Secure Storage Model for Digital Forensics with Authentication and Optimized Encryption Key Generation

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 2, Issue 1, pp. 67-71, January 2026.

https://doi.org/10.58482/ijersem.v2i1.10

Aruvai Dakshayani

Yarlapalli Chethana

S Anil Kumar

Bandapalli Ganesh

S Manoj Kumar

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: Digital forensics is an essential component of contemporary cybersecurity investigations, as it facilitates the secure collection, retention, and evaluation of digital evidence. The confidentiality, integrity, and authenticity of forensic evidence are significantly compromised by the increasing number of cyberattacks, data manipulation attempts, or unauthorized access attempts. A Secure Storage Model for Digital Forensics with Authentication and Optimized Encryption Key Generation is proposed by this work to ensure secure evidence preservation and controlled access. The model employs advanced algorithms to generate cryptographic keys and incorporate multi-factor authentication, thereby improving encryption performance and decreasing vulnerabilities caused by using static or predictable keys. By using secure hashing, the system enhances evidence integrity verification and also enables data storage that is impervious to manipulation. The experimental test confirms the superior security efficiency, lower access latency, and higher encryption performance compared to traditional forensic storage methods. The results show that the solution is well-suited for secure digital forensic workflows, allowing for the handling of admissible evidence in law enforcement, cyber security auditing, and legal investigations.

Keywords: Impervious, Forensic, Cyber Security, Secure Storage, Encryption.

References: 

  1. N. Xiao, Z. Wang, and X. Sun, “A secure and lightweight authentication scheme for digital forensics in industrial internet of things,” Alexandria Engineering Journal, vol. 121, pp. 117–127, Feb. 2025, doi: 10.1016/j.aej.2025.02.059.
  2. K. Hameed, F. Maqsood, and Z. Wang, “Artificial intelligence-enhanced zero-knowledge proofs for privacy-preserving digital forensics in cloud environments,” Journal of Network and Computer Applications, vol. 243, p. 104331, Sep. 2025, doi: 10.1016/j.jnca.2025.104331.
  3. K. Wang, J. Dong, Y. Xu, X. Ji, L. Sha, and F. Xiao, “READ: Resource efficient authentication scheme for digital twin edge networks,” Future Generation Computer Systems, vol. 163, p. 107498, Aug. 2024, doi: 10.1016/j.future.2024.107498.
  4. M. A. Manivasagam, G. Hema, A. Maheswarareddy, P. Vinitha, T. Manasa, and K. Dileep, “Electronic protection for exam paper leakage,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 6, pp. 19–25, Dec. 2025, doi: 10.58482/ijersem.v1i6.3.
  5. B. Sharma, J. Ghawaly, K. McCleary, A. M. Webb, and I. Baggili, “ForensicLLM: A local large language model for digital forensics,” Forensic Science International Digital Investigation, vol. 52, p. 301872, Mar. 2025, doi: 10.1016/j.fsidi.2025.301872.
  6. M. A. M. Zia and O. M. Adedayo, “Tool type identification for forensic digital document examination,” Forensic Science International Digital Investigation, vol. 54, p. 301972, Aug. 2025, doi: 10.1016/j.fsidi.2025.301972.
  7. E. E. Abdallah, E. A. Elsoud, and A. E. Abdallah, “A survey of data mining techniques for digital forensic analysis,” Procedia Computer Science, vol. 257, pp. 731–736, Jan. 2025, doi: 10.1016/j.procs.2025.03.094.
  8. G. Ravi Kumar and C. Sushama, “An IoT-Enabled smart water quality monitoring system using Low-Cost sensors and cloud analytics,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 5, pp. 7–12, Nov. 2025, doi: 10.58482/ijersem.v1i5.2.
  9. G. Kumar, R. Saha, M. Conti, and T. H. Kim, “ZAKON: A decentralized framework for digital forensic admissibility and justification,” Information Processing & Management, vol. 62, no. 6, p. 104226, Jun. 2025, doi: 10.1016/j.ipm.2025.104226.
  10. S. Singh and A. Dhumane, “Unmasking digital deceptions: An integrative review of deepfake detection, multimedia forensics, and cybersecurity challenges,” MethodsX, vol. 15, p. 103632, Sep. 2025, doi: 10.1016/j.mex.2025.103632.
  11. D. Maiti, M. Basak, and D. Das, “A review on fingerprint based authentication-its challenges and applications,” Computer Science Review, vol. 57, p. 100735, Feb. 2025, doi: 10.1016/j.cosrev.2025.100735.
  12. M. A. Manivasagam, S. Sai Ram, C. Lakshmikanth Reddy, E. Ram Charan, P. Venkata Charan, and M. Prabhash, “MQTTNET-IDS: Deep-Fuzzy Fusion for Intelligent Threat Detection,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 6, pp. 55–62, Dec. 2025, doi: 10.58482/ijersem.v1i6.7.