File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/MINES.2011.90
- Scopus: eid_2-s2.0-84855646451
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Privacy preserving multiple keyword search for confidential investigation of remote forensics
Title | Privacy preserving multiple keyword search for confidential investigation of remote forensics |
---|---|
Authors | |
Keywords | Confidential Forensic Investigation Homomorphic Encryption Privacy-Preserving Multiple Keyword Search Remote Forensics |
Issue Date | 2011 |
Citation | Proceedings - 3Rd International Conference On Multimedia Information Networking And Security, Mines 2011, 2011, p. 595-599 How to Cite? |
Abstract | Remote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investigation. The difficulty consists in that thousands upon thousands of disparate data from different data owners may be stored on a single storage device (e.g., a remote server). To clone a copy of data from the storage device is a costly and time consuming task and may not be easy due to the huge volume of data. Even if it is possible to make a clone, investigating all the data one by one will inevitably result in exposing irrelevant data to the investigators while data owners may be unwilling to expose it because it may involve their privacy information. The other alternative is to let the server administrator search the relevant information and retrieve the data for the investigators provided a warrant can be provided. However, sometimes, the investigators need to keep the investigation subject confidential due to the confidentiality of the crime or the server administrator may be one of the suspects. In this paper, we address how to solve this problem by multiple keyword search over encrypted data, so that the investigators can obtain the necessary evidence while keeping the investigation subject confidential and at the same time, the irrelevant data can be protected from exposing to the investigators. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/152029 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hou, S | en_US |
dc.contributor.author | Uehara, T | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.date.accessioned | 2012-06-26T06:32:39Z | - |
dc.date.available | 2012-06-26T06:32:39Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | Proceedings - 3Rd International Conference On Multimedia Information Networking And Security, Mines 2011, 2011, p. 595-599 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152029 | - |
dc.description.abstract | Remote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investigation. The difficulty consists in that thousands upon thousands of disparate data from different data owners may be stored on a single storage device (e.g., a remote server). To clone a copy of data from the storage device is a costly and time consuming task and may not be easy due to the huge volume of data. Even if it is possible to make a clone, investigating all the data one by one will inevitably result in exposing irrelevant data to the investigators while data owners may be unwilling to expose it because it may involve their privacy information. The other alternative is to let the server administrator search the relevant information and retrieve the data for the investigators provided a warrant can be provided. However, sometimes, the investigators need to keep the investigation subject confidential due to the confidentiality of the crime or the server administrator may be one of the suspects. In this paper, we address how to solve this problem by multiple keyword search over encrypted data, so that the investigators can obtain the necessary evidence while keeping the investigation subject confidential and at the same time, the irrelevant data can be protected from exposing to the investigators. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011 | en_US |
dc.subject | Confidential Forensic Investigation | en_US |
dc.subject | Homomorphic Encryption | en_US |
dc.subject | Privacy-Preserving Multiple Keyword Search | en_US |
dc.subject | Remote Forensics | en_US |
dc.title | Privacy preserving multiple keyword search for confidential investigation of remote forensics | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/MINES.2011.90 | en_US |
dc.identifier.scopus | eid_2-s2.0-84855646451 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-84855646451&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 595 | en_US |
dc.identifier.epage | 599 | en_US |
dc.identifier.scopusauthorid | Hou, S=36809489300 | en_US |
dc.identifier.scopusauthorid | Uehara, T=35243665300 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_US |