scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Journal ArticleDOI
05 Jan 2018
TL;DR: This manuscript proposes a novel approach by applying cryptographic hashing technique to only selected significant portions of the digital evidence, so even if the overall hash does not match, investigators could still verify the integrity of those critical sections of the evidence.
Abstract: The integrity of digital evidence is believed to be the paramount trait in the world of cyber forensics. Cybercrime investigators face myriad challenges in the process similar to accommodating the call for bulk digital evidence. In due course extraction of useful information while maintaining the integrity and absolute protection against data degradation is mandatory. In this manuscript, we propose a novel approach by applying cryptographic hashing technique to only selected significant portions of the digital evidence, so even if the overall hash does not match, investigators could still verify the integrity of those critical sections of the evidence.We put forward two notions in this manuscript; former is heterogeneous piecewise hashing which is a flexible version of the piecewise hashing strategy, and latter is a novel evidence certification strategy which formalizes evidence provability process completely.

3 citations

Journal ArticleDOI
TL;DR: The general architecture of SeFOS is described, the model of its forensics behaviors is analyzed with some formal method descriptions, and the method of completely collecting and safely storing for the digital evidences is presented.
Abstract: In this paper, a kind of security operating system with the mechanism of real-time forensics (called SeFOS) is presented, the general architecture of SeFOS is described, the model of its forensics behaviors is analyzed with some formal method descriptions, and the method of completely collecting and safely storing for the digital evidences is presented. The forensics model of SeFOS is inside the kernel and the evidences are obtainted from system processes, system calls, resources assigning inside the kernel and network data. Finally, a simulated experiment is designed to validate the efficiency of SeFOS.

3 citations

Journal ArticleDOI
TL;DR: A good investigator, whether it be in the context of an audit or a forensic investigation, recognizes the evidentiary value of digital evidence and can harness its power.
Abstract: A good investigator, whether it be in the context of an audit or a forensic investigation, recognizes the evidentiary value of digital evidence and can harness its power. The following ins...

3 citations

Book ChapterDOI
01 Jan 2019
TL;DR: The paper aims to take the facets of data reduction for efficient storage and retrieval of digital data, and an overall digital forensic research framework has been outlined and outlines the challenges and the unaddressed aspects of digital forensics.
Abstract: The hasty headway in the field of information technology has lead ways for an escalating crime rate being technically exhaustive. The crimes involving digital tools and devices assist to be the forensic evidences. An upsurge in digital evidences is coalesced with the growing size of storage devices. Pertaining to the ineffectualness of the traditional analysis methods to handle the colossal amount of digital data, the forensic investigators have to adopt big data analytics to store, recover, and analyze the digital evidence. The storage of digital evidence calls for surveillance and security, thereby preserving its evidential significance. The digital analysis and fraud detection make the recovery and storage of digital data achievable by effective data reduction and exploiting the features of data mining for storage and data archive. Advancement with the forensic analysis assures automated management of digital data thus safeguarding the sensitivity of data. The paper aims to take the facets of data reduction for efficient storage and retrieval of digital data, and an overall digital forensic research framework has been outlined. The proposed work supports the existing framework for data reduction and storage. It also outlines the challenges and the unaddressed aspects of digital forensics. In this paper, I also discussed the unaddressed aspects of forensic investigations and peaks into the loopholes and the opportunity realms that can lay groundwork for future.

3 citations

Proceedings ArticleDOI
10 Jan 2008
TL;DR: The prototype of digitalevidence management system for the efficient cyber crime investigation is proposed and the necessity of the near search using a mining & the digital forensic evidence management system is proposed.
Abstract: As the digitization of information is advanced, the case which keeps inside the digital information machinery and tools where the important evidence or beginning are included is increasing in computer related crime and also general crime. The digital organization standardized the process of digital forensic in the investigation office and the cyber crime investigation which applies the various equipments(S/W, H/W) is being activated. But the specialist discernment is necessary for equipment (S/W and H/W) application and the actual condition is that the evidence management and joint ownership are restricted. As it is able to approach in the case of the non specialist easily and a corroborative fact data application degree is raised through the connection of the investigation office (prosecution, police) & the financial institution (the bank, insurance and the securities) and the necessity of the near search using a mining & the digital forensic evidence management system is proposed, we would like to propose the prototype of digital evidence management system for the efficient cyber crime investigation through this research.

3 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202388
2022206
202187
2020116
2019111