File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

postgraduate thesis: Technical solutions for conducting investigations in digital age

TitleTechnical solutions for conducting investigations in digital age
Authors
Issue Date2012
PublisherThe University of Hong Kong (Pokfulam, Hong Kong)
Citation
Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180
AbstractConfidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.
DegreeMaster of Philosophy
SubjectComputer security.
Database security.
Dept/ProgramComputer Science
Persistent Identifierhttp://hdl.handle.net/10722/179989
HKU Library Item IDb4852180

 

DC FieldValueLanguage
dc.contributor.authorHo, Sze-lok.-
dc.contributor.author何思樂.-
dc.date.issued2012-
dc.identifier.citationHo, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180-
dc.identifier.urihttp://hdl.handle.net/10722/179989-
dc.description.abstractConfidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.-
dc.languageeng-
dc.publisherThe University of Hong Kong (Pokfulam, Hong Kong)-
dc.relation.ispartofHKU Theses Online (HKUTO)-
dc.rightsThe author retains all proprietary rights, (such as patent rights) and the right to use in future works.-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.source.urihttp://hub.hku.hk/bib/B48521802-
dc.subject.lcshComputer security.-
dc.subject.lcshDatabase security.-
dc.titleTechnical solutions for conducting investigations in digital age-
dc.typePG_Thesis-
dc.identifier.hkulb4852180-
dc.description.thesisnameMaster of Philosophy-
dc.description.thesislevelMaster-
dc.description.thesisdisciplineComputer Science-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.5353/th_b4852180-
dc.date.hkucongregation2012-
dc.identifier.mmsid991033921159703414-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats