Advertisement

Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem

  • Kenny Awuson-DavidEmail author
  • Tawfik Al-HadhramiEmail author
  • Olajide FunminiyiEmail author
  • Ahmad LotfiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

As Cloud technology continues to evolve with a vast amount of data being transmitted daily, it has added another form of complexity in a forensic investigation. In order to mitigate the complexity of evidence acquisition in the Cloud, we need a method that can forensically maintain digital accounting and trustworthiness with data confidentiality and integrity in the Cloud environment. The current systems have severe security vulnerabilities as it does not provide data confidentiality, integrity and accountability of users and system logs. Due to the complexity in the Cloud ecosystem, acquired evidence can easily be contaminated and cannot be admissible in a court of law. The geolocation, multi-tenancy and political issues have added to the complexity in forensic investigations. Blockchain will facilitate trust between the Cloud Service Providers (CSP) and their customers by heightening the trustworthiness of data and its integrity both in transit and storage. In this paper, we are proposing an innovative permissioned Hyperledger Fabric Blockchain Containerised Cloud ecosystem that will secure and preserve the integrity of digital evidence both in transit or storage. Then, design and implement a Dockerised private Blockchain Cloud ecosystem architecture that will mitigate the challenges faced by forensic investigators in the Cloud ecosystem by preserving evidence integrity in a multi-tenancy and private Cloud environment.

Keywords

Blockchain Cloud forensics Digital forensic Digital evidence Docker container Hyperledger Fabric 

Notes

Acknowledgements

We would also like to show our appreciation to all the anonymous reviewers for their valuable comments. We thank Nottingham Trent University for supporting this work and grateful for the resources provided by the University.

References

  1. 1.
    Farina, J., Scanlon, M., Le-Khac, N.A., Kechadi, M.T.: Overview of the forensic investigation of cloud services. In: 2015 10th International Conference on Availability, Reliability and Security, pp. 556–565. IEEE (2015)Google Scholar
  2. 2.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRefGoogle Scholar
  3. 3.
    Stanciu, A.: Blockchain based distributed control system for edge computing. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 667–671. IEEE (2017)Google Scholar
  4. 4.
    Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger (2016)Google Scholar
  5. 5.
    Weissman, C.D., Bobrowski, S.: The design of the force. com multitenant internet application development platform. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 889–896. ACM (2009)Google Scholar
  6. 6.
    Cucurull, J., Puiggali, J.: Distributed immutabilization of secure logs. In: International Workshop on Security and Trust Management, pp. 122–137. Springer (2016)Google Scholar
  7. 7.
    AlJahdali, H., Albatli, A., Garraghan, P., Townend, P., Lau, L., Xu, J.: Multi-tenancy in cloud computing. In: 2014 IEEE 8th International Symposium on Service Oriented System Engineering, pp. 344–351. IEEE (2014)Google Scholar
  8. 8.
    Quick, D., Choo, K.K.R.: Big forensic data reduction: digital forensic images and electronic evidence. Cluster Comput. 19(2), 723–740 (2016)CrossRefGoogle Scholar
  9. 9.
    Ranjan, R., Buyya, R.: Decentralized overlay for federation of enterprise clouds. In: Handbook of Research on Scalable Computing Technologies, pp. 191–217. IGI Global (2010)Google Scholar
  10. 10.
    Yang, Z., Yang, K., Lei, L., Zheng, K., Leung, V.C.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495–1505 (2018)CrossRefGoogle Scholar
  11. 11.
    Sharma, P.K., Chen, M.Y., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for iot. IEEE Access 6, 115–124 (2017)CrossRefGoogle Scholar
  12. 12.
    Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 458–467. IEEE Press (2017)Google Scholar
  13. 13.
    Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017)Google Scholar
  14. 14.
    Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263–2268 (2013)CrossRefGoogle Scholar
  15. 15.
    Al Fahdi, M., Clarke, N.L., Furnell, S.M.: Challenges to digital forensics: a survey of researchers & practitioners attitudes and opinions. In: 2013 Information Security for South Africa, pp. 1–8. IEEE (2013)Google Scholar
  16. 16.
    Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  17. 17.
    Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, vol. 30. ACM (2018)Google Scholar
  18. 18.
    Gaur, N., Desrosiers, L., Ramakrishna, V., Novotny, P., Baset, S.A., O’Dowd, A.: Hands-On Blockchain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer. Packt Publishing Ltd (2018)Google Scholar
  19. 19.
    Schenker, D.G.N.: Deploy, scale, orchestrate, and manage containers with Docker and Kubernetes. PACKT (2018)Google Scholar
  20. 20.
    Xun (Brian) Wu, W.S.: A beginner's guide to developing enterprise-grade decentralized applications. PACKT (2018)Google Scholar
  21. 21.
    Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011)CrossRefGoogle Scholar
  22. 22.
    Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2017)CrossRefGoogle Scholar
  23. 23.
    Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)CrossRefGoogle Scholar
  24. 24.
    Casey, E.: Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press (2011)Google Scholar
  25. 25.
    Grobler, C.P., Louwrens, C.: Digital forensic readiness as a component of information security best practice. In: IFIP International Information Security Conference, pp. 13–24. Springer (2007)Google Scholar
  26. 26.
    Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304–308 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Science and TechnologyNottingham Trent UniversityNottinghamUK

Personalised recommendations