Cloud Forensics: Challenges and Blockchain Based Solutions

Full Text (PDF, 624KB), PP.1-12

Views: 0 Downloads: 0


Omi Akter 1,* Arnisha Akther 2 Md Ashraf Uddin 2 Manowarul Islam 2

1. Dept. of EEE, Chittagong University, Chittagong, Bangladesh

2. Dept. of CSE, Jagannath University, Dhaka, Bangladesh

* Corresponding author.


Received: 11 Mar. 2020 / Revised: 28 May 2020 / Accepted: 20 Jul. 2020 / Published: 8 Oct. 2020

Index Terms

Cloud Digital Forensics, Challenges, Digital Forensics, Forensics Tools, Blockchain, IoT, Solutions


With the advancement in digital forensics, digital forensics has been evolved in Cloud computing. A common process of digital forensics mainly includes five steps: defining problem scenario, collection of the related data, investigation of the crime scenes, analysis of evidences and case documentation. The conduction of digital forensics in cloud results in several challenges, security, and privacy issues. In this paper, several digital forensics approaches in the context of IoT and cloud have been presented. The review focused on zone-based approach for IoT digital forensics where the forensics process is divided into three zones. Digital forensics in cloud provides the facilities of large data storage, computational capabilities and identification of criminal activities required for investigating forensics. We have presented a brief study on several issues and challenges raised in each phase of Cloud forensics process. The solution approaches as well as advancement prospects of cloud forensics have been described in the light of Blockchain technology. These studies will broaden the way to new researchers for better understanding and devising new ideas for combating the challenges. 

Cite This Paper

Omi Akter, Arnisha Akther, Md Ashraf Uddin, Md Manowarul Islam, " Cloud Forensics: Challenges and Blockchain Based Solutions", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.10, No.5, pp. 1-12, 2020. DOI: 10.5815/ijwmt.2020.05.01


[1]S. Khan, A. Gani, A. W. A. Wahab, M. A. Bagiwa, M. Shiraz, S. U. Khan, R. Buyya, and A. Y. Zomaya, “Cloud log forensics: foundations, state of the art, and future directions,” ACM Computing Surveys (CSUR), vol. 49, no. 1, p. 7, 2016.

[2]M. Harbawi and A. Varol, “An improved digital evidence acquisition model for the internet of things forensic i: A theoretical framework,” in 2017 5th International Symposium on Digital Forensic and Security(ISDFS). IEEE, 2017, pp. 1–6.

[3]A. Pichan, M. Lazarescu, and S. T. Soh, “Cloud forensics: Technical challenges, solutions and comparative analysis,” Digital investigation, vol. 13, pp. 38–57, 2015.

[4]S. Simou, C. Kalloniatis, E. Kavakli, and S. Gritzalis, “Cloud forensics: identifying the major issues and challenges,” in International conferenceon advanced information systems engineering. Springer, 2014, pp. 271– 284.

[5]E. Oriwoh, D. Jazani, G. Epiphaniou, and P. Sant, “Internet of things forensics: Challenges and approaches,” in 9th IEEE International Conferenceon Collaborative computing: networking, Applications andWorksharing. IEEE, 2013, pp. 608–615.

[6]J. Dykstra and A. T. Sherman, “Understanding issues in cloud forensics: two hypothetical case studies,” UMBC Computer Science and ElectricalEngineering Department, 2011.

[7]F. Daryabar, A. Dehghantanha, N. I. Udzir, N. Sani, S. Shamsuddin, and F. Norouzizadeh, “A survey about impacts of cloud computing on digital forensics,” International Journal of Cyber-Security and DigitalForensics, vol. 2, no. 2, pp. 77–94, 2013.

[8]S. Simou, C. Kalloniatis, S. Gritzalis, and H. Mouratidis, “A survey on cloud forensics challenges and solutions,” Security and CommunicationNetworks, vol. 9, no. 18, pp. 6285–6314, 2016.

[9]A. K. Mishra, P. Matta, E. S. Pilli, and R. Joshi, “Cloud forensics: Stateof- the-art and research challenges,” in 2012 International Symposium onCloud and Services Computing. IEEE, 2012, pp. 164–170.

[10]C. Liu, A. Singhal and D. Wijesekera, “IDENTIFYING EVIDENCE FOR CLOUD FORENSIC ANALYSIS,” IFIP International Federation for Information Processing, p. 111–130, 2017.

[11]S. O'shaughnessy and A. Keane, “Impact of Cloud Computing on Digital Forensic Investigations,” in 9th International Conference on Digital Forensics (DF), Orlando, FL, 2013.

[12]S. Almulla, Y. Iraqi and A. Jones, “A State-Of-The-Art Review of Cloud Forensics,” Journal of Digital Forensics, Security and Law, vol. 9, no. 4, pp. 6-28, 2014.

[13]K. Kyei, P. Zavarsky, D. Lindskog, and R. Ruhl, “A review and comparative study of digital forensic investigation models,” in InternationalConference on Digital Forensics and Cyber Crime. Springer, 2012, pp. 314–327.

[14]E. Fleischet al., “What is the internet of things? an economic perspective,” Economics, Management, and Financial Markets, vol. 5, no. 2, pp. 125–157, 2010.

[15]L. Coetzee and G. Olivrin, “Inclusion through the internet of things,” in Assistive Technologies. IntechOpen, 2012.

[16]J. Gantz and D. Reinsel, “The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east,” IDC iView: IDCAnalyze the future, vol. 2007, no. 2012, pp. 1–16, 2012.

[17]S. Zawoad and R. Hasan, “Cloud forensics: a meta-study of challenges, approaches, and open problems,” arXiv preprint arXiv:1302.6312, 2013.

[18]R. Marty, “Cloud application logging for forensics,” in proceedings of the 2011 ACM Symposium on Applied Computing. ACM, 2011, pp.178–184.

[19]J. Dykstra and A. T. Sherman, “Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques,” Digital Investigation, vol. 9, pp. S90–S98, 2012.

[20]C. Liu, A. Singhal and D. Wijesekera, “Identifying Evidence for Cloud Forensic Analysis”, IFIP International Federation for Information Processing, p. 111-130, 2017. 

[21]G. Sibiya, H. Venter and T. Fogwill, “Digital Forensics in the Cloud: The State of the Art”, in IST- Africa 2015 Conference Proceedings, Pretoria, 2015.

[22]D. Jariwala, “Cloud Forensics: What is it? And Why is it Important?”, Techstagram, 20 March, 2013. Available: [Accessed 20 September 2019]. 

[23]R. Keyun, J. Carthy, T. Kechadi, and M. Crosbie. "Cloud forensics." In IFIP International Conference on Digital Forensics, pp. 35-46. Springer, Berlin, Heidelberg, 2011.

[24]M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis. "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues." IEEE Communications Surveys & Tutorials (2020).

[25]M. Lang, M. Wiesche, and H. Krcmar, “Criteria for selecting cloud service providers: A Delphi study of quality-of-service attributes,” Inf. Manag., vol. 55, no. 6, pp. 746–758, Sep. 2018.

[26]Y. R. Stoyanov, “An approach to use the Web services and open source software to store and share user applications and data,” in Proc. Annu. Univ. Sci. Conf. NVU, vol. 9,  pp. 92–96, 2014.

[27]Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT. Electronics 2019, 8, 1552.

[28]Uddin, Md Ashraf and Stranieri, Andrew and Gondal, Iqbal and Balasubramanian, Venki, “Blockchain leveraged decentralized IoT eHealth framework”, Internet of Things, Elsevier, v. 9, pp. 100159, 2020.

[29]Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, “A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring”, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Spain.

[30]Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, “Blockchain Leveraged Task Migration in Body Area Sensor Networks”, The 25th Asia-Pacific Conference on Communications (APCC), IEEE, Vietnam, 2019.

[31]Sidra Anwar, Sadia Anayat, Sheeza Butt, Saher Butt, Muhammad Saad, " Generation Analysis of Blockchain Technology: Bitcoin and Ethereum", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.12, No.4, pp. 30-39, 2020. DOI: 10.5815/ijieeb.2020.04.04

[32]Mousumi Mitra, Aviroop Chowdhury, " A Modernized Voting System Using Fuzzy Logic and Blockchain Technology", International Journal of Modern Education and Computer Science(IJMECS), Vol.12, No.3, pp. 17-25, 2020.DOI: 10.5815/ijmecs.2020.03.03

[33]Hany F. Atlam, Ahmed Alenezi, Madini O. Alassafi, Gary B. Wills, "Blockchain with Internet of Things: Benefits, Challenges, and Future Directions", International Journal of Intelligent Systems and Applications(IJISA), Vol.10, No.6, pp.40-48, 2018. DOI: 10.5815/ijisa.2018.06.05

[34]Hossein Mohammadinejad, Fateme Mohammadhoseini, "Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain", International Journal of Computer Network and Information Security(IJCNIS), Vol.12, No.3, pp.44-52, 2020. DOI: 10.5815/ijcnis.2020.03.05

[35]Somdip Dey, " A Proof of Work: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory ", International Journal of Wireless and Microwave Technologies (IJWMT), Vol.8, No.5, pp. 1-9, 2018.DOI: 10.5815/ijwmt.2018.05.01

[36]Al-Khateeb H., Epiphaniou G., Daly H. (2019) Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger. In: Jahankhani H., Kendzierskyj S., Jamal A., Epiphaniou G., Al-Khateeb H. (eds) Blockchain and Clinical Trial. Advanced Sciences and Technologies for Security Applications. Springer, Cham.

[37]Jun Hak Park, Jun Young Park, and Eui Nam Huh, “Block Chain Based Data Logging And Integrity Management System For Cloud Forensics”, International Conference on Computer Science, Engineering and Applications, pp. 149– 159, 2017. 

[38]Duc-Phong Le, Huasong Meng, Le Su, Sze Ling Yeo, and Vrizlynn Thing, “BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy”, Proceedings of TENCON 2018 - 2018 IEEE Region 10 Conference, 2018.

[39]Shanking Li, Tao Qin, and Geyong Min, “Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems”, IEEE Transactions On Computational Social Systems, VOL. 6, NO. 6, DECEMBER, 2019.

[40]Mehran Pourvahab, And Gholamhossein Ekbatanifard, “Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology”, Special Section On Emerging Approaches To Cyber Security, IEEE Access, 2019.

[41]Jia Wang, Fang Peng, Hui Tian, Wenqi Chen, and Jing Lu, “Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain”, Springer Nature Switzerland AG, LNICST 284, pp. 378–387, 2019.