2014 Twelfth Annual International Conference on Privacy, Security and Trust 2014
DOI: 10.1109/pst.2014.6890932
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-respecting digital investigation

Abstract: the forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to 'undo' its exposure effects should the suspect is found innocent! Moreover, it is not uncommon that during a suspect investigation, private information of other innocent parties becomes apparent to the forensics investigator. These all raise the concern for development of platforms for enforcing privacy boun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

3
7

Authors

Journals

citations
Cited by 42 publications
(27 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…In the absence of temporal information such as modified, accessed and created time, correlation of evidences gathered from different IoT devices is almost impossible. Beyond technical challenges, privacy is a major issue to consider when analysing and correlating collected data especially as majority of IoT sensors are collecting innate personal information [19]. Moreover, the sheer volume of data that are collected in heterogeneous IoT environments make it close to impossible to provide an end-toend analysis of residual evidences.…”
Section: Evidence Analysis and Correlationmentioning
confidence: 99%
“…In the absence of temporal information such as modified, accessed and created time, correlation of evidences gathered from different IoT devices is almost impossible. Beyond technical challenges, privacy is a major issue to consider when analysing and correlating collected data especially as majority of IoT sensors are collecting innate personal information [19]. Moreover, the sheer volume of data that are collected in heterogeneous IoT environments make it close to impossible to provide an end-toend analysis of residual evidences.…”
Section: Evidence Analysis and Correlationmentioning
confidence: 99%
“…Extending presented approach for detecting evidences of different platforms over cloud, such as investigating mobile devices connected to the cloud [52,53], investigation of cloud-based social networking platforms [54,55], and cloud malware forensics [56,57,58,59,60] would be interesting future works. Moreover, analyzing legal and privacy implications of conducting cloud forensics [61,62] and developing relevant solutions could further opportunities for real-world utilization of cloud investigation techniques.…”
Section: Resultsmentioning
confidence: 99%
“…Public cloud users are often billed for the resources consumed, including the storage input output (I/O), CPUs and memory, and the cost can become prohibitively expensive in storing, accessing and analysing high velocity, variety, veracity, and volume data. There were also concerns about Cloud Service providers (CSPs) being able to infer or profile users based on the hosted/stored data [3], [4], [5]. Thus, it is unsurprising that cloud and big data security and privacy are current research focus [6], [7], [8], [9], [10], [11], [12], [13], [14].…”
Section: Introductionmentioning
confidence: 99%