Digital Forensic Framework for Protecting Data Privacy during Investigation

Authors

  • Suvarna Chaure Ramrao Adik Institute of Technology
  • Vanita Mane Ramrao Adik Institute of Technology

DOI:

https://doi.org/10.4108/eetsis.4002

Keywords:

Privacy preservation, Digital Forensics, Machine Learning

Abstract

Rapid technological breakthroughs, a surge in the use of digital devices, and the enormous amount of data that these devices can store continuously put the state of digital forensic investigation to the test. The prevention of privacy breaches during a digital forensic investigation is a significant challenge even though data privacy protection is not a performance metric. This research offered solutions to the problems listed above that centre on the efficiency of the investigative process and the protection of data privacy. However, it’s still an open problem to find a way to shield data privacy without compromising the investigator's talents or the investigation's overall efficiency. This system proposes an efficient digital forensic investigation process which enhances validation, resulting in more transparency in the inquiry process. Additionally, this suggested approach uses machine learning techniques to find the most pertinent sources of evidence while protecting the privacy of non-evidential private files.

Author Biography

Suvarna Chaure, Ramrao Adik Institute of Technology

SIES Graduate School of Technology

References

Pollitt, M. (2010). A History of Digital Forensics. In: Chow, KP., Shenoi, S. (eds) Advances in Digital Forensics VI. Digital Forensics 2010. IFIP Advances in Information and Communication Technology, vol 337. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15506-2_1

Donn B. Parker. 2003. Computer crime. Encyclopedia of Computer Science. John Wiley and Sons Ltd., GBR, 349–353.

Mark M. Pollitt. Computer Forensics: an Approach to Evidence in Cyberspace. In Proceedings of the National Information Systems Security Conference, volume 2, pages 487–491, 1995.

Gary Palmer. A Road Map for Digital Forensic Research. In First Digital Forensic Research Workshop, Utica, New York, pages 27–30, 2001.

Brian D. Carrier and Eugene H. Spafford. Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, 2(2):1–20, 2003.

Mocas, Sarah. (2004). Building theoretical underpinnings for digital forensics research. Digital Investigation. 1. 61-68. 10.1016/j.diin.2003.12.004.

Gong Ruibin, T. Yun, and M. Gaertner. Case-relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework. International Journal of Digital Evidence, 4(1):147–67, 2005.

Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, and Steve Debrota. Computer Forensics Field Triage Process Model. Journal of Digital Forensics, Security and Law, 1(2):19–38, 2006

Wynand van Staden. Protecting Third Party Privacy in Digital Forensic Investigations. In Gilbert Peterson and Sujeet Shenoi, editors, Advances in Digital Forensics IX, pages 19–31. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013

Ali Dehghantanha and Katrin Franke. Privacy-respecting Digital Investigation. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pages 129–138, July 2014.

Waleed Halboob, Ramlan Mahmod, Nur Izura Udzir, and Mohd. Taufik Abdullah. Privacy levels for computer forensics: Toward a more efficient privacy-preserving investigation. Procedia Computer Science, 56:370– 375, 2015.

Asou Aminnezhad, Ali Dehghantanha, and Mohd Taufik Abdullah. A survey on privacy issues in digital forensics. International Journal of Cyber-Security and Digital Forensics, 1(4):311–324, 2012.

S. Srinivasan. Security and privacy vs. computer forensics capabilities. Information Systems Control Journal, 4:1–3, 2007.

Bilal Shebaro and Jedidiah R. Crandall. Privacy-preserving Network Flow Recording. Digital Investigation, 8:S90 – S100, 2011. The Proceedings of the Eleventh Annual DFRWS Conference.

Alec Yasinsac and Yanet Manzano. Policies to Enhance Computer and Network Forensics. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. 2001

Shahzad Saleem, Oliver Popov, and Ibrahim Bagilli. Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35:812–821, 2014.

Shuhui Hou, Tetsutaro Uehara, S. M. Yiu, Lucas C. K. Hui, and K. P. Chow. Privacy preserving multiple keyword search for confidential investigation of remote forensics. In Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security, MINES ’11, page 595–599, USA, 2011. IEEE Computer Society.

Shuhui Hou, Siu-Ming Yiuy, Tetsutaro Ueharaz, and Ryoichi Sasakix. A privacy-preserving approach for collecting evidence in forensic investigation. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1):70–78, 2013.

Philip Turner. Selective and intelligent imaging using digital evidence bags. Digital Investigation, 3:59–64, 2006.

Johannes Stuttgen, Andreas Dewald, and Felix C. Freiling. Selective ¨ imaging revisited. In Holger Morgenstern, editor, Seventh International Conference on IT Security Incident Management and IT Forensics (IMF), 2013, pages 45–58, Piscataway, NJ, 2013. IEEE.

Jonathan Grier and Golden G. Richard. Rapid forensic imaging of large disks with sifting collectors. Digital Investigation, 14:34–44, 2015.

Christian Zoubek and Konstantin Sack. Selective deletion of nonrelevant data. Digital Investigation, 20:92–98, 2017.

Susan Dumais, John Platt, David Heckerman, and Mehran Sahami. Inductive learning algorithms and representations for text categorization. In Niki Pissinou, editor, Proceedings of the seventh international conference on Information and knowledge management, pages 148–155, New York, NY, 1998. ACM.

Han-Joon Kim and Sang-Goo Lee. A semi-supervised document clustering technique for information organization. In Arvin Agah, editor, Proceedings of the ninth international conference on Information and knowledge management, pages 30–37, New York, NY, 2000. ACM.

Gaby G. Dagher and Benjamin C.M. Fung. Subject-based semantic document clustering for digital forensic investigations. Data & Knowledge Engineering, 86:224–241, 2013

Ana Nieto, Ruben Rios, Javier Lopez, Wei Ren, Lizhe Wang, KimKwang Raymond Choo, and Fatos Xhafa. Privacy-aware digital forensics. Computing. Institution of Engineering and Technology, 2019.

Pandey, Abhishek Kumar,et al. "Current Challenges of Digital Forensics in Cyber Security." Critical Concepts, Standards, and Techniques in Cyber Forensics, edited by Mohammad Shahid Husain and Mohammad Zunnun Khan, IGI Global, 2020.

Advances in Digital Forensics XV, 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019

Ferguson, I., Renaud, K., Wilford, S., Irons, A., (2019) PRECEPT: A Framework for Ethical Digital Forensics. Investigations. Journal of Intellectual Capital, 20(7), ISSN : 1469-1930

M. Bas Seyyar, Z.J.M.H. Geradts, Privacy impact assessment in large-scale digital forensic investigations, Forensic Science International: Digital Investigation, Volume 33, 2020, 200906, ISSN 2666-2817.

Abulaish, Muhammad,et al. "P2DF: A Privacy-Preserving Digital Forensics Framework." IJDCF vol.13, no.6 2021: pp.1-15.

Ludwig Englbrecht and Günther Pernul. 2021. A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES '20). Association for Computing Machinery, New York, NY, USA, Article 58, 1–10. DOI:https://doi.org/10.1145/3407023.3407064.

Hussein Ismael Sahib, Mustafa Qahatan AlSudani, Mohammed Hasan Ali, Haydar Qassim Abbas, Kohbalan Moorthy, Myasar Mundher Adnan, Proposed intelligence systems based on digital Forensics: Review paper, Materials Today: Proceedings,2021

Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm, Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments, Forensic Science International: Reports, Volume 2, 2020.

Nampoothiri, A. P., & Madhavu, M. L. (2015). Email forensic analysis based on k- means clustering. 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). doi:10.1109/icacci.2015.7275710

Ayush Kumar Verma, Krishnan Ramanathan; Data privacy preservation in digital forensics investigation. AIP Conference Proceedings 3 October 2022; 2519 (1): 030051. https://doi.org/10.1063/5.0109813

M. Bas Seyyar, Z.J.M.H. Geradts, Privacy impact assessment in large-scale digital forensic investigations, Forensic Science International: Digital Investigation, Volume 33, 2020, ISSN 2666-2817.

Downloads

Published

27-09-2023

How to Cite

1.
Chaure S, Mane V. Digital Forensic Framework for Protecting Data Privacy during Investigation. EAI Endorsed Scal Inf Syst [Internet]. 2023 Sep. 27 [cited 2024 Jun. 23];11(2). Available from: https://publications.eai.eu/index.php/sis/article/view/4002