A survey on privacy impacts of digital investigation

Digital forensics is becoming more and more demanding as computers evolve into different platforms and penetrate different industries. The usage of computers in today’s society has covered in vast areas and are implemented in fields where the most sensitive information are stored and accessed for various operations. This paper will look into developmental trends of applications of digital forensics and security in various aspects within the span of 7 years based on critical review and statistical analysis, and then contribute the results of significant change and shift of focus in digital forensics development. Then, a discussion will be made on privacy concerns, whether the current development trend is paying more attention to privacy preservation or harsh forensic investigation techniques that usually result in compromised personal information.

[1]  Tim McGuire,et al.  Using the DC3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course , 2008 .

[2]  Jeroen Keppens,et al.  Compositional Bayesian modelling for computation of evidence collection strategies , 2011, Applied Intelligence.

[3]  Matthias Kirschner,et al.  Detecting Suspicious Relational Database Queries , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[4]  Shen Wang,et al.  Hiding traces of double compression in JPEG images based on Tabu Search , 2012, Neural Computing and Applications.

[5]  Dario V. Forte Advances in Onion Routing: Description and backtracing/investigation problems , 2006, Digit. Investig..

[6]  Muddassar Farooq,et al.  ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables , 2011, Knowledge and Information Systems.

[7]  Hein S. Venter,et al.  A Forensic Framework for Handling Information Privacy Incidents , 2009, IFIP Int. Conf. Digital Forensics.

[8]  Michail Vlachos,et al.  Real-time creation of bitmap indexes on streaming network data , 2011, The VLDB Journal.

[9]  E. A. Edirisinghe,et al.  Real-time automatic license plate recognition for CCTV forensic applications , 2013, Journal of Real-Time Image Processing.

[10]  Sangjin Lee,et al.  A study on multimedia file carving method , 2011, Multimedia Tools and Applications.

[11]  Tim Storer,et al.  Electronic retention: what does your mobile phone reveal about you? , 2011, International Journal of Information Security.

[12]  Ali Dehghantanha,et al.  A survey about impacts of cloud computing on digital forensics , 2013 .

[13]  Martin S. Olivier,et al.  Sequenced release of privacy-accurate information in a forensic investigation , 2010, Digit. Investig..

[14]  Ali Dehghantanha,et al.  Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[15]  Charles W. Adams Legal Issues Pertaining to the Development of Digital Forensic Tools , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.

[16]  Huwida Said,et al.  Forensic analysis of private browsing artifacts , 2011, 2011 International Conference on Innovations in Information Technology.

[17]  Ali Dehghantanha,et al.  A review on impacts of cloud computing and digital forensics , 2014 .

[18]  Markus Jakobsson,et al.  Cryptographic Approaches to Provacy in Forensic DNA Databases , 2000, Public Key Cryptography.

[19]  Dimitris Geneiatakis,et al.  PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies , 2006, Communications and Multimedia Security.

[20]  José R. Agustina,et al.  Challenges before crime in a digital era: Outsmarting cybercrime offenders - Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society , 2011, Comput. Law Secur. Rev..

[21]  Gerome Miklau,et al.  Threats to privacy in the forensic analysis of database systems , 2007, SIGMOD '07.

[22]  Ali Dehghantanha,et al.  Greening Digital Forensics: Opportunities and Challenges , 2011, SPIT/IPC.

[23]  Ali Dehghantanha,et al.  Defusing the Hazards of Social Network Services , 2011 .

[24]  J. Doug Tygar,et al.  Privacy in Sensor Webs and Distributed Information Systems , 2002, ISSS.

[25]  Claudio Soriente,et al.  Security and privacy issues in the Portable Document Format , 2010, J. Syst. Softw..

[26]  Sangjin Lee,et al.  A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.

[27]  Ali Dehghantanha,et al.  Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.

[28]  Ankush Mittal,et al.  OS-Guard: on-site signature based framework for multimedia surveillance data management , 2010, Multimedia Tools and Applications.

[29]  Jedidiah R. Crandall,et al.  Privacy-preserving network flow recording , 2011 .

[30]  Ali Dehghantanha Xml-Based Privacy Model in Pervasive Computing , 2008 .

[31]  Ali Dehghantanha,et al.  User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .

[32]  Emilio Ferrara,et al.  Forensic analysis of phone call networks , 2012, Social Network Analysis and Mining.

[33]  Ali Dehghantanha,et al.  A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.

[34]  Michail Vlachos,et al.  Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic , 2010, Proc. VLDB Endow..

[35]  Siu-Ming Yiu,et al.  Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[36]  Martin Boldt,et al.  Analysing Countermeasures Against Privacy-Invasive Software , 2006, 2006 International Conference on Software Engineering Advances (ICSEA'06).

[37]  Ahmad-Reza Sadeghi,et al.  A Forensic Framework for Tracing Phishers , 2007, FIDIS.

[38]  Siu-Ming Yiu,et al.  Protecting Digital Data Privacy in Computer Forensic Examination , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[39]  Ali Dehghantanha,et al.  Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[40]  Ying Zhu,et al.  Attack Pattern Discovery in Forensic Investigation of Network Attacks , 2011, IEEE Journal on Selected Areas in Communications.

[41]  Hae-Yeoun Lee,et al.  Color laser printer forensic based on noisy feature and support vector machine classifier , 2013, Multimedia Tools and Applications.

[42]  Ramlan Mahmoud,et al.  Digital forensics trends and future , 2013 .

[43]  Yong-Rak Choi,et al.  A study on block-based recovery of damaged digital forensic evidence image , 2011, Multimedia Tools and Applications.

[44]  Ali Dehghantanha,et al.  UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.