A Framework for Digital Forensic Investigation using Authentication Technique to maintain Evidence Integrity

نویسندگان

  • Umesh Kumar Singh
  • Neha Gaud
  • Chanchala Joshi
چکیده

Digital evidence is information stored or transmitted in binary form that may be relied in an investigation. Digital evidence is the core for any digital forensic investigation that takes many forms and can be found in several places. It is the evidence on which whole investigation travel and reach to an exact conclusion. Ultimately we can say that any a little bit of alteration with collected data could impact to final result, which would be extremely dangerous to grab an innocent one. In this research work we proposed a framework that covers space to lead an investigation and will keep behind all possible jeopardizes action by achieving evidence integrity associated with evidence classification and to make use of chain of custody in an appropriate position.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Forensics Evidence Acquisition and Chain of Custody in Cloud Computing

The new cloud computing concept delivers an adaptable service to many users. This is due to the fact that cloud computing offers an economic solution based on pay-per use idea. At the same time, digital forensics is a relatively new discipline born out due to the growing use of computing and digital solution. Digital forensics in cloud computing brings new technical and legal challenges (e.g. t...

متن کامل

Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates [18]. PKI systems are today one of the most accepted and used technologies to enable successful implementation of information systems security services such as authentication and confidentiality. Digital forensics is a ...

متن کامل

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Processing Algorithms for Components within a Forensic Evidence Management System

It is well established that the integrity and reliability associated with digital evidence is integral to the successful prosecution of digital crimes. Consequently, forensic specialists continue to employ investigative tools and processes that maintain the integrity of digital evidence throughout the investigation cycle. Understandably, such tool-sets and processes are often non-trivial, and c...

متن کامل

Digitalevidence Integrated Management System

The purpose of computer forensic is to make digitalevidence which can be accepted in court using wellorganized technic and according to reasonable process in computer crime investigation. Recent forensic technic field is developed every year, however computer crime isn't. Especially, there are lacks of definite procedures such as collection, transfer, analysis of evidence, report evidence to th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016