File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.4156/jdcta.vol5.issue2.35
- Scopus: eid_2-s2.0-79952796673
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing
Title | An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing |
---|---|
Authors | |
Keywords | Applied Cryptography Combinatorial Group Testing Digital Forensics Hard Disk Integrity |
Issue Date | 2011 |
Citation | International Journal Of Digital Content Technology And Its Applications, 2011, v. 5 n. 2, p. 300-308 How to Cite? |
Abstract | In this paper, we describe the problem of checking the integrity of a hard disk for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the situation in an effective way in case some sectors have been changed (e.g. become bad sectors or deleted due to being part of the Legal Professional Privilege items). We propose an efficient hashing scheme with combinatorial group testing to calculate hash values for all sectors in a hard disk as the integrity proof and precisely locate the sectors which have been changed. Experimental results show that the scheme can significantly decrease the storage overhead (0.5MB needed for a 250GB hard disk) while require similar computational time compared to the existing approach. The computational time can be further decreased using our improved 2-stage approach. |
Persistent Identifier | http://hdl.handle.net/10722/152455 |
ISSN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fang, J | en_US |
dc.contributor.author | Jiang, ZL | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.date.accessioned | 2012-06-26T06:39:15Z | - |
dc.date.available | 2012-06-26T06:39:15Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | International Journal Of Digital Content Technology And Its Applications, 2011, v. 5 n. 2, p. 300-308 | en_US |
dc.identifier.issn | 1975-9339 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152455 | - |
dc.description.abstract | In this paper, we describe the problem of checking the integrity of a hard disk for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the situation in an effective way in case some sectors have been changed (e.g. become bad sectors or deleted due to being part of the Legal Professional Privilege items). We propose an efficient hashing scheme with combinatorial group testing to calculate hash values for all sectors in a hard disk as the integrity proof and precisely locate the sectors which have been changed. Experimental results show that the scheme can significantly decrease the storage overhead (0.5MB needed for a 250GB hard disk) while require similar computational time compared to the existing approach. The computational time can be further decreased using our improved 2-stage approach. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | International Journal of Digital Content Technology and its Applications | en_US |
dc.subject | Applied Cryptography | en_US |
dc.subject | Combinatorial Group Testing | en_US |
dc.subject | Digital Forensics | en_US |
dc.subject | Hard Disk Integrity | en_US |
dc.title | An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing | en_US |
dc.type | Article | en_US |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.4156/jdcta.vol5.issue2.35 | en_US |
dc.identifier.scopus | eid_2-s2.0-79952796673 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79952796673&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 5 | en_US |
dc.identifier.issue | 2 | en_US |
dc.identifier.spage | 300 | en_US |
dc.identifier.epage | 308 | en_US |
dc.identifier.scopusauthorid | Fang, J=36132767400 | en_US |
dc.identifier.scopusauthorid | Jiang, ZL=24344329800 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.issnl | 1975-9339 | - |