File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

TitleVerifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
Authors
Issue Date2013
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The Information & Communication Technology-Eurasia Conference (ICT-EurAsia 2013), Yogyakarta, Indonesia, 25-29 March 2013. In Lecture Notes in Computer Science, 2013, v. 7804, p. 312-317 How to Cite?
AbstractWith the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the server administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem.
DescriptionLecture Notes in Computer Science, vol. 7804 entitled: Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013: Proceedings
Persistent Identifierhttp://hdl.handle.net/10722/189643
ISBN
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252

 

DC FieldValueLanguage
dc.contributor.authorHou, SHen_US
dc.contributor.authorSasaki, Ren_US
dc.contributor.authorUehara, Ten_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2013-09-17T14:50:35Z-
dc.date.available2013-09-17T14:50:35Z-
dc.date.issued2013en_US
dc.identifier.citationThe Information & Communication Technology-Eurasia Conference (ICT-EurAsia 2013), Yogyakarta, Indonesia, 25-29 March 2013. In Lecture Notes in Computer Science, 2013, v. 7804, p. 312-317en_US
dc.identifier.isbn9783642368172-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/189643-
dc.descriptionLecture Notes in Computer Science, vol. 7804 entitled: Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013: Proceedings-
dc.description.abstractWith the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the server administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem.-
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/-
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rightsThe original publication is available at www.springerlink.com-
dc.titleVerifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigationen_US
dc.typeConference_Paperen_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.doi10.1007/978-3-642-36818-9_33-
dc.identifier.scopuseid_2-s2.0-84875150909-
dc.identifier.hkuros223602en_US
dc.identifier.volume7804-
dc.identifier.spage312en_US
dc.identifier.epage317en_US
dc.publisher.placeGermany-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats