Cryptographic Techniques for Data Privacy in Digital Forensics

被引:2
|
作者
Ogunseyi, Taiwo Blessing [1 ]
Adedayo, Oluwasola Mary [2 ]
机构
[1] Yibin Univ, Int Fac Appl Technol, Yibin 644000, Sichuan, Peoples R China
[2] Univ Winnipeg, Dept Appl Comp Sci, Winnipeg, MB R3B 2E9, Canada
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Cryptographic techniques; data privacy; digital forensics; forensic readiness; privacy-preserving digital forensics; OF-THE-ART; COMPUTER FORENSICS; CHALLENGES; FRAMEWORK; TAXONOMY; INTERNET; INFORMATION; ENCRYPTION; SECURE; MODEL;
D O I
10.1109/ACCESS.2023.3343360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigations. However, the cost of this readiness often directly impacts the privacy of innocent third parties and suspects if the collected information is irrelevant. Approaches that have been suggested for privacy-preserving digital forensics focus on the use of policy, non-cryptography-based, and cryptography-based solutions. Cryptographic techniques have been proposed to address issues of data privacy during data analysis. As the utilization of some of these cryptographic techniques continues to increase, it is important to evaluate their applicability and challenges in relation to digital forensics processes. This study provides digital forensics investigators and researchers with a roadmap to understanding the data privacy challenges in digital forensics and examines the various privacy techniques that can be utilized to tackle these challenges. Specifically, we review the cryptographic techniques applied for privacy protection in digital forensics and categorize them within the context of whether they support trusted third parties, multiple investigators, and multi-keyword searches. We highlight some of the drawbacks of utilizing cryptography-based methods in privacy-preserving digital forensics and suggest potential solutions to the identified shortcomings. In addition, we propose a conceptual privacy-preserving digital forensics (PPDF) model that is based on the use of cryptographic techniques and analyze the model within the context of the above-mentioned factors. An evaluation of the model is provided through a consideration of identified factors that may affect an investigation. Lastly, we provide an analysis of how existing principles for preserving privacy in digital forensics are addressed in our PPDF model. Our evaluation shows that the model aligns with many of the existing privacy principles recommended for privacy protection in digital forensics.
引用
收藏
页码:142392 / 142410
页数:19
相关论文
共 50 条
  • [1] Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
    Balogun, Adedayo M.
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (05) : 36 - 40
  • [2] Compact and Resilient Cryptographic Tools for Digital Forensics
    Seyitoglu, Efe U. A.
    Yavuz, Attila A.
    Ozmen, Muslum Ozgur
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [3] Data Mining Techniques to Facilitate Digital Forensics Investigations
    Lopez, Erik Miranda
    Kim, Yoon Ho
    Park, Jong Hyuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 376 - 379
  • [4] Big Data and Digital Forensics Rethinking Digital Forensics
    Adedayo, Oluwasola Mary
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [5] Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android
    Hutchinson, Shinelle
    Mirza, Mohammad Meraj
    West, Nicholas
    Karabiyik, Umit
    Rogers, Marcus K.
    Mukherjee, Tathagata
    Aggarwal, Sudhir
    Chung, Haeyong
    Pettus-Davis, Carrie
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [6] Performance analysis of privacy preserving distributed data mining based on cryptographic techniques
    Marimuthu, Venkatesh Kumar
    Lakshmi, C.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 635 - 640
  • [7] Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing
    Singsit, Lamminthang
    Ashok, Marie Stanislas
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 42 - 47
  • [8] Forensics of visual privacy protection in digital images
    Xue, Fei
    Lu, Wei
    Ren, Honglin
    Xiao, Huimei
    Zhang, Qin
    Liu, Xianjin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12427 - 12445
  • [9] Combining Forensics and Privacy Requirements for Digital Images
    Puteaux, Pauline
    Itier, Vincent
    Bas, Patrick
    29TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2021), 2021, : 806 - 810
  • [10] Forensics of visual privacy protection in digital images
    Fei Xue
    Wei Lu
    Honglin Ren
    Huimei Xiao
    Qin Zhang
    Xianjin Liu
    Multimedia Tools and Applications, 2020, 79 : 12427 - 12445