Digital Evidence Protection Methods Preserving User Privacy
碩士 === 長庚大學 === 資訊管理學系 === 100 === The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the o...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49129785248263456663 |
id |
ndltd-TW-100CGU05396035 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100CGU053960352015-10-13T21:28:02Z http://ndltd.ncl.edu.tw/handle/49129785248263456663 Digital Evidence Protection Methods Preserving User Privacy 具隱私保護之數位證據保全方法 Ming Tsung Hung 洪銘聰 碩士 長庚大學 資訊管理學系 100 The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the operating procedures and other legal norms are proposed by domestic scholars or foreign scholars to protect the integrity of the digital evidence, but still unable to put forward real and strong proof effectively when be challenged. According to analysis the process of the preservation of the digital evidence, four problems need to be investigated:(1) the privacy of the judicial investigators, (2) key exposure, (3) the registry may be invaded or internal attack and (4) how to enhance the potency of the digital evidences in the court. According to the process of digital forensic and problems, we propose five methods:(1) an identity-based key-insulated encryption scheme without trusty privacy key generator(PKG), (2) an identity-based key-insulated signature scheme without trusty PKG, (3) an identity-based key-insulated multi-signature scheme without trusty PKG, (4) an identity-based key-insulated group signature scheme without trusty PKG and (5) an identity-based key-insulated groupmuti-signature scheme without trust PKG. According to the study of digital evidence protection methods preserving user privacy can provide perfection safety of digital evidences and put forward real and strong proof effectively when be challenged. C. L. Hsu 許建隆 2012 學位論文 ; thesis 138 |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 資訊管理學系 === 100 === The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the operating procedures and other legal norms are proposed by domestic scholars or foreign scholars to protect the integrity of the digital evidence, but still unable to put forward real and strong proof effectively when be challenged.
According to analysis the process of the preservation of the digital evidence, four problems need to be investigated:(1) the privacy of the judicial investigators, (2) key exposure, (3) the registry may be invaded or internal attack and (4) how to enhance the potency of the digital evidences in the court. According to the process of digital forensic and problems, we propose five methods:(1) an identity-based key-insulated encryption scheme without trusty privacy key generator(PKG), (2) an identity-based key-insulated signature scheme without trusty PKG, (3) an identity-based key-insulated multi-signature scheme without trusty PKG, (4) an identity-based key-insulated group signature scheme without trusty PKG and (5) an identity-based key-insulated groupmuti-signature scheme without trust PKG.
According to the study of digital evidence protection methods preserving user privacy can provide perfection safety of digital evidences and put forward real and strong proof effectively when be challenged.
|
author2 |
C. L. Hsu |
author_facet |
C. L. Hsu Ming Tsung Hung 洪銘聰 |
author |
Ming Tsung Hung 洪銘聰 |
spellingShingle |
Ming Tsung Hung 洪銘聰 Digital Evidence Protection Methods Preserving User Privacy |
author_sort |
Ming Tsung Hung |
title |
Digital Evidence Protection Methods Preserving User Privacy |
title_short |
Digital Evidence Protection Methods Preserving User Privacy |
title_full |
Digital Evidence Protection Methods Preserving User Privacy |
title_fullStr |
Digital Evidence Protection Methods Preserving User Privacy |
title_full_unstemmed |
Digital Evidence Protection Methods Preserving User Privacy |
title_sort |
digital evidence protection methods preserving user privacy |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/49129785248263456663 |
work_keys_str_mv |
AT mingtsunghung digitalevidenceprotectionmethodspreservinguserprivacy AT hóngmíngcōng digitalevidenceprotectionmethodspreservinguserprivacy AT mingtsunghung jùyǐnsībǎohùzhīshùwèizhèngjùbǎoquánfāngfǎ AT hóngmíngcōng jùyǐnsībǎohùzhīshùwèizhèngjùbǎoquánfāngfǎ |
_version_ |
1718064565053292544 |