Kim-Kwang Raymond Choo,et al.  Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective , 2017, IEEE Cloud Computing.

[11]  Bill Nelson,et al.  Guide to Computer Forensics and Investigations , 2003 .

[12]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[13]  Dmitry Zegzhda,et al.  Achieving Internet of Things security via providing topological sustainability , 2015, 2015 Science and Information Conference (SAI).

[14]  Shaftab Ahmed,et al.  Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.

[15]  Yuval Elovici,et al.  Opening Pandora's Box: E ective Techniques for Reverse Engineering IoT Devices , 2017 .

[16]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[17]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[19]  Robert W. Messler,et al.  Reverse Engineering: Mechanisms, Structures, Systems & Materials , 2013 .

[20]  Kim-Kwang Raymond Choo,et al.  Healthcare-Related Data in the Cloud: Challenges and Opportunities , 2016, IEEE Cloud Computing.

[21]  Norita Md Norwawi,et al.  Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[22]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[23]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[24]  Ramjee Prasad,et al.  Capability-based access control delegation model on the federated IoT network , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[25]  Kim-Kwang Raymond Choo,et al.  Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.

[26]  Diane Barrett,et al.  Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments , 2010 .