Abstract
In pervasive environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kruse ii, W.G., Heiser, J.G.: COMPUTER FORENSICS: Incident Response Essentials, Addison Wesley
Marcella Jr, A.J.: Greenfield, S., (ed.) Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes (2002)
Casey, E.: Handbook of Computer Crime Investigation: Forensic Tools & Technology (2001)
Farmer, D., Venema, W.: The Coroner Toolkit (TCT) v1.11, (September 2002) Available at: http://www.Porcupine.org/forensics/tct.thml
TCT: The Coroner’s Toolkit, http://www.fish.com/tct
Carrier, B.: Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence (2003)
Palner, G.: A Road Map for Digital Forensics Research. Technical Report DTR-T001-01. DFRWS. Report From the Fiest Digital Forensic Reserch Workshop (DFWS) (November 2001)
Garber, L.: Encase: A Case Study in Computer-Forensics Technology, IEEE Computer Magazine (January 2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, JH., Park, MC., Park, YS., Koh, BS., Choi, YR. (2007). A Mechanism for Securing Digital Evidences in Pervasive Environments. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_67
Download citation
DOI: https://doi.org/10.1007/978-3-540-72909-9_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72908-2
Online ISBN: 978-3-540-72909-9
eBook Packages: Computer ScienceComputer Science (R0)