| Literature DB >> 29414864 |
Ana Nieto1, Ruben Rios2, Javier Lopez3.
Abstract
IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.Entities:
Keywords: IoT-forensics; digital witness; privacy
Year: 2018 PMID: 29414864 PMCID: PMC5856102 DOI: 10.3390/s18020492
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1From computer forensics to IoT-Forensics.
Figure 2Data lifecycle and its relationship with ISO/IEC 27050:2016 and Digital Witness.
Figure 3The PRoFIT model [4].
Privacy principles in PRoFIT.
| ISO/IEC 29100 | PRoFIT Phases | |||||
|---|---|---|---|---|---|---|
| PP | CC | AC | IS | PT | RV | |
| 1. Consent and choice | ✓ | ✓ | ✓ | |||
| 2. Purpose legitimacy and specification | ✓ | ✓ | ✓ | |||
| 3. Collection limitation | ✓ | |||||
| 4. Data Minimisation | ✓ | ✓ | ||||
| 5. Use, rentention and disclosure limitation | ✓ | |||||
| 6. Accuracy and quality | ✓ | ✓ | ||||
| 7. Openness, transparency and notice | ✓ | ✓ | ||||
| 8. Individual participation and access | ✓ | |||||
| 9. Accountability | ✓ | |||||
| 10. Information security controls | ✓ | ✓ | ||||
| 11. Compliance | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
PP. Preparation, CC. Context-based collection, AC. Analysis and correlation, IS. Information sharing, PT. Presentation, RV. Review.
Mapping of privacy risks and mitigation mechanisms in a PRoFIT-compliant DW.
| Privacy Risk for DW | Mitigation Mechanisms | PRoFIT Phases | |||||
|---|---|---|---|---|---|---|---|
| PP | CC | AC | IS | PT | RV | ||
| Devices nearby may know when a DW has been disabled from its duties | Direct Anonymous Attestation [ | ✓ | ✓ | ||||
| Acknowledge the acquisition of digital evidence without the signer accessing the contents | Blind signatures + signature chaining [ | ✓ | ✓ | ||||
| Witnesses may be reluctant to share their own version of the incident with other participants | Homomorphic encryption or secure computation [ | ✓ | ✓ | ||||
| The identity of a | Anonymous digital witnessing [ | ✓ | ✓ | ✓ | |||
| The identity of those involved in the discovery process is exposed | Anonymous route discovery [ | ✓ | ✓ | ||||
| The system could expose other users as being part of the environment | Third-party user consents | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Transactions could show private information | Privacy-aware smart contracts [ | ✓ | ✓ | ✓ | |||
| The data shared with an investigator could be used for additional purposes without consent | Disposal Guarantees [ | ✓ | ✓ | ||||
PP. Preparation, CC. Context-based collection, AC. Analysis and correlation, IS. Information sharing, PT. Presentation, RV. Review.
Figure 4Anonymous digital witnessing.
Figure 5PRoFIT-compliant Digital Witness architecture.
Figure 6Use case 1: The Dish and The Spoon.
Figure 7Request the start of digital investigation.
Figure 8Collect relevant information from witnesses (third parties).
Figure 9Conclusions of the investigation in the scene.
Figure 10Correlation of information between two separate investigations.
Similarities and Conflicts between Digital Forensics and Privacy.
| Example | Privacy | Computer Forensics |
|---|---|---|
| Onion routing | Privacy in communications (e.g., Tor) | Affects traceability |
| Anonymity | Hides the identity of the individual | Affects liability and traceability |
| Data encryption | Confidentiality, data privacy | Makes data analysis difficult/impossible. |
| Aggregation | Data minimisation | Relevant data can be lost and traceability affected |
| Secure erasure | Data privacy | Lost of digital evidence |
| Report incidence | Affects location privacy and anonymity if the subject’s identity is indicated | Adds value to data correlation and verification. |
| Data collection | Can provide sensitive information about the environment | Allows to obtain more verifiable information |
| Data correlation | Affects linkability; can help to get information about the identity of third parties (and other data) | Can help to deduce new relevant information for the case |
| Node discovery | Affects location privacy | Potential sources of data |
| Legal procedures | Privacy as humans right | Admissibility of digital evidence |
Gray: potential disadvantage. White: potential advantage.
Related work that considers privacy.
| ISO/IEC 29100:2011 | Proactive IoT-Forensic Solutions | |||
|---|---|---|---|---|
| Themis | DroidWatch | DW | PRoFIT-Compliant DW | |
| 1. Consent and choice | ✓(user) | ✓(user) | ✓(user) | ✓(user & third party) |
| 2. Purpose legitimacy and specification | ✓(user) | ✓(user & third party) | ||
| 3. Collection limitation | ✓ | |||
| 4. Data Minimisation | ✓ | |||
| 5. Use, rentention and disclosure limitation | ✓ | |||
| 6. Accuracy and quality | ✓ | ✓ | ||
| 7. Openness, transparency and notice | ✓ | |||
| 8. Individual participation and access | ✓ | |||
| 9. Accountability | ✓ | |||
| 10. Information security controls | ✓ | ✓ | ✓ | |
| 11. Compliance | ✓ | |||