Title
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers
Abstract
It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be easy to clone a copy of data from the storage device(s) due to the huge volume of data. Even if it is possible to make a clone, there are many irrelevant information/data stored in the same device for which the investigators have no right to access. The other alternative is to let the service provider search the relevant information and retrieve the data for the investigator provided a warrant can be provided. However, sometimes, due to the confidentiality of the crime, the investigator may not want the service provider to know what information they are looking for or the service provider herself may be one of the suspects. The problem becomes even more obvious in terms of cloud computing technology. In this paper, we address this problem and using homomorphic encryption and commutative encryption, we provide two forensically sound schemes to solve the problem so that the investigators can obtain the necessary evidence while the privacy of other users can be protected and at the same time, the service provider cannot know what information the investigators are interested in.
Year
DOI
Venue
2011
10.1109/IIHMSP.2011.28
IIH-MSP
Keywords
Field
DocType
relevant information,party data service provider,cloud computing technology,storage device,data privacy,cryptography,homomorphic encryption,search on encrypted data,confidential forensic investigation,remote servers,computer forensics,service provider,data retrieval,irrelevant information,privacy preserving forensics,shared server,commutative encryption,big problem,cloud computing,different user,privacy preserving confidential forensic,user privacy,remote server,third party data service provider,forensics,polynomials,servers,computing technology,encryption,databases
Client-side encryption,Internet privacy,Computer forensics,Computer science,Computer security,Server,Encryption,Service provider,Information privacy,Data as a service,Cloud computing
Conference
ISBN
Citations 
PageRank 
978-1-4577-1397-2
12
0.97
References 
Authors
7
5
Name
Order
Citations
PageRank
Shuhui Hou1163.48
Tetsutaro Uehara24814.20
S. M. Yiu3131.37
Lucas C. K. Hui4833110.97
Kam-Pui Chow528339.82