ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

APPLICATION OF SECRET SHARING TECHNIQUES ON CONFIDENTIAL FORENSIC INVESTIGATION

Proceeding: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)

Publication Date:

Authors : ;

Page : 69-76

Keywords : Confidential Forensic In vestigation; Secret Sharing; Chinese Remainder Theorem; Application of Cryptographic Schemes; Third-Party Neutral;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

How to capture digital evidence is crucial for counteracting against the computer and cyber crimes. However, in a large sharing system (e.g. in a data center or even in a cloud system), cloning the whole set of data for investigation is not feasible and also may have conflict with privacy issues as most of the data is not relevant to the crime. The problem is how to retrieve the relevant information without the investigator knowing other irrelevant data while the server administrator does not know what the investigator is searching. To solve this problem, Hou et al. tried to model the problem as a secure keyword searching problem and proposed a few encryption-based schemes. While the schemes are theoretically sound, the efficiency is a concern. In this paper, we solve the same problem using secret sharing schemes and show that the efficiency can be greatly improved, thus making it practical. We demonstrate the advantages of our solution in terms of computational complexity analysis and experiments. The experimental results show that our solution is much faster in searching and processing the relevant data, so is superior to the existing work.

Last modified: 2013-06-18 22:05:50