Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology

被引:0
|
作者
Balogun, Adedayo M. [1 ]
Zhu, Shao Ying [1 ]
机构
[1] Univ Derby, Sch Comp & Math, Derby, England
关键词
Encryption; Information Security; Digital Forensics; Anti-Forensics; Cryptography; TrueCrypt;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [1] Cryptographic Techniques for Data Privacy in Digital Forensics
    Ogunseyi, Taiwo Blessing
    Adedayo, Oluwasola Mary
    [J]. IEEE ACCESS, 2023, 11 : 142392 - 142410
  • [2] Big Data and Digital Forensics Rethinking Digital Forensics
    Adedayo, Oluwasola Mary
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [3] Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android
    Hutchinson, Shinelle
    Mirza, Mohammad Meraj
    West, Nicholas
    Karabiyik, Umit
    Rogers, Marcus K.
    Mukherjee, Tathagata
    Aggarwal, Sudhir
    Chung, Haeyong
    Pettus-Davis, Carrie
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [4] Forensics of visual privacy protection in digital images
    Xue, Fei
    Lu, Wei
    Ren, Honglin
    Xiao, Huimei
    Zhang, Qin
    Liu, Xianjin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12427 - 12445
  • [5] Combining Forensics and Privacy Requirements for Digital Images
    Puteaux, Pauline
    Itier, Vincent
    Bas, Patrick
    [J]. 29TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2021), 2021, : 806 - 810
  • [6] Forensics of visual privacy protection in digital images
    Fei Xue
    Wei Lu
    Honglin Ren
    Huimei Xiao
    Qin Zhang
    Xianjin Liu
    [J]. Multimedia Tools and Applications, 2020, 79 : 12427 - 12445
  • [7] The growing impact of full disk encryption on digital forensics
    Casey, Eoghan
    Fellows, Geoff
    Geiger, Matthew
    Stellatos, Gerasimos
    [J]. DIGITAL INVESTIGATION, 2011, 8 (02) : 129 - 134
  • [8] Is there a future in privacy: Encryption and digital signatures
    Garfinkel, SL
    [J]. INFORMATION PROTECTION AND NETWORK SECURITY, 1996, 2616 : 128 - 141
  • [9] A Novel Digital Audio Encryption and Forensics Watermarking Scheme
    He, Junjie
    Zhu, Pei
    Liu, Zhenghui
    Cao, Yi
    [J]. IEEE ACCESS, 2024, 12 : 103565 - 103582
  • [10] Privacy without data encryption?
    Scholnick, M
    [J]. DATAMATION, 1997, 43 (03): : 7 - 7