
A. Nieto, R. Roman, and J. Lopez, \Digital Witness: Safeguarding Digital Evidence by using Secure Architectures in Personal Devices", IEEE Network, pp. 12-19, 2016. http://doi.org/10.1109/MNET.2016.1600087NM NICS Lab. Publications: https://www.nics.uma.es/publications 1 Digital Witness: Safeguarding Digital Evidence by using Secure Architectures in Personal Devices Ana Nieto, Rodrigo Roman, and Javier Lopez Abstract—Personal devices contain electronic evi- the majority of the cases require the involvement dence associated with the behaviour of their owners of humans during the seizure of evidence and the and other devices in their environment, which can help subsequent management process. clarify the facts of a cyber-crime scene. These devices are usually analysed as containers of proof. However, Traditional mechanisms for handling evidence it is possible to harness the boom of personal devices to are very robust but insufficient considering the new define the concept of digital witnesses, where personal challenges that paradigms such as the Internet of devices are able to actively acquire, store, and transmit Things (IoT) pose [1]. Until now, personal devices digital evidence to an authorised entity, reliably and have been seen as containers of electronic evidence, securely. This article introduces this novel concept, providing a preliminary analysis on the management in the same way as a corpse is analysed to find of digital evidence and the technologies that can be proofs to clarify the facts. However, how these de- used to implement it with security guarantees in IoT vices can testify against malicious cyber-behaviours environments. Moreover, the basic building blocks of or cyber-offenses directed to harm their owners, or a digital witness are defined. other individuals in a city, is not considered at all. Index Terms—Digital Evidence, IoT-Forensics, Se- Indeed, this will open the door to actively acquiring cure Element, Identity Delegation. electronic evidence from the environment of a user (with his consent) that nowadays is inevitably lost. I. INTRODUCTION These new sources of evidence which have not been Mobile user devices are deeply rooted at the heart considered until now could be key in demonstrating of our society. Indeed, social networks and educa- unproved or hidden cyber-attacks and demotivate tion in new technologies have greatly boosted the new ones. acceptance of personal devices as part of our daily The need to prepare our personal devices to lives. They are, from a functional point of view, an cope with these open issues is the reason why the extension of our human abilities. Therefore, it is concept of digital witness is being defined here. The well known that our devices are a valuable source following objetives are addressed in this article: of electronic evidence (e.g. network events, user- • Formal definition of the requirements for a generated events, user data) that can shed light on a digital witness. particular case. At present, collecting and handling • Discussion about the feasibility of this new such electronic evidence is a very delicate process, concept in personal devices. in which different stakeholders can be involved. • Definition of basic components to implement This is an almost artisan process; in order to avoid this concept in future works. any doubt about the integrity of the digital evidence This article is written as follows. First, a brief background to the latest trends in electronic evi- A. Nieto, R. Roman and J. Lopez were with the Department of Computer Science, University of Malaga, Spain, e-mail: dence management and other concepts related to our {nieto,roman,jlm}@lcc.uma.es. approach are discussed. Then we define the concept 2 Security requirements Social & normative requirements New concepts defined for Digital Witness Available to be used by Digital Witness, Binding Delegation if new functional components are implemented Embedded Security Architecture Binding Secure Storage Trusted Execution Secure communication Policies / User Agreements Witnessing Roles Credentials Preservation / Integrity Traceability Liability Privacy Authorisation Non-Repudiation Figure 1. Requirements of a Digital Witness and definitions. of digital witness and its requirements. After this Given the variety of scenarios where personal definition, the feasibility of this new concept in devices with limited resources (e.g. mobile user personal devices given current technological trends devices) are involved, including the IoT, it is nec- is analysed. Finally, the relationships for the compo- essary to explore new solutions that could include nents of a digital witness are defined. Conclusions personal devices as collaborators in a DCoC. Such and future work are discussed at the end of the solutions must consider the basic requirements for article. digital evidence management shown in Figure 1, which are derived from the standards UNE 71505, ISO/IEC 27037 and ISO/IEC 27042. There are II. BACKGROUND also standards related to digital forensics (UNE 71506, ISO/IEC 30121) that include the definition Traditionally, digital evidence is identified, col- of formats and procedures during the analysis. One lected, stored and analysed within a Chain of potential solution that we discuss in this article is to Custody to ensure the integrity, provenance and use the security architectures embedded in personal traceability of the proofs (cf. UNE 71505:2013, devices to define the concept of digital witness. ISO/IEC 27042:2015). Due to the immaterial and volatile nature of digital evidence, there are exten- sive procedures whose aim is to ensure that this III. DIGITAL WITNESS:CONCEPT OVERVIEW evidence is not repudiated in a court of law [2]. Furthermore, it is crucial to guarantee access to As an evolution of existing DCoC approaches, it authorised entities and also identify the people who seems reasonable to define cases in which multiple are responsible for the evidence. devices behave as human witnesses. Therefore, we Various researchers have proposed the concept define a Digital Witness as a device which is able of a Digital Chain of Custody (DCoC) [3], where to collaborate in the management of electronic certain evidence can be routed towards its desti- evidence from both technological and legal stand- nation through intermediary devices. While DCoC points. In order to realise this vision, a digital wit- adds flexibility to the traditional approach, it has ness defines critical components to implement the some drawbacks. For example, the type of evidence security and legal requirements shown in Figure 1, handled is very limited (e.g., pictures with geolocal- and expands over various concepts and topics which isation), and they tend to be managed by powerful are summarized in Table I. The link between the intermediary platforms (e.g., the cloud). Besides, all requirements and the principles behind the concept existing DCoC approaches require the intervention of digital witness will be detailed in the following of their human owners at all times [4], [5]. paragraphs. 3 Table I DIGITAL WITNESS -TECHNOLOGICAL LEAP. Concept / Topic New concept Breakdown Identity Binding Credentials (BC) • Binds all elements (User-Device-Evidence) • Binding Delegation – delegate evidence between witnesses Privacy IoT-based legal granu- larity • Privacy and security policies must be accepted by the user. • The information depends on the granularity / options selected by the user. Embedded Improve the use of exist- Security ing architectures in per- • Solutions to store electronic evidence preserving its integrity Architecture sonal devices • Electronic evidence management in compliance with standards and legal principles IoT-Forensics Enable heterogeneous devices to handle • Taxonomy of evidence for IoT electronic evidence • Homogenisation of cooperative mechanisms • Objects: ranging from wearables to vehicles and buildings Digital Chain of DCoC for IoT devices The devices are collaborators, not only containers: Custody (DCoC) (DCoC-IoT) • Format of documents for DCoC • Adapt security mechanisms for compliance with the standards and resources without compromising security • Hardiness of DCoC-IoT based on the user’s profile Role-based Digital evidence man- Acquisition of digital evidence based on the user’s profile: agement based in inher- • Digital Witness: basic digital witness to be used with the user’s consent. ited roles • Digital Custodian: digital witness handled by a user with privileges (e.g., police officer authorised with a search warrant). Digital witnesses are defined considering embed- ing Credentials help solve this issue and also add ded security architectures to make use of a core traceability to the evidence during the delegation of trust to i) implement trusted execution environ- procedure. Furthermore, the user’s privacy will be ments and ii) store and protect, with anti-tampering ensured according the policies accepted or not by hardware-based solutions, the proof of integrity of the user. For example, certain policies can define the digital evidence. Note that the heterogeneity of the granularity of user’s data based on the type of solutions to do this in IoT devices requires new object and the context (e.g., a camera that reveals solutions for acquiring evidence (e.g., in propietary the number of individuals in the building but not sensors) following IoT-forensics requirements [1], who they are). Notice that the use of mobile devices and also to homogeneise the access to security in this approach is considered as a responsibility;
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages11 Page
-
File Size-