Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  zk-Cloud Forensics: Privacy-Aware and Tamper-proof Cloud Forensics using a Public Key Trust Infrastructure


   School of Computing, Engineering & the Built Environment

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Prof B Buchanan, Dr J Ahmad  Applications accepted all year round  Self-Funded PhD Students Only

About the Project

In order to detect contraband content within a cloud-based system, it is possible to sample fragments of data [1] and match them against hashed values. We can then use a Bloom filter to detect whether these fragments match to well-known contraband content [2]. With this, a Bloom filter can store the hash signatures of data fragments, and where the filter does not reveal the stored hash values. This approach preserves the privacy of the data contained in the filter, as apposed to using a hash-based table for matching. Unfortunately, the Bloom filter can be fairly large in its operation, and where it is difficult to fully secure the trustworthiness of the match. Along with this, the sharing of matches often does not have the required levels of trust and privacy.

This research work will investigate an integrated framework for the matching and sharing processes, and which is privacy-aware in its approach. Methods for this include a Multilayer Compressed Counting Bloom Filter [4], Public Key Accumulators [3], and Zero-Knowledge Proofs (ZKPs) [5]. These can then be integrated into a trusted digital forensics data-sharing infrastructure, and where public key signing can be used to share trusted samples of fragments and associated proofs.

Research work will also look to integrate a permissioned blockchain infrastructure in the creation of a trusted infrastructure for public key management and identity provision.

Why undertake this PhD? The work will be undertaken with the Blockpass ID Lab at Edinburgh Napier and which is the first research lab in the world to focus on identity and trust, and is advancing in many areas of privacy-aware systems. This lab is led by Prof Bill Buchanan and who has a long track record of success in creating highly successful spin-out companies (Zonefox, Symphonic and Cyan Forensics), and in commercialising research work. This research work has the potential to build into a licencing or spin-out opportunity, and is likely to involve collaboration with a range of law enforcement agencies.

Academic qualifications

A first degree (at least a 2.1) ideally in a Computer Science-related area or Electronic Engineering with a good fundamental knowledge of software development.

English language requirement

IELTS score must be at least 6.5 (with not less than 6.0 in each of the four components). Other, equivalent qualifications will be accepted. Full details of the University’s policy are available online.

Essential attributes:

  • Experience of fundamental areas of cybersecurity, encryption and trust.
  • Competent in software development
  • Knowledge of cloud-based systems.
  • Good written and oral communication skills
  • Strong motivation, with evidence of independent research skills relevant to the project
  • Good time management

Desirable attributes:

  • Strong interest in encryption and cryptography.

For enquiries about the content of the project, please email Professor Bill Buchanan [Email Address Removed]

For information about how to apply, please visit our website https://www.napier.ac.uk/research-and-innovation/research-degrees/how-to-apply

To apply, please select the link for the PhD Computing FT application form.

Computer Science (8) Engineering (12)

References

[1] Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372- 384.
[2] Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015). Fast contraband detection in large capacity disk drives. Digital Investigation, 12, S22-S29.
[3] Ren, Y., Liu, X., Wu, Q., Wang, L., & Zhang, W. (2022). Cryptographic Accumulator and Its Application: A Survey. Security and Communication Networks, 2022.
[4] Ye, F., Zheng, Y., Fu, X., Luo, B., Du, X., & Guizani, M. (2022). TamForen: a tamper‐proof cloud forensic framework. Transactions on Emerging Telecommunications Technologies, 33(4), e4178.
[5] Li, M., Lal, C., Conti, M., & Hu, D. (2021). LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Generation
Search Suggestions
Search suggestions

Based on your current searches we recommend the following search filters.

 About the Project