APPLICATION OF SECRET SHARING TECHNIQUES ON CONFIDENTIAL FORENSIC INVESTIGATION
Proceeding: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)Publication Date: 2013-03-04
Authors : Shuhui Hou Siuming Yiuy Tetsutaro Ueharaz Ryoichi Sasakix;
Page : 69-76
Keywords : Confidential Forensic In vestigation; Secret Sharing; Chinese Remainder Theorem; Application of Cryptographic Schemes; Third-Party Neutral;
Abstract
How to capture digital evidence is crucial for counteracting against the computer and cyber crimes. However, in a large sharing system (e.g. in a data center or even in a cloud system), cloning the whole set of data for investigation is not feasible and also may have conflict with privacy issues as most of the data is not relevant to the crime. The problem is how to retrieve the relevant information without the investigator knowing other irrelevant data while the server administrator does not know what the investigator is searching. To solve this problem, Hou et al. tried to model the problem as a secure keyword searching problem and proposed a few encryption-based schemes. While the schemes are theoretically sound, the efficiency is a concern. In this paper, we solve the same problem using secret sharing schemes and show that the efficiency can be greatly improved, thus making it practical. We demonstrate the advantages of our solution in terms of computational complexity analysis and experiments. The experimental results show that our solution is much faster in searching and processing the relevant data, so is superior to the existing work.
Other Latest Articles
- AN ENTERPRISE-GRADE SECURE DATA STORAGE AND SHARING SYSTEM
- A PROPOSAL AND IMPLEMENTATION OF THE SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD USING TWO SHIFT FUNCTIONS
- DIGITAL VIDEO WATERMARKING ON CLOUD COMPUTING ENVIRONMENTS
- EPSILON2 VIRTUAL INFORMATION SECURITY TESTING SYSTEM MARK II
- A MULTI-SERVERS REMOTE USER AUTHENTICATION SCHEME USING A SMARTER SMART CARD
Last modified: 2013-06-18 22:05:50