Skip to main content

Digital Evidence Protection Model with Batch-Verifying and Public Verifiability for Computer Forensics

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 180))

Abstract

The traditional integrity protection of evidence currently available only accounts for the entire time between seizure and presentation. Few people focus their eyes on the time before seizure. Here, through analyzing in detail the relation between digital evidence and intrusion process, a digital evidence protection model with batch-verifying and public verifiability is proposed to protect the generated digital evidence in time. The new protection model can reasonably account for the entire time between generation and presentation. The digital evidence based on the new model is valid and acceptable.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marcus, K.R., Kate, S.: The future of computer forensics: a needs analysis survey. Computer and Security 23, 12–16 (2004)

    Article  Google Scholar 

  2. Haggerty, J., Taylor, M.: Managing corporate computer forensics. Computer Fraud & Security, 14–16 (2006)

    Google Scholar 

  3. Ayers, D.: A second generation computer forensic next term analysis system. Digital Investigation, S34–S42 (2009)

    Google Scholar 

  4. Wolfe, H.B.: Computer forensics. Computers and Security 22, 26–28 (2003)

    Article  Google Scholar 

  5. Wang, Y., Cannady, J., Rosenbluth, J.: Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report 21, 119–127 (2005)

    Article  Google Scholar 

  6. Pal, P., Webber, F., Schantz, R.E., et al.: Survival by defense-enabling. In: Proceedings of the New Security Paradigms Workshop (NSPW 2001), pp. 71–78. ACM Press, New York (2001)

    Chapter  Google Scholar 

  7. Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM 21, 120–126 (1978)

    Article  MATH  Google Scholar 

  8. El Gamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31, 469–472 (1985)

    Google Scholar 

  9. Federal Information Processing Standards Publication 186, Digital Signature Standard (1994), http://www.itl.nist.gov/fipspubs/fip186.html

  10. Changshe, M., Kefei, C.: Publicly verifiable authenticated encryption. Electronics Letters 39, 281–282 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhao-Hui Qi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qi, ZH., Gao, ZF., Shen, YM., Han, BX. (2013). Digital Evidence Protection Model with Batch-Verifying and Public Verifiability for Computer Forensics. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31656-2_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31655-5

  • Online ISBN: 978-3-642-31656-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics