http://iet.metastore.ingenta.com
1887

Privacy-aware digital forensics

Privacy-aware digital forensics

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Digital forensics and privacy are the two naturally conflicting concepts. While privacy can be defined as the desire of people to decide for themselves when, how and to what extent their personal information is shared with others, digital forensics is aimed at acquiring and analysing relevant data from devices in the scope of digital forensic investigations, following a set of procedures to comply legal proceedings. Digital forensic investigations are usually carried out after seizing the devices from investigated suspects or third parties, who consequently lose control over the data being accessed by the investigator. Moreover, digital forensic tools are even capable of retrieving information which is apparently no longer present in the device because the user decided to delete it. These tools also have the ability of correlating information from different sources giving rise to new actors in the investigation whose privacy can be affected. Also, the lack of context to determine when and why the user intentionally deleted some of the contents may result in wrong accusations. All things considered, even when digital investigations are conducted by responsible professionals, the data collected from personal devices may result in dreadful invasions to individual privacy. Inevitably, this leads to a controversial debate on the need for strong privacy guarantees in the context of digital forensics. This chapter aims to shed some light into this imperative and highly demanded debate given the fundamental role that the user and his/her personal data play in current and future digital investigations.

Chapter Contents:

  • 8.1 Introduction
  • 8.2 Digital forensics
  • 8.2.1 Evolution of digital forensics
  • 8.2.2 Digital forensics rules
  • 8.2.2.1 Digital forensics principles
  • 8.2.2.2 Digital forensics standards
  • 8.2.3 Digital forensics challenges
  • 8.3 Digital privacy
  • 8.3.1 Evolution of digital privacy
  • 8.3.2 Privacy protection
  • 8.3.2.1 Privacy laws
  • 8.3.2.2 Privacy principles
  • 8.3.2.3 Privacy standards
  • 8.3.3 Privacy challenges in digital forensics
  • 8.4 Law, privacy and digital forensics
  • 8.5 Privacy-aware computer forensics
  • 8.5.1 Database
  • 8.5.1.1 Access control
  • 8.5.1.2 Secure erasure
  • 8.5.2 Computer
  • 8.5.2.1 Frameworks and policies
  • 8.5.2.2 Secure erasure
  • 8.5.2.3 Third-party privacy breach
  • 8.6 Privacy-aware network forensics
  • 8.6.1 Server
  • 8.6.1.1 Revocable anonymity
  • 8.6.1.2 Searchable encryption
  • 8.6.2 Networks
  • 8.6.2.1 Traffic capture
  • 8.6.2.2 Traffic analysis
  • 8.6.3 Browser and applications
  • 8.7 Beyond computer and network forensics
  • 8.7.1 Mobile
  • 8.7.2 Cloud
  • 8.7.3 Internet of Things
  • 8.8 Conclusions and final remarks
  • References

Inspec keywords: digital forensics; information retrieval; data privacy

Other keywords: personal information; digital forensic investigations; privacy-aware digital forensics; individual privacy; personal devices; future digital investigations; strong privacy guarantees; digital forensic tools

Subjects: Information retrieval techniques; Data security

Preview this chapter:
Zoom in
Zoomout

Privacy-aware digital forensics, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch8-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch8-2.gif

Related content

content/books/10.1049/pbpc028e_ch8
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address