File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Privacy preserving multiple keyword search for confidential investigation of remote forensics

TitlePrivacy preserving multiple keyword search for confidential investigation of remote forensics
Authors
KeywordsConfidential Forensic Investigation
Homomorphic Encryption
Privacy-Preserving Multiple Keyword Search
Remote Forensics
Issue Date2011
Citation
Proceedings - 3Rd International Conference On Multimedia Information Networking And Security, Mines 2011, 2011, p. 595-599 How to Cite?
AbstractRemote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investigation. The difficulty consists in that thousands upon thousands of disparate data from different data owners may be stored on a single storage device (e.g., a remote server). To clone a copy of data from the storage device is a costly and time consuming task and may not be easy due to the huge volume of data. Even if it is possible to make a clone, investigating all the data one by one will inevitably result in exposing irrelevant data to the investigators while data owners may be unwilling to expose it because it may involve their privacy information. The other alternative is to let the server administrator search the relevant information and retrieve the data for the investigators provided a warrant can be provided. However, sometimes, the investigators need to keep the investigation subject confidential due to the confidentiality of the crime or the server administrator may be one of the suspects. In this paper, we address how to solve this problem by multiple keyword search over encrypted data, so that the investigators can obtain the necessary evidence while keeping the investigation subject confidential and at the same time, the irrelevant data can be protected from exposing to the investigators. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/152029
References

 

DC FieldValueLanguage
dc.contributor.authorHou, Sen_US
dc.contributor.authorUehara, Ten_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorChow, KPen_US
dc.date.accessioned2012-06-26T06:32:39Z-
dc.date.available2012-06-26T06:32:39Z-
dc.date.issued2011en_US
dc.identifier.citationProceedings - 3Rd International Conference On Multimedia Information Networking And Security, Mines 2011, 2011, p. 595-599en_US
dc.identifier.urihttp://hdl.handle.net/10722/152029-
dc.description.abstractRemote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investigation. The difficulty consists in that thousands upon thousands of disparate data from different data owners may be stored on a single storage device (e.g., a remote server). To clone a copy of data from the storage device is a costly and time consuming task and may not be easy due to the huge volume of data. Even if it is possible to make a clone, investigating all the data one by one will inevitably result in exposing irrelevant data to the investigators while data owners may be unwilling to expose it because it may involve their privacy information. The other alternative is to let the server administrator search the relevant information and retrieve the data for the investigators provided a warrant can be provided. However, sometimes, the investigators need to keep the investigation subject confidential due to the confidentiality of the crime or the server administrator may be one of the suspects. In this paper, we address how to solve this problem by multiple keyword search over encrypted data, so that the investigators can obtain the necessary evidence while keeping the investigation subject confidential and at the same time, the irrelevant data can be protected from exposing to the investigators. © 2011 IEEE.en_US
dc.languageengen_US
dc.relation.ispartofProceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011en_US
dc.subjectConfidential Forensic Investigationen_US
dc.subjectHomomorphic Encryptionen_US
dc.subjectPrivacy-Preserving Multiple Keyword Searchen_US
dc.subjectRemote Forensicsen_US
dc.titlePrivacy preserving multiple keyword search for confidential investigation of remote forensicsen_US
dc.typeConference_Paperen_US
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_US
dc.identifier.emailHui, LCK:hui@cs.hku.hken_US
dc.identifier.emailChow, KP:chow@cs.hku.hken_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityChow, KP=rp00111en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/MINES.2011.90en_US
dc.identifier.scopuseid_2-s2.0-84855646451en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-84855646451&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage595en_US
dc.identifier.epage599en_US
dc.identifier.scopusauthoridHou, S=36809489300en_US
dc.identifier.scopusauthoridUehara, T=35243665300en_US
dc.identifier.scopusauthoridYiu, SM=7003282240en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridChow, KP=7202180751en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats