Abstract
The traditional integrity protection of evidence currently available only accounts for the entire time between seizure and presentation. Few people focus their eyes on the time before seizure. Here, through analyzing in detail the relation between digital evidence and intrusion process, a digital evidence protection model with batch-verifying and public verifiability is proposed to protect the generated digital evidence in time. The new protection model can reasonably account for the entire time between generation and presentation. The digital evidence based on the new model is valid and acceptable.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Marcus, K.R., Kate, S.: The future of computer forensics: a needs analysis survey. Computer and Security 23, 12–16 (2004)
Haggerty, J., Taylor, M.: Managing corporate computer forensics. Computer Fraud & Security, 14–16 (2006)
Ayers, D.: A second generation computer forensic next term analysis system. Digital Investigation, S34–S42 (2009)
Wolfe, H.B.: Computer forensics. Computers and Security 22, 26–28 (2003)
Wang, Y., Cannady, J., Rosenbluth, J.: Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report 21, 119–127 (2005)
Pal, P., Webber, F., Schantz, R.E., et al.: Survival by defense-enabling. In: Proceedings of the New Security Paradigms Workshop (NSPW 2001), pp. 71–78. ACM Press, New York (2001)
Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM 21, 120–126 (1978)
El Gamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31, 469–472 (1985)
Federal Information Processing Standards Publication 186, Digital Signature Standard (1994), http://www.itl.nist.gov/fipspubs/fip186.html
Changshe, M., Kefei, C.: Publicly verifiable authenticated encryption. Electronics Letters 39, 281–282 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qi, ZH., Gao, ZF., Shen, YM., Han, BX. (2013). Digital Evidence Protection Model with Batch-Verifying and Public Verifiability for Computer Forensics. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-31656-2_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31655-5
Online ISBN: 978-3-642-31656-2
eBook Packages: EngineeringEngineering (R0)