Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation

نویسندگان

  • Neil J. Croft
  • Martin S. Olivier
چکیده

The Global System for Mobile Communication (GSM) is a popular mobile communication standard. GSM networks collect personal communication information required for the billing of its subscribers. These communication records, known as Call Data Records (CDRs), may infringe on basic subscriber privacy principles as personal details of performed network events are managed and stored by the serving GSM operator. The dilemma exists, how to achieve subscriber network operator privacy that is accountable, while retaining access to subscriber activities for a forensic investigation without the need for a search warrant. To balance the requirements of protection and forensics against those for privacy, one promising direction is to investigate methods that facilitate key escrow techniques where CDRs are concerned. This paper discusses, from a technical perspective, the network components involved when conducting a mobile forensic analysis, and how these aspects are influenced by a forensic investigation in a GSM network. It finally shows how a balance is reached between security, privacy and forensics in a GSM network through the release of, by our definition, “privacy accurate” CDR information in a sequential manner. Access to the individual elements that comprise the private CDR information, is based on prior knowledge and proof of defined hypotheses at the outset of the investigation. Our approach focuses on an accountable CDR Forensic Anonymity Model combined with the theory of compatible keys, forms an integral part of our requirement for the release of privacy accurate CDR information during a GSM mobile forensic investigation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مقایسه ی ُمیزان رعایت اصول محرمانگی در موارد قانونی بر مبنای راهنمای سازمان بهداشت جهانی دربیمارستان های آموزشی وابسته به دانشگاه های علوم پزشکی ایران ،تهران و شهیدبهشتی :1387.

Introduction: In many countries, the medical records are important legal documents, essential not only for the present and future care for patients but also as legal documents to protect the patients and the hospitals. Medical record is a confidential document and always the patient's right to privacy must be regarded. Methods: This is a descriptive - cross sectional study. Study sample were 34...

متن کامل

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Data Privacy Perceptions About Digital Forensic Investigations in India

A digital forensic investigation requires an investigator to examine the forensic images of the seized storage media and devices. The investigator obtains full access to all the data contained in the forensic images, including private and sensitive data belonging to the individual being investigated that may be entirely unrelated to the case. Unrestricted access to forensic images poses a signi...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006