RESEARCH ARTICLES
Enhancing Digital Forensic Security through a Secure Storage Framework Incorporating Authentication and Optimized Key Generation Encryption
Published 2025-04-14
Keywords
- Key Generation,
- Encryption,
- Digital Forensic Architecture,
- Multi-Key Homomorphic Encryption
How to Cite
B Anil, B Sivanandareddy, G Ravikumar, A Mopurreddy, & N Sony. (2025). Enhancing Digital Forensic Security through a Secure Storage Framework Incorporating Authentication and Optimized Key Generation Encryption. International Journal of Computational Learning & Intelligence, 4(3), 494–504. https://doi.org/10.5281/zenodo.15210123
Copyright (c) 2025 B Anil, B Sivanandareddy, G Ravikumar, A Mopurreddy, N Sony

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The development of secure storage models for digital forensic environments represents a significant step forward in safeguarding the integrity and confidentiality of digital evidence. This study introduces an advanced framework that leverages modern encryption techniques and optimized key generation strategies to enhance the protection and reliability of forensic data throughout the investigation lifecycle. In particular, the model addresses the limitations of centralized evidence storage, which can compromise the authenticity of evidence. The proposed architecture, designed for use in Infrastructure as a Service (IaaS) cloud platforms, streamlines evidence collection, preserves data authenticity, and ensures origin verification. The architecture integrates a combination of authentication mechanisms and encryption processes to enhance security in forensic investigations conducted within cloud environments. A key contribution of this work is the introduction of the Digital Forensic Architecture with Authentication and Optimal Key Generation Encryption (DFA-AOKGE) framework. This approach employs a blockchain-enabled distributed model for data storage, ensuring both decentralization and tamper resistance. Additionally, the authentication process is strengthened through a Secure Block Verification Mechanism (SBVM), while key generation is optimized using the Enhanced Equilibrium Optimizer (EEO). To protect the confidentiality of stored data, the system employs Multi-Key Homomorphic Encryption (MHE) before storing evidence in the cloud. The effectiveness of the DFA-AOKGE model is validated through simulation, demonstrating its superior performance compared to existing methods across multiple evaluation criteria, including data integrity, storage efficiency, and security.References
- Liu, Z., Wan, L., Guo, J., et al. (2023). PPRU: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Transactions on Vehicular Technology, 72(6), 7232–7253.
- Nasreen, S., & Mir, A. H. (2023). Enhancing cloud forensic investigation system in distributed cloud computing using DK-CP-ECC algorithm and EK-ANFIS. Journal of Mobile Multimedia, 18(4), 679–706.
- Raji, L., & Ramya, S. T. (2022). Secure forensic data transmission system in cloud database using fuzzy-based butterfly optimization and modified ECC. Transactions on Emerging Telecommunications Technologies, 33(9), e4558.
- Chen, H., Dai, W., Kim, M., & Song, Y. (2023). Efficient multi-key homomorphic encryption with packed ciphertexts. ACM Transactions on Privacy and Security, 26(1), Article 7.
- Kumar, R., Singh, P., & Singh, R. (2023). Blockchain-based secure framework for digital forensics in cloud environments. Future Generation Computer Systems, 145, 187–202.
- Guo, J., Liu, Z., Tian, S., et al. (2023). Trust evaluation for federated learning in digital twin mobile networks. IEEE Journal on Selected Areas in Communications, 41(5), 1397–1411.
- Zhang, H., & Li, Y. (2023). Blockchain-assisted digital evidence preservation framework for multi-cloud environments. Journal of Information Security and Applications, 75, 103224.
- Wu, J., et al. (2023). Blockchain-based trusted data provenance and evidence verification for cloud forensics. IEEE Transactions on Dependable and Secure Computing, 20(3), 1543–1557.
- Xiong, Z., et al. (2022). Blockchain forensics: Technical challenges and solutions. ACM Computing Surveys, 55(7), 1–37.
- Khan, Y., & Verma, S. (2021). Intelligent blockchain and SDN-based evidence collection for cloud forensics. Scientific Programming, 2021, Article ID 8739657.
- Singh, A., & Kumar, R. (2022). Secure evidence preservation using blockchain and homomorphic encryption in cloud forensics. Journal of Cloud Computing: Advances, Systems and Applications, 11(1), 1–19.
- Tan, Z., et al. (2022). A secure blockchain-based evidence management system for digital forensics. IEEE Access, 10, 77863–77875.
- Yang, Z., et al. (2023). Secure authentication and traceability in digital forensics using blockchain and zero-knowledge proof. Journal of Information Security and Applications, 77, 103363.
- Qi, L., et al. (2022). Privacy-aware forensic data sharing in cloud environments using blockchain and federated learning. IEEE Internet of Things Journal, 9(17), 16014–16023.
- Liu, J., et al. (2023). Quantum-resistant encryption for digital forensics in cloud computing. IEEE Transactions on Cloud Computing. Advance online publication. https://doi.org/10.1109/TCC.2023.3243456
- Li, X., et al. (2023). Secure and auditable cloud forensics framework using blockchain and AI. Computers & Security, 127, 103193.
- Hussain, F., et al. (2023). Metaheuristic-driven key generation for secure evidence storage in cloud forensics. IEEE Access, 11, 98712–98726.
- Chen, S., et al. (2023). Secure data provenance for digital evidence in edge-cloud environments using blockchain. Future Generation Computer Systems, 143, 165–179.
- Alshammari, A., et al. (2023). Secure multi-factor authentication for digital forensics in cloud environments. Sensors, 23(6), 3128.
- Zhang, W., et al. (2024). Blockchain-enabled zero-knowledge authentication for secure forensic evidence collection. IEEE Transactions on Information Forensics and Security. Advance online publication. https://doi.org/10.1109/TIFS.2024.3354912
- Madapuri, R. K., & Mahesh, P. C. S. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
- Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short‐term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
- Reddy, B. S. H. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–5. https://doi.org/10.5281/zenodo.14965660
- Reddy, B. S. H., Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
- Ahmed, S. T., Kaladevi, A. C., Shankar, A., & Alqahtani, F. (2025). Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach. IEEE Transactions on Consumer Electronics.
- Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
- Syed Thouheed Ahmed, S., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391-397). Singapore: Springer Singapore.
- Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. (2019). Type of supervised text classification system for unstructured text comments using probability theory technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
- Ahmed, S. T., Basha, S. M., Arumugam, S. R., & Kodabagi, M. M. (2021). Pattern Recognition: An Introduction. MileStone Research Publications.