Cryptographic Techniques for Data Privacy in Digital Forensics

被引:2
|
作者
Ogunseyi, Taiwo Blessing [1 ]
Adedayo, Oluwasola Mary [2 ]
机构
[1] Yibin Univ, Int Fac Appl Technol, Yibin 644000, Sichuan, Peoples R China
[2] Univ Winnipeg, Dept Appl Comp Sci, Winnipeg, MB R3B 2E9, Canada
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Cryptographic techniques; data privacy; digital forensics; forensic readiness; privacy-preserving digital forensics; OF-THE-ART; COMPUTER FORENSICS; CHALLENGES; FRAMEWORK; TAXONOMY; INTERNET; INFORMATION; ENCRYPTION; SECURE; MODEL;
D O I
10.1109/ACCESS.2023.3343360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigations. However, the cost of this readiness often directly impacts the privacy of innocent third parties and suspects if the collected information is irrelevant. Approaches that have been suggested for privacy-preserving digital forensics focus on the use of policy, non-cryptography-based, and cryptography-based solutions. Cryptographic techniques have been proposed to address issues of data privacy during data analysis. As the utilization of some of these cryptographic techniques continues to increase, it is important to evaluate their applicability and challenges in relation to digital forensics processes. This study provides digital forensics investigators and researchers with a roadmap to understanding the data privacy challenges in digital forensics and examines the various privacy techniques that can be utilized to tackle these challenges. Specifically, we review the cryptographic techniques applied for privacy protection in digital forensics and categorize them within the context of whether they support trusted third parties, multiple investigators, and multi-keyword searches. We highlight some of the drawbacks of utilizing cryptography-based methods in privacy-preserving digital forensics and suggest potential solutions to the identified shortcomings. In addition, we propose a conceptual privacy-preserving digital forensics (PPDF) model that is based on the use of cryptographic techniques and analyze the model within the context of the above-mentioned factors. An evaluation of the model is provided through a consideration of identified factors that may affect an investigation. Lastly, we provide an analysis of how existing principles for preserving privacy in digital forensics are addressed in our PPDF model. Our evaluation shows that the model aligns with many of the existing privacy principles recommended for privacy protection in digital forensics.
引用
收藏
页码:142392 / 142410
页数:19
相关论文
共 50 条
  • [21] A review of image steganalysis techniques for digital forensics
    Karampidis, Konstantinos
    Kavallieratou, Ergina
    Papadourakis, Giorgos
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 217 - 235
  • [22] Data Acquisition Techniques in Mobile Forensics
    Sathe, Sneha C.
    Dongre, Nilima M.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 280 - 286
  • [23] Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems
    Ogunseyi, Taiwo Blessing
    Yang, Cheng
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 691 - 706
  • [24] Hashing and data Fingerprinting in digital Forensics
    Roussev, Vassil
    IEEE SECURITY & PRIVACY, 2009, 7 (02) : 49 - 55
  • [25] Ontology-based Privacy Preserving Digital Forensics Framework
    Wan, Xuejiao
    He, Jingsha
    Huang, Na
    Mai, Yonghao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 53 - 62
  • [26] Emerging Trends in Smart Home Security, Privacy, and Digital Forensics
    Plachkinova, Miloslava
    Vo, Au
    Alluhaidan, Ala
    AMCIS 2016 PROCEEDINGS, 2016,
  • [27] The truth is in there: Sleuthing for data with digital forensics
    Miller, Ron
    ECONTENT, 2007, 30 (02) : 38 - 43
  • [28] Digital, big data and computational forensics
    Geradts, Zeno
    FORENSIC SCIENCES RESEARCH, 2018, 3 (03) : 179 - 182
  • [29] Big Data Management in Digital Forensics
    Qi, Man
    Liu, Yang
    Lu, Lin
    Liu, Junyong
    Li, Maozhen
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 238 - 243