Please submit manuscripts in either of the following two submission systems

    ScholarOne Manuscripts

  • ScholarOne
  • 勤云稿件系统

  • 登录

Search by Issue

  • 2024 Vol.31
  • 2023 Vol.30
  • 2022 Vol.29
  • 2021 Vol.28
  • 2020 Vol.27
  • 2019 Vol.26
  • 2018 Vol.25
  • 2017 Vol.24
  • 2016 vol.23
  • 2015 vol.22
  • 2014 vol.21
  • 2013 vol.20
  • 2012 vol.19
  • 2011 vol.18
  • 2010 vol.17
  • 2009 vol.16
  • No.1
  • No.2

Supervised by Ministry of Industry and Information Technology of The People's Republic of China Sponsored by Harbin Institute of Technology Editor-in-chief Yu Zhou ISSNISSN 1005-9113 CNCN 23-1378/T

期刊网站二维码
微信公众号二维码
Related citation:Jingsha He,Gongzheng Liu,Bin Zhao,Xuejiao Wan.Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital Forensics[J].Journal of Harbin Institute Of Technology(New Series),2015,22(1):85-90.DOI:10.11916/j.issn.1005-9113.2015.01.014.
【Print】   【HTML】   【PDF download】   View/Add Comment  Download reader   Close
←Previous|Next→ Back Issue    Advanced Search
This paper has been: browsed 1421times   downloaded 1109times 本文二维码信息
码上扫一扫!
Shared by: Wechat More
Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital Forensics
Author NameAffiliation
Jingsha He School of Software Engineering, Beijing University of Technology, Beijing 100124, China 
Gongzheng Liu School of Software Engineering, Beijing University of Technology, Beijing 100124, China 
Bin Zhao School of Software Engineering, Beijing University of Technology, Beijing 100124, China
Dept.of Computer Science, Jining University, Qufu 273155, China
State Key Laboratory of Digital Publishing Technology, Peking University Founder Group Co.,Ltd, Beijing 100871, China 
Xuejiao Wan School of Software Engineering, Beijing University of Technology, Beijing 100124, China 
Abstract:
In forensic investigations, it is vital that the authenticity of digital evidence should be ensured. In addition, technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper, we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method, the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data, which includes the digital evidence, the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android, we can ensure the authenticity and non-misuse of data evidence in digital forensics.
Key words:  digital forensics  authenticity  non-misuse  digital evidence
DOI:10.11916/j.issn.1005-9113.2015.01.014
Clc Number:TP391
Fund:

LINKS