You Are Safe When You Tell the Truth: A Blockchain-based Privacy-preserving Evidence Collection and Distribution System for Digital Forensics

Author(s):  
Biyi Lin ◽  
Junjie Xiong
2015 ◽  
Vol 9 (4) ◽  
pp. 53-62 ◽  
Author(s):  
Xuejiao Wan ◽  
Jingsha He ◽  
Na Huang ◽  
Yonghao Mai

2014 ◽  
Vol 635-637 ◽  
pp. 1471-1475
Author(s):  
Hai Yan Chen

In the context of the wide application of cloud computing technology, Internet crimes with the support of such technology will increase. In this article, the author proposed a holistic set of digital forensics method applicable in could computing environment from the point of the four stages of digital evidence collection, preservation, analysis and presentation. In evidence collection session, original resource of electric data collection was discussed. In evidence preservation session, electronic data storage system on Hadoop was designed. In evidence analysis session, two types of crime data were analyzed. In evidence presentation session, what the result should be shown were explained.


Author(s):  
Ludwig Englbrecht ◽  
Günther Pernul

Stricter policies, laws and regulations for companies on the handling of private information arise challenges in the handling of data for Digital Forensics investigations. This paper describes an approach that can meet necessary requirements to conduct a privacy-aware Digital Forensics investigation in an enterprise. The core of our approach is an entropy-based identification algorithm to detect specific patterns within files that can indicate non-private information. Therefore we combine various approaches with the goal to detect and exclude files containing sensitive information systematically. This privacy-preserving method can be integrated into a Digital Forensics examination process to prepare an image which is free from private as well as critical information for the investigation. We implemented and evaluated our approach with a prototype. The approach demonstrates that investigations in enterprises can be supported and improved by adapting existing algorithms and processes from related subject areas to implement privacy-preserving measures into an investigation process.


2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects' privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect's privacy. In this paper, we propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidences. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidences, and to verify whether privacy of the suspect was preserved during the investigation process.


2019 ◽  
Vol 11 (2) ◽  
pp. 135-142
Author(s):  
Muhammad Naim Al Jumah ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.


Sign in / Sign up

Export Citation Format

Share Document