P2DF: A Privacy-Preserving Digital Forensics Framework

IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS International Journal of Digital Crime and Forensics Pub Date : 2021-11-01 DOI:10.4018/IJDCF.288547
M. Abulaish, Nur Al Hasan Haldar, Jahiruddin Sharma
{"title":"P2DF: A Privacy-Preserving Digital Forensics Framework","authors":"M. Abulaish, Nur Al Hasan Haldar, Jahiruddin Sharma","doi":"10.4018/IJDCF.288547","DOIUrl":null,"url":null,"abstract":"The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects’ privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect privacy. In this paper, the authors propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidence. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidence and to verify whether privacy of the suspect was preserved during the investigation process.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Digital Crime and Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJDCF.288547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 1

Abstract

The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects’ privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect privacy. In this paper, the authors propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidence. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidence and to verify whether privacy of the suspect was preserved during the investigation process.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
P2DF:一个保护隐私的数字取证框架
个人对数字设备的广泛使用产生了大量的私人数据,这给调查机构保护嫌疑人的隐私带来了挑战。现有的数字取证模型说明了调查过程中应遵循的步骤和行动,但大多数模型不足以以综合方式调查所有过程的犯罪,也不能保护嫌疑人的隐私。在本文中,作者提出了一种保护隐私的数字取证(P2DF)框架的发展,该框架通过各种隐私标准和政策维护嫌疑人的机密性,从而促进调查。它包括一个访问控制机制,只允许授权的调查人员访问私人数据和已识别的数字证据。它还配备了数字证据保全机制,有助于法院确保证据的真实性、保密性和可靠性,并验证在调查过程中是否保留了嫌疑人的隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Digital Crime and Forensics
International Journal of Digital Crime and Forensics COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
2.70
自引率
0.00%
发文量
15
期刊最新文献
Efficient Task Offloading for Mobile Edge Computing in Vehicular Networks Examining the Behavior of Web Browsers Using Popular Forensic Tools Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1