Digital Forensic Framework for Protecting Data Privacy during Investigation

被引:0
|
作者
Chaure, Suvarna [1 ,2 ]
Mane, Vanita [1 ]
机构
[1] Ramrao Adik Inst Technol, Dept Comp Engn, Navi Mumbai, India
[2] SIES Grad Sch Technol, Dept Comp Engn, Navi Mumbai, India
关键词
Privacy preservation; Digital Forensics; Machine Learning; COMPUTER FORENSICS;
D O I
10.4108/eetsis.4002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid technological breakthroughs, a surge in the use of digital devices, and the enormous amount of data that these devices can store continuously put the state of digital forensic investigation to the test. The prevention of privacy breaches during a digital forensic investigation is a significant challenge even though data privacy protection is not a performance metric. This research offered solutions to the problems listed above that centre on the efficiency of the investigative process and the protection of data privacy. However, it's still an open problem to find a way to shield data privacy without compromising the investigator's talents or the investigation's overall efficiency. This system proposes an efficient digital forensic investigation process which enhances validation, resulting in more transparency in the inquiry process. Additionally, this suggested approach uses machine learning techniques to find the most pertinent sources of evidence while protecting the privacy of non-evidential private files.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [21] Internet of things devices: digital forensic process and data reduction
    Montasari, Reza
    Hill, Richard
    Montaseri, Farshad
    Jahankhani, Hamid
    Hosseinian-Far, Amin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 424 - 436
  • [22] A forensic investigation framework for Internet of Things monitoring
    Jacob, Rijo
    Nisbet, Alastair
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 42-43
  • [23] Harmonised Digital Forensic Investigation Process Model
    Valjarevic, Aleksandar
    Venter, Hein S.
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [24] Digital forensic investigation of cloud storage services
    Chung, Hyunji
    Park, Jungheum
    Lee, Sangjin
    Kang, Cheulhoon
    DIGITAL INVESTIGATION, 2012, 9 (02) : 81 - 95
  • [25] Digital forensic readiness: Expert perspectives on a theoretical framework
    Elyas, Mohamed
    Ahmad, Atif
    Maynard, Sean B.
    Lonie, Andrew
    COMPUTERS & SECURITY, 2015, 52 : 70 - 89
  • [26] Protecting Data Privacy in the Age of Al-Enabled Ophthalmology
    Tom, Elysse
    Keane, Pearse A.
    Blazes, Marian
    Pasquale, Louis R.
    Chiang, Michael F.
    Lee, Aaron Y.
    Lee, Cecilia S.
    TRANSLATIONAL VISION SCIENCE & TECHNOLOGY, 2020, 9 (02): : 1 - 7
  • [27] Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation
    Halboob W.
    Almuhtadi J.
    Computer Systems Science and Engineering, 2023, 45 (02): : 2071 - 2092
  • [28] Privacy impact assessment in large-scale digital forensic investigations
    Seyyar, M. Bas
    Geradts, Z. J. M. H.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 33
  • [29] Big forensic data reduction: digital forensic images and electronic evidence
    Darren Quick
    Kim-Kwang Raymond Choo
    Cluster Computing, 2016, 19 : 723 - 740
  • [30] Big forensic data reduction: digital forensic images and electronic evidence
    Quick, Darren
    Choo, Kim-Kwang Raymond
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (02): : 723 - 740