Forensic Approaches for End-to-End Encryption Cloud Storage Services: MEGA as a Case Study
The advancement of cloud-based data storage technology allows users to conveniently access and manage files using endpoint devices without being constrained by their environment. While cloud storage services have improved the efficiency of performing our daily tasks, they have also become a medium f...
Saved in:
Published in: | Arab journal of forensic sciences & forensic medicine Vol. 6; no. Special Issue; pp. 171 - 190 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
18-06-2024
|
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The advancement of cloud-based data storage technology allows users to conveniently access and manage files using endpoint devices without being constrained by their environment. While cloud storage services have improved the efficiency of performing our daily tasks, they have also become a medium for criminals to distribute illegal materials. Services that support end-to-end encryption (E2EE), cannot decrypt data even when it's stored on their servers, attracting users who require high security. There are some existing studies related to cloud-based services using E2EE, but they only deal with local artifacts, which makes it difficult to analyze when local devices cannot be found or when there are changes to local artifacts. This study identifies the mechanisms by which MEGA, a cloud-based file hosting service, operates to obtain user authentication, explore metadata, and collect files while applying end-to-end encryption. Furthermore, we propose a forensic investigation methodology to explore various metadata and selectively acquire cloud resources relevant to an incident through an understanding of E2EE algorithms. Also, we apply MEGA to the existing framework to suggest improving the framework that encompasses E2EE cloud-based services. The findings of this study serve as a valuable reference for dealing with cloud-based services with E2EE from the perspectives of computer security and digital forensics. |
---|---|
ISSN: | 1658-6786 1658-6794 |
DOI: | 10.26735/TMPV1812 |