Browse > Article

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment  

Jang, Eun-Gyeom (대전대학교 컴퓨터공학과, (주)엠투엠코리아 연구소)
Publication Information
Journal of Internet Computing and Services / v.11, no.4, 2010 , pp. 129-141 More about this Journal
Abstract
In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.
Keywords
Computer Forensics; integrity; Authentication; Security Model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Lee Garber, "Encase: A Case Study in Computer-Forensics Technology", IEEE Computer Magazine Jan 2001.
2 D.Farmer and W. Venema, "The Coroner Toolkit (TCT) v1.11", Available at: http://www. Porcupine.org/ forensics/tct.thml, September 2002.
3 TCT: The Coroner's Toolkit, http://www.fish.com/tct
4 Warren G.Kruse ii, Jay G.Heiser. "COMPUTER FORENSICS: Incident Response Essentials", Addison Wesley, Oct 2001.
5 Albert J. Marcella Jr (Editor S. Greenfield, "Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes (Information Security) (Hardcover)", Auerbach Publications, Dec 2007.
6 Eoghan Casey, "Handbook of Computer Crime Investigation: Forensic Tools & Technology", Academic Press , Oct 2001.
7 Braian Carrier, "Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers, International Journal of Digital Evidence", Vol 1, Issue 4,. Winder 2003.
8 Gray Palner. "A Road Map for Digital Forensics Research. Technical Report DTR-T001-01. DFRWS", Report From the Fiest Digital Forensic Reserch Workshop(DFWS), November 2001.