Privacy-preserving computer forensics framework

Computer forensics and privacy preservation are conflicting fields in computer security. Computer forensics tools essentially image and analyze all the data found in a targeted investigation. In contrast, privacy preservation techniques are used to protect a data owner private identity, information,...

Full description

Saved in:
Bibliographic Details
Main Author: Halboob, Waleed Abduljabbar
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/57138/1/FSKTM%202015%2020RR.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.57138
record_format uketd_dc
spelling my-upm-ir.571382017-09-07T04:41:00Z Privacy-preserving computer forensics framework 2015-06 Halboob, Waleed Abduljabbar Computer forensics and privacy preservation are conflicting fields in computer security. Computer forensics tools essentially image and analyze all the data found in a targeted investigation. In contrast, privacy preservation techniques are used to protect a data owner private identity, information, and/or activities from any unauthorized access, use,or disclosure. Thus, there is a need to balance these two conflicting fields. In other words,there is a tremendous need to find a lawful and fair computer forensics solution thatr the past decade,the conflict between privacy preservation and computer forensics has been investigated in several studies. However, the solutions proposed by previous researchers are not efficient and lawful as well as they did not provide a sufficient analysis. The objective of this research is to propose a computer forensics framework to preserve the privacy of data owners in an efficient and lawful manner while providing sufficient digital evidence analysis. Computer forensics privacy levels and policies are specified to help improve used for providing an efficient imaging and analysis. The private data are encrypted using an advanced encryption system (AES). Advanced forensic format 4 (AFF4) is used as a container for the imaged relevant data. The framework is implemented to ensure that it is workable and measure its efficiency. A qualitative evaluation method was used to evaluate both the lawfulness of the framework and sufficiency of the analysis by observing these criteria. Moreover, other related work was implemented to compare with the proposed framework. The results obtained show that the proposed framework satisfies all the required features for having a lawful solution, provides efficient imaging and analysis as well as sufficient analysis. It can be concluded that the proposed framework has several advantages compared to the other related works, namely an efficient and lawful method for selective imaging and analysis, and sufficient analysis. It also provides a forensics sound and flexible solution with a distributed analysis. Computer security Data protection Evidence preservation - Forensic sciences 2015-06 Thesis http://psasir.upm.edu.my/id/eprint/57138/ http://psasir.upm.edu.my/id/eprint/57138/1/FSKTM%202015%2020RR.pdf application/pdf en public phd doctoral Universiti Putra Malaysia Computer security Data protection Evidence preservation - Forensic sciences
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Computer security
Data protection
Evidence preservation - Forensic sciences
spellingShingle Computer security
Data protection
Evidence preservation - Forensic sciences
Halboob, Waleed Abduljabbar
Privacy-preserving computer forensics framework
description Computer forensics and privacy preservation are conflicting fields in computer security. Computer forensics tools essentially image and analyze all the data found in a targeted investigation. In contrast, privacy preservation techniques are used to protect a data owner private identity, information, and/or activities from any unauthorized access, use,or disclosure. Thus, there is a need to balance these two conflicting fields. In other words,there is a tremendous need to find a lawful and fair computer forensics solution thatr the past decade,the conflict between privacy preservation and computer forensics has been investigated in several studies. However, the solutions proposed by previous researchers are not efficient and lawful as well as they did not provide a sufficient analysis. The objective of this research is to propose a computer forensics framework to preserve the privacy of data owners in an efficient and lawful manner while providing sufficient digital evidence analysis. Computer forensics privacy levels and policies are specified to help improve used for providing an efficient imaging and analysis. The private data are encrypted using an advanced encryption system (AES). Advanced forensic format 4 (AFF4) is used as a container for the imaged relevant data. The framework is implemented to ensure that it is workable and measure its efficiency. A qualitative evaluation method was used to evaluate both the lawfulness of the framework and sufficiency of the analysis by observing these criteria. Moreover, other related work was implemented to compare with the proposed framework. The results obtained show that the proposed framework satisfies all the required features for having a lawful solution, provides efficient imaging and analysis as well as sufficient analysis. It can be concluded that the proposed framework has several advantages compared to the other related works, namely an efficient and lawful method for selective imaging and analysis, and sufficient analysis. It also provides a forensics sound and flexible solution with a distributed analysis.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Halboob, Waleed Abduljabbar
author_facet Halboob, Waleed Abduljabbar
author_sort Halboob, Waleed Abduljabbar
title Privacy-preserving computer forensics framework
title_short Privacy-preserving computer forensics framework
title_full Privacy-preserving computer forensics framework
title_fullStr Privacy-preserving computer forensics framework
title_full_unstemmed Privacy-preserving computer forensics framework
title_sort privacy-preserving computer forensics framework
granting_institution Universiti Putra Malaysia
publishDate 2015
url http://psasir.upm.edu.my/id/eprint/57138/1/FSKTM%202015%2020RR.pdf
_version_ 1747812168050409472