Digital Evidence Protection Methods Preserving User Privacy

碩士 === 長庚大學 === 資訊管理學系 === 100 === The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the o...

Full description

Bibliographic Details
Main Authors: Ming Tsung Hung, 洪銘聰
Other Authors: C. L. Hsu
Format: Others
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/49129785248263456663
id ndltd-TW-100CGU05396035
record_format oai_dc
spelling ndltd-TW-100CGU053960352015-10-13T21:28:02Z http://ndltd.ncl.edu.tw/handle/49129785248263456663 Digital Evidence Protection Methods Preserving User Privacy 具隱私保護之數位證據保全方法 Ming Tsung Hung 洪銘聰 碩士 長庚大學 資訊管理學系 100 The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the operating procedures and other legal norms are proposed by domestic scholars or foreign scholars to protect the integrity of the digital evidence, but still unable to put forward real and strong proof effectively when be challenged. According to analysis the process of the preservation of the digital evidence, four problems need to be investigated:(1) the privacy of the judicial investigators, (2) key exposure, (3) the registry may be invaded or internal attack and (4) how to enhance the potency of the digital evidences in the court. According to the process of digital forensic and problems, we propose five methods:(1) an identity-based key-insulated encryption scheme without trusty privacy key generator(PKG), (2) an identity-based key-insulated signature scheme without trusty PKG, (3) an identity-based key-insulated multi-signature scheme without trusty PKG, (4) an identity-based key-insulated group signature scheme without trusty PKG and (5) an identity-based key-insulated groupmuti-signature scheme without trust PKG. According to the study of digital evidence protection methods preserving user privacy can provide perfection safety of digital evidences and put forward real and strong proof effectively when be challenged. C. L. Hsu 許建隆 2012 學位論文 ; thesis 138
collection NDLTD
format Others
sources NDLTD
description 碩士 === 長庚大學 === 資訊管理學系 === 100 === The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the operating procedures and other legal norms are proposed by domestic scholars or foreign scholars to protect the integrity of the digital evidence, but still unable to put forward real and strong proof effectively when be challenged. According to analysis the process of the preservation of the digital evidence, four problems need to be investigated:(1) the privacy of the judicial investigators, (2) key exposure, (3) the registry may be invaded or internal attack and (4) how to enhance the potency of the digital evidences in the court. According to the process of digital forensic and problems, we propose five methods:(1) an identity-based key-insulated encryption scheme without trusty privacy key generator(PKG), (2) an identity-based key-insulated signature scheme without trusty PKG, (3) an identity-based key-insulated multi-signature scheme without trusty PKG, (4) an identity-based key-insulated group signature scheme without trusty PKG and (5) an identity-based key-insulated groupmuti-signature scheme without trust PKG. According to the study of digital evidence protection methods preserving user privacy can provide perfection safety of digital evidences and put forward real and strong proof effectively when be challenged.
author2 C. L. Hsu
author_facet C. L. Hsu
Ming Tsung Hung
洪銘聰
author Ming Tsung Hung
洪銘聰
spellingShingle Ming Tsung Hung
洪銘聰
Digital Evidence Protection Methods Preserving User Privacy
author_sort Ming Tsung Hung
title Digital Evidence Protection Methods Preserving User Privacy
title_short Digital Evidence Protection Methods Preserving User Privacy
title_full Digital Evidence Protection Methods Preserving User Privacy
title_fullStr Digital Evidence Protection Methods Preserving User Privacy
title_full_unstemmed Digital Evidence Protection Methods Preserving User Privacy
title_sort digital evidence protection methods preserving user privacy
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/49129785248263456663
work_keys_str_mv AT mingtsunghung digitalevidenceprotectionmethodspreservinguserprivacy
AT hóngmíngcōng digitalevidenceprotectionmethodspreservinguserprivacy
AT mingtsunghung jùyǐnsībǎohùzhīshùwèizhèngjùbǎoquánfāngfǎ
AT hóngmíngcōng jùyǐnsībǎohùzhīshùwèizhèngjùbǎoquánfāngfǎ
_version_ 1718064565053292544