Title :
A digital evidence protection method with hierarchical access control mechanisms
Author :
Hsu, Chien-Lung ; Liu, Boo-Chen ; Lin, Yu-Li
Author_Institution :
Dept. of Inf. Manage., Chang Gung Univ., Taoyuan, Taiwan
Abstract :
Digital evidences are the important basis in digital forensic. This paper proposed a concrete digital evidence protection method with hierarchical access control mechanisms using cryptographic techniques. It allows judicial policeman to authenticated encrypt the collected digital evidences from being disclosed and modified by potential malicious attackers (including malicious insiders and outsiders). Only the authorized users can retrieve and access the digital evidences and verify their integrity. Hence, confidentiality, integrity, authenticity protection for digital evidences can be achieved. Moreover, this method also allows the judiciary bureaus to present the digital evidences together with protection proof to a trusted third party in case of a later dispute. We further considered the access control security issues in hierarchical judiciary bureaus to propose two access control mechanisms, i.e. partial and full supervision. In the partial supervision, the supervisor will given a partial privilege to access some specified digital evidences when he want to monitor and supervise the investigation progress. In the full supervision, the supervisor is given a full privilege to access all digital evidences investigated by his subordinates in a particular situation.
Keywords :
authorisation; computer forensics; cryptography; police data processing; cryptographic techniques; digital evidence protection method; digital forensic; full supervision; hierarchical access control mechanisms; hierarchical judiciary bureaus; judicial policeman; malicious attackers; partial supervision; protection proof; trusted third party; Access control; Algorithm design and analysis; Digital forensics; Encryption; Public key; Digital forensic; authentication; confidentiality; digital evidence; integrity; supervision;
Conference_Titel :
Security Technology (ICCST), 2011 IEEE International Carnahan Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4577-0902-9
DOI :
10.1109/CCST.2011.6095882