Back to Search Start Over

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Authors :
Siu-Ming Yiu
Tetsutaro Uehara
Ryoichi Sasaki
Shuhui Hou
University of Science and Technology Beijing [Beijing] (USTB)
Tokyo Denki University
Research Institute of Information Security [Wakayama]
The University of Hong Kong (HKU)
David Hutchison
Takeo Kanade
Madhu Sudan
Demetri Terzopoulos
Doug Tygar
Moshe Y. Vardi
Gerhard Weikum
Khabib Mustofa
Erich J. Neuhold
A Min Tjoa
Edgar Weippl
Ilsun You
Josef Kittler
Jon M. Kleinberg
Friedemann Mattern
John C. Mitchell
Moni Naor
Oscar Nierstrasz
C. Pandu Rangan
Bernhard Steffen
TC 5
TC 8
Source :
Lecture Notes in Computer Science ISBN: 9783642368172, ICT-EurAsia, Lecture Notes in Computer Science, 1st International Conference on Information and Communication Technology (ICT-EurAsia), 1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Publication Year :
2013
Publisher :
Springer Berlin Heidelberg, 2013.

Abstract

Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; With the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the server administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem.

Details

ISBN :
978-3-642-36817-2
ISBNs :
9783642368172
Database :
OpenAIRE
Journal :
Lecture Notes in Computer Science ISBN: 9783642368172, ICT-EurAsia, Lecture Notes in Computer Science, 1st International Conference on Information and Communication Technology (ICT-EurAsia), 1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Accession number :
edsair.doi.dedup.....319a3e60046d35d7d1597ee87ba7153b
Full Text :
https://doi.org/10.1007/978-3-642-36818-9_33