Cryptographic Techniques for Data Privacy in Digital Forensics

被引:3
作者
Ogunseyi, Taiwo Blessing [1 ]
Adedayo, Oluwasola Mary [2 ]
机构
[1] Yibin Univ, Int Fac Appl Technol, Yibin 644000, Sichuan, Peoples R China
[2] Univ Winnipeg, Dept Appl Comp Sci, Winnipeg, MB R3B 2E9, Canada
关键词
Cryptographic techniques; data privacy; digital forensics; forensic readiness; privacy-preserving digital forensics; OF-THE-ART; COMPUTER FORENSICS; CHALLENGES; FRAMEWORK; TAXONOMY; INTERNET; INFORMATION; ENCRYPTION; SECURE; MODEL;
D O I
10.1109/ACCESS.2023.3343360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigations. However, the cost of this readiness often directly impacts the privacy of innocent third parties and suspects if the collected information is irrelevant. Approaches that have been suggested for privacy-preserving digital forensics focus on the use of policy, non-cryptography-based, and cryptography-based solutions. Cryptographic techniques have been proposed to address issues of data privacy during data analysis. As the utilization of some of these cryptographic techniques continues to increase, it is important to evaluate their applicability and challenges in relation to digital forensics processes. This study provides digital forensics investigators and researchers with a roadmap to understanding the data privacy challenges in digital forensics and examines the various privacy techniques that can be utilized to tackle these challenges. Specifically, we review the cryptographic techniques applied for privacy protection in digital forensics and categorize them within the context of whether they support trusted third parties, multiple investigators, and multi-keyword searches. We highlight some of the drawbacks of utilizing cryptography-based methods in privacy-preserving digital forensics and suggest potential solutions to the identified shortcomings. In addition, we propose a conceptual privacy-preserving digital forensics (PPDF) model that is based on the use of cryptographic techniques and analyze the model within the context of the above-mentioned factors. An evaluation of the model is provided through a consideration of identified factors that may affect an investigation. Lastly, we provide an analysis of how existing principles for preserving privacy in digital forensics are addressed in our PPDF model. Our evaluation shows that the model aligns with many of the existing privacy principles recommended for privacy protection in digital forensics.
引用
收藏
页码:142392 / 142410
页数:19
相关论文
共 50 条
[21]   You are safe when you tell the truth: a blockchain-based privacy-preserving evidence collection and distribution system for digital forensics [J].
Xiong, Junjie ;
Lin, Biyi .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (1-2) :210-236
[22]   A Cryptographic Approach for Achieving Privacy in Data Mining [J].
Abitha, N. ;
Sarada, G. ;
Manikandan, G. ;
Sairam, N. .
2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
[23]   Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit [J].
Zareen, Muhammad Sharjeel ;
Aslam, Baber ;
Tahir, Shahzaib ;
Rasheed, Imran ;
Khan, Fawad .
COMPUTERS, 2024, 13 (12)
[24]   A review of image steganalysis techniques for digital forensics [J].
Karampidis, Konstantinos ;
Kavallieratou, Ergina ;
Papadourakis, Giorgos .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :217-235
[25]   Data Acquisition Techniques in Mobile Forensics [J].
Sathe, Sneha C. ;
Dongre, Nilima M. .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, :280-286
[26]   Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems [J].
Ogunseyi, Taiwo Blessing ;
Yang, Cheng .
CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 :691-706
[27]   Hashing and data Fingerprinting in digital Forensics [J].
Roussev, Vassil .
IEEE SECURITY & PRIVACY, 2009, 7 (02) :49-55
[28]   Emerging Trends in Smart Home Security, Privacy, and Digital Forensics [J].
Plachkinova, Miloslava ;
Vo, Au ;
Alluhaidan, Ala .
AMCIS 2016 PROCEEDINGS, 2016,
[29]   IoT Forensics Pitfalls for Privacy and a Model for Providing Safeguards [J].
Almolhis, Nawaf ;
Haney, Micheal .
2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, :172-178
[30]   Big Data Management in Digital Forensics [J].
Qi, Man ;
Liu, Yang ;
Lu, Lin ;
Liu, Junyong ;
Li, Maozhen .
2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, :238-243