Skip to main content

A Mechanism for Securing Digital Evidences in Pervasive Environments

  • Conference paper
Book cover Advances in Web and Network Technologies, and Information Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4537))

  • 2405 Accesses

Abstract

In pervasive environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kruse ii, W.G., Heiser, J.G.: COMPUTER FORENSICS: Incident Response Essentials, Addison Wesley

    Google Scholar 

  2. Marcella Jr, A.J.: Greenfield, S., (ed.) Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes (2002)

    Google Scholar 

  3. Casey, E.: Handbook of Computer Crime Investigation: Forensic Tools & Technology (2001)

    Google Scholar 

  4. Farmer, D., Venema, W.: The Coroner Toolkit (TCT) v1.11, (September 2002) Available at: http://www.Porcupine.org/forensics/tct.thml

  5. TCT: The Coroner’s Toolkit, http://www.fish.com/tct

  6. Carrier, B.: Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence (2003)

    Google Scholar 

  7. Palner, G.: A Road Map for Digital Forensics Research. Technical Report DTR-T001-01. DFRWS. Report From the Fiest Digital Forensic Reserch Workshop (DFWS) (November 2001)

    Google Scholar 

  8. Garber, L.: Encase: A Case Study in Computer-Forensics Technology, IEEE Computer Magazine (January 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kevin Chen-Chuan Chang Wei Wang Lei Chen Clarence A. Ellis Ching-Hsien Hsu Ah Chung Tsoi Haixun Wang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jang, JH., Park, MC., Park, YS., Koh, BS., Choi, YR. (2007). A Mechanism for Securing Digital Evidences in Pervasive Environments. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72909-9_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72908-2

  • Online ISBN: 978-3-540-72909-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics