publication . Article . Other literature type . 2018

IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

Ana Nieto; Ruben Rios; Javier Lopez;
Open Access English
  • Published: 01 Feb 2018 Journal: Sensors (Basel, Switzerland), volume 18, issue 2 (eissn: 1424-8220, Copyright policy)
  • Publisher: MDPI
Abstract
IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to d...
Subjects
free text keywords: Article, IoT-forensics, digital witness, privacy, Chemical technology, TP1-1185
22 references, page 1 of 2

Oriwoh, E.; Sant, P. The forensics edge management system: A concept and design. In Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), Vietri sul Mere, Italy, 18-21 December 2013; pp. 544-550.

Nieto, A.; Roman, R.; Lopez, J. Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices. IEEE Netw. 2016, 30, 34-41.

In Proceedings of the 2017 IEEE Conference on Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1-4 August 2017; pp. 642-649.

4. Nieto, A.; Rios, R.; Lopez, J. A Methodology for Privacy-Aware IoT-Forensics. In Proceedings of the 2017 IEEE Conference on Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1-4 August 2017; pp. 626-633.

5. ISO. Information Technology-Security Techniques-Privacy Framework; ISO/IEC 29100:2011 Standard; International Organization for Standardization (ISO): Geneva, Switzerland, 2011.

6. ISO. Information Technology-Security Techniques-Guidelines for the Analysis and Interpretation of Digital Evidence; ISO/IEC 27042:2015; Standard; International Organization for Standardization (ISO): Geneva, Switzerland, 2015.

7. Petrocelli, T. Data Protection and Information Lifecycle Management; Prentice Hall PTR: Upper Saddle River, NJ, USA, 2005.

8. Brickell, E.; Camenisch, J.; Chen, L. Direct Anonymous Attestation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, USA, 25-29 October 2004; ACM: New York, NY, USA, 2004; pp. 132-145.

9. Saxena, A.; Soh, B. One-Way Signature Chaining: A new paradigm for group cryptosystems. Int. J. Inf. Comput. Secur. 2008, 2, 268-296.

10. Moore, C.; O'Neill, M.; O'Sullivan, E.; Doröz, Y.; Sunar, B. Practical homomorphic encryption: A survey. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, VIC, Australia, 1-5 June 2014; pp. 2792-2795.

11. Liu, W.; Yu, M. AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments. IEEE Trans. Veh. Technol. 2014, 63, 4585-4593.

12. Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22-26 May 2016; pp. 839-858.

13. Karvelas, N.P.; Kiayias, A. Efficient Proofs of Secure Erasure. In Proceedings of the International Conference on Security and Cryptography for Networks (SCN 2014), Amalfi, Italy, 3-5 September 2014; pp. 520-537. [OpenAIRE]

14. Peng, S.; Yu, S.; Yang, A. Smartphone malware and its propagation modeling: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 925-941.

15. Afanasyev, M.; Kohno, T.; Ma, J.; Murphy, N.; Savage, S.; Snoeren, A.C.; Voelker, G.M. Privacy-preserving network forensics. Commun. ACM 2011, 54, 78-87.

22 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue