Skip to main content
Top

2020 | OriginalPaper | Chapter

IoT and Cloud Forensic Investigation Guidelines

Authors : I. Mitchell, S. Hara, J. Ibarra Jimenez, Hamid Jahankhani, Reza Montasari

Published in: Policing in the Era of AI and Smart Societies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IoT devices are becoming more prevalent in society, with an expected 21.5 Billion devices connected by 2025 [24], and when an incident occurs in the vicinity of such devices then they should be considered as potential digital evidence. A network of IoT devices is often referred to as a smart environment, or more frequently as a cyber physical system [17]. Is there a need for yet another framework? It could be questioned that: (i) there is no need for such frameworks since the IoT devices are not that important; or, (ii) that there are adequate SOPs and frameworks already in place? This chapter aims to provide answers to these questions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
N.B. Many cyber-physical systems with wireless sensors are used with livestock.
 
Literature
1.
go back to reference Babun L, Sikder AK, Acar, A, Selcuk Uluagac A (2018) Iotdots: a digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745 Babun L, Sikder AK, Acar, A, Selcuk Uluagac A (2018) Iotdots: a digital forensics framework for smart environments. arXiv preprint arXiv:​1809.​00745
2.
go back to reference Bashir I (2018) Mastering blockchain. Packt, 2 edn. Bashir I (2018) Mastering blockchain. Packt, 2 edn.
4.
go back to reference Beavers JL, Faulks M, Marchang J (2019) Hacking NHS pacemakers: a feasibility study. In: Global security, safety and sustainability the security challenges of the connected world Beavers JL, Faulks M, Marchang J (2019) Hacking NHS pacemakers: a feasibility study. In: Global security, safety and sustainability the security challenges of the connected world
5.
go back to reference Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Invest 2(2),147–167 Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Invest 2(2),147–167
6.
go back to reference Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices: a comprehensive survey. J Biomed Inform 55, 272–289 Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices: a comprehensive survey. J Biomed Inform 55, 272–289
7.
go back to reference Carrier B, Spafford EH (2004) An event-based digital forensic investigation framework. In: Digital forensic research workshop, pp 11–13 Carrier B, Spafford EH (2004) An event-based digital forensic investigation framework. In: Digital forensic research workshop, pp 11–13
8.
go back to reference Casey E, Blitz A, Steuart C (2005) Digital evidence and computer crime Casey E, Blitz A, Steuart C (2005) Digital evidence and computer crime
10.
go back to reference Clack CD, Bakshi, VA Braine L (2016) Smart contract templates: essential requirements and design options. arXiv preprint arXiv:1612.04496 Clack CD, Bakshi, VA Braine L (2016) Smart contract templates: essential requirements and design options. arXiv preprint arXiv:​1612.​04496
11.
go back to reference Clack CD, Bakshi VA, Braine L (2016) Smart contract templates: foundations, design landscape and research directions. arXiv preprint arXiv:1608.00771 Clack CD, Bakshi VA, Braine L (2016) Smart contract templates: foundations, design landscape and research directions. arXiv preprint arXiv:​1608.​00771
13.
go back to reference Divya M, Biradar NB (2018) IOTA-next generation block chain. Int J Eng Comput Sci 7(4), 23823–23826 Divya M, Biradar NB (2018) IOTA-next generation block chain. Int J Eng Comput Sci 7(4), 23823–23826
14.
go back to reference El Ioini N, Pahl C (2018) A review of distributed ledger technologies. In: OTM confederated international conferences “On the Move to Meaningful Internet Systems”. Springer, pp 277–288 El Ioini N, Pahl C (2018) A review of distributed ledger technologies. In: OTM confederated international conferences “On the Move to Meaningful Internet Systems”. Springer, pp 277–288
15.
go back to reference Forensic Science Regulator (FSR). Codes of practice and conduct for forensic science providers and practitioners in the criminal justice system. Technical report, UK Govt, Birmingham, UK Forensic Science Regulator (FSR). Codes of practice and conduct for forensic science providers and practitioners in the criminal justice system. Technical report, UK Govt, Birmingham, UK
16.
go back to reference Garrie DB (2014) Digital forensic evidence in the courtroom: understanding content and quality. Northwest J Technol Intellect Prop 12, 1–128 Garrie DB (2014) Digital forensic evidence in the courtroom: understanding content and quality. Northwest J Technol Intellect Prop 12, 1–128
17.
go back to reference Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems: Volume 1, overview. Technical report, National Institute of Standards and Technology Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems: Volume 1, overview. Technical report, National Institute of Standards and Technology
18.
go back to reference Ibarra J (2019) Digital forensic investigation process model (DFIPM) to IoMT ensuring data privacy. Master’s thesis, Northumbria University, Newcastle, UK Ibarra J (2019) Digital forensic investigation process model (DFIPM) to IoMT ensuring data privacy. Master’s thesis, Northumbria University, Newcastle, UK
19.
go back to reference ISO17025:2017 (2017). General requirements for the competence of testing and calibrating laboratories. Technical report, International Organisation for Standardization (ISO), Geneva, CH ISO17025:2017 (2017). General requirements for the competence of testing and calibrating laboratories. Technical report, International Organisation for Standardization (ISO), Geneva, CH
20.
go back to reference Jones KJ, Bejtlich R, Rose CW (2005) Real digital forensics: computer security and incident response. Addison-Wesley Professional Jones KJ, Bejtlich R, Rose CW (2005) Real digital forensics: computer security and incident response. Addison-Wesley Professional
21.
go back to reference Karabiyik U, Akkaya K (2019) Digital forensics for IoT and WSNS. In: Mission-oriented sensor networks and systems: art and science. Springer, pp 171–207 Karabiyik U, Akkaya K (2019) Digital forensics for IoT and WSNS. In: Mission-oriented sensor networks and systems: art and science. Springer, pp 171–207
22.
go back to reference Kent K, Chevalier S, Grance T, Dang H (2006). Guide to integrating forensic techniques into incident response. Technical report, National Institute of Standards and Technology Kent K, Chevalier S, Grance T, Dang H (2006). Guide to integrating forensic techniques into incident response. Technical report, National Institute of Standards and Technology
23.
go back to reference Kirk PL (1953) Crime investigation: Physical evidence and the police laboratory, New York Kirk PL (1953) Crime investigation: Physical evidence and the police laboratory, New York
25.
go back to reference Mitchell, I, Cockerton T, Hara S, Evans C. (2018) SMERF: social media, ethics and risk framework. Cyber Criminol Mitchell, I, Cockerton T, Hara S, Evans C. (2018) SMERF: social media, ethics and risk framework. Cyber Criminol
26.
go back to reference Mitchell I, Hara S, Jahankhani H, Neilson D (2019) Blockchain of custody, BoC. Cyber Secur Pract Guide Mitchell I, Hara S, Jahankhani H, Neilson D (2019) Blockchain of custody, BoC. Cyber Secur Pract Guide
27.
go back to reference Montasari R (2016) The comprehensive digital forensic investigation process model. PhD thesis, University of Derby Montasari R (2016) The comprehensive digital forensic investigation process model. PhD thesis, University of Derby
28.
go back to reference Montasari R (2016) A comprehensive digital forensic investigation process model. Int J Electron Secur Digit Forensics 8(4):285–302CrossRef Montasari R (2016) A comprehensive digital forensic investigation process model. Int J Electron Secur Digit Forensics 8(4):285–302CrossRef
29.
go back to reference Montasari R, Peltola P (2015) Computer forensic analysis of private browsing modes. In: International conference on global security, safety, and sustainability. Springer, pp 96–109 Montasari R, Peltola P (2015) Computer forensic analysis of private browsing modes. In: International conference on global security, safety, and sustainability. Springer, pp 96–109
30.
go back to reference Mouton F, Venter HS (2011) A prototype for achieving digital forensic readiness on wireless sensor networks. In: IEEE Africon’11. IEEE, pp 1–6 Mouton F, Venter HS (2011) A prototype for achieving digital forensic readiness on wireless sensor networks. In: IEEE Africon’11. IEEE, pp 1–6
32.
go back to reference Oriwoh E, Sant P, Epiphaniou G (2013) Guidelines for Internet of Things deployment approaches—The thing commandments. Procedia Computer Science 21:122–131CrossRef Oriwoh E, Sant P, Epiphaniou G (2013) Guidelines for Internet of Things deployment approaches—The thing commandments. Procedia Computer Science 21:122–131CrossRef
33.
go back to reference Palmer GL (2002) A roadmap for digital forensics research report from the first digital forensics workshop (technical report dtr-t001-01-final). Air Force Research Lab, Rome Research Site, Utica, pp 1–48 Palmer GL (2002) A roadmap for digital forensics research report from the first digital forensics workshop (technical report dtr-t001-01-final). Air Force Research Lab, Rome Research Site, Utica, pp 1–48
35.
go back to reference Popov S, Moog H, Camargo D, Capossele A, Dimitrov V, Gal A, Greve A, Kusmierz B, Mueller S, Penzkofer A (2020) The coordicide, pp 1–30. Accessed Jan 2020 Popov S, Moog H, Camargo D, Capossele A, Dimitrov V, Gal A, Greve A, Kusmierz B, Mueller S, Penzkofer A (2020) The coordicide, pp 1–30. Accessed Jan 2020
37.
go back to reference U.S. Department of Justice (2009) Electronic crime scene investigation: an on-the scene reference for first responders. National Institute of Justice, November 2009 U.S. Department of Justice (2009) Electronic crime scene investigation: an on-the scene reference for first responders. National Institute of Justice, November 2009
39.
go back to reference Watson D, Jones AJ (2013) Digital forensics processing and procedures: meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements, 1st edn. Elsevier Watson D, Jones AJ (2013) Digital forensics processing and procedures: meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements, 1st edn. Elsevier
41.
go back to reference Yaga D, Mell P, Roby N, Scarfone K (2018) Blockchain technology overview. Technical report, National Institute of Standards and Technology Yaga D, Mell P, Roby N, Scarfone K (2018) Blockchain technology overview. Technical report, National Institute of Standards and Technology
Metadata
Title
IoT and Cloud Forensic Investigation Guidelines
Authors
I. Mitchell
S. Hara
J. Ibarra Jimenez
Hamid Jahankhani
Reza Montasari
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-50613-1_5

Premium Partner