Professional Documents
Culture Documents
Open Cloud Forensics Model
Open Cloud Forensics Model
Open Cloud Forensics Model
Propose model
Electronically stored information (ESI) from users is automatically transferred to
a Kubernetes environment or other cloud-native technology hosted by a cloud service
provider. Initially, this ESI is processed by verification pods, which are responsible for
validating the information and generating a Verified ESI (VESI). Given the cloud's
capability to handle a high volume of users and, consequently, a large amount of ESI,
several pods will be deployed to distribute the processing load efficiently. Once the VESI
is generated, it is then forwarded to communication pods, which are tasked with
transferring it to a blockchain system.
Kubernetes can be configured to refine the ESI processing workflow for enhanced
efficiency. This involves setting up Kubernetes pods to perform various data
optimization tasks, such as transforming the data, eliminating duplicates, and
compressing the data, depending on the specific characteristics of the ESI. Additionally,
the role of the communication pod can be adapted. For instance, if the requirement is to
store only the hash value of the VESI on the blockchain, these pods can be configured to
generate and send these hashes. Finally, an additional layer of pods can be introduced,
tailored to meet the specific requirements of different scenarios, ensuring a flexible and
responsive system.
Advantages provided by the model
1. Optimization and Synchronization
Using a blockchain managed by a trusted third party ensures that neither the
user, Cloud Service Provider (CSP), investigator, nor court authority can alter the
VESI, even if any of these parties have malicious intentions.
Employ smart contracts within the blockchain for access control, enabling the
CSP, investigator, and court authority to access and validate the VESI. The
blockchain's inherent feature offers resistance to tampering, enhancing the
security and integrity of the data.