File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-36818-9_33
- Scopus: eid_2-s2.0-84875150909
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
Title | Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation |
---|---|
Authors | |
Keywords | authenticity and integrity commutative encryption confidential forensic investigation signcryption |
Issue Date | 2013 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The Information & Communication Technology-Eurasia Conference (ICT-EurAsia 2013), Yogyakarta, Indonesia, 25-29 March 2013. In Lecture Notes in Computer Science, 2013, v. 7804, p. 312-317 How to Cite? |
Abstract | With the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the server administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem. |
Description | Lecture Notes in Computer Science, vol. 7804 entitled: Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013: Proceedings |
Persistent Identifier | http://hdl.handle.net/10722/189643 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hou, SH | en_US |
dc.contributor.author | Sasaki, R | en_US |
dc.contributor.author | Uehara, T | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2013-09-17T14:50:35Z | - |
dc.date.available | 2013-09-17T14:50:35Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | The Information & Communication Technology-Eurasia Conference (ICT-EurAsia 2013), Yogyakarta, Indonesia, 25-29 March 2013. In Lecture Notes in Computer Science, 2013, v. 7804, p. 312-317 | en_US |
dc.identifier.isbn | 9783642368172 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/189643 | - |
dc.description | Lecture Notes in Computer Science, vol. 7804 entitled: Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013: Proceedings | - |
dc.description.abstract | With the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the server administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem. | - |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | - |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | authenticity and integrity | - |
dc.subject | commutative encryption | - |
dc.subject | confidential forensic investigation | - |
dc.subject | signcryption | - |
dc.title | Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.doi | 10.1007/978-3-642-36818-9_33 | - |
dc.identifier.scopus | eid_2-s2.0-84875150909 | - |
dc.identifier.hkuros | 223602 | en_US |
dc.identifier.volume | 7804 | - |
dc.identifier.spage | 312 | en_US |
dc.identifier.epage | 317 | en_US |
dc.publisher.place | Germany | - |
dc.identifier.issnl | 0302-9743 | - |