Skip to main content
Erschienen in: Electronic Commerce Research 3/2013

01.09.2013

A framework for unified digital evidence management in security convergence

verfasst von: Kyung-Soo Lim, Changhoon Lee

Erschienen in: Electronic Commerce Research | Ausgabe 3/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital Forensics is being actively researched and performed in various areas against changing IT environment such as mobile phone, e-commerce, cloud service and video surveillance. Moreover, it is necessary to research unified digital evidence management for correlation analysis from diverse sources. Meanwhile, various triage approaches have been developed to cope with the growing amount of digital evidence being encountered in criminal cases, enterprise investigations and military contexts. Despite of debating over whether triage inspection is necessary or not, it will be essential to develop a framework for managing scattered digital evidences. This paper presents a framework with unified digital evidence management for appropriate security convergence, which is based on triage investigation. Moreover, this paper describes a framework in network video surveillance system to shows how it works as an unified evidence management for storing diverse digital evidences, which is a good example of security convergence.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69. CrossRef Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69. CrossRef
2.
Zurück zum Zitat Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383–400. CrossRef Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383–400. CrossRef
3.
Zurück zum Zitat Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456. CrossRef Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456. CrossRef
4.
Zurück zum Zitat Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223. CrossRef Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223. CrossRef
5.
Zurück zum Zitat Lim, K.-S., Park, J., Lee, C., & Lee, S. (2011). A new proposal for a digital evidence container for triage investigation. In ICCSCE’11. Lim, K.-S., Park, J., Lee, C., & Lee, S. (2011). A new proposal for a digital evidence container for triage investigation. In ICCSCE’11.
6.
Zurück zum Zitat Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrot, S. (2006). Computer forensics field triage process model. In Conference on digital forensics, security and law. Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrot, S. (2006). Computer forensics field triage process model. In Conference on digital forensics, security and law.
7.
Zurück zum Zitat Richard, G. G. III, Roussev, V., & Marziale, L. (2007). Forensic discovery auditing of digital evidence containers. Digital Investigation, 4, 88–97. CrossRef Richard, G. G. III, Roussev, V., & Marziale, L. (2007). Forensic discovery auditing of digital evidence containers. Digital Investigation, 4, 88–97. CrossRef
8.
Zurück zum Zitat Lim, K.-s., Lee, S., & Lee, S. (2009). Applying a stepwise forensic approach to incident response and computer usage analysis. In 2nd international conference on computer science and its application (CSA 2009). Lim, K.-s., Lee, S., & Lee, S. (2009). Applying a stepwise forensic approach to incident response and computer usage analysis. In 2nd international conference on computer science and its application (CSA 2009).
9.
Zurück zum Zitat Turner, P. (2005). Unification of digital evidence from disparate sources (digital evidence bags). Digital Investigation, 2(3), 223–228. CrossRef Turner, P. (2005). Unification of digital evidence from disparate sources (digital evidence bags). Digital Investigation, 2(3), 223–228. CrossRef
10.
Zurück zum Zitat Turner, P. (2006). Selective and intelligent imaging using digital evidence bags. Digital Investigation, 3 Supplement, 59–64. CrossRef Turner, P. (2006). Selective and intelligent imaging using digital evidence bags. Digital Investigation, 3 Supplement, 59–64. CrossRef
11.
Zurück zum Zitat Turner, P. (2007). Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation, 4(1), 30–35. CrossRef Turner, P. (2007). Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation, 4(1), 30–35. CrossRef
14.
Zurück zum Zitat Chang, K., Chen, C., Chen, J., & Chao, H. (2010). Challenges to next generation services in IP multimedia subsystem. Journal of Information Processing Systems, 6(2), 129–146. CrossRef Chang, K., Chen, C., Chen, J., & Chao, H. (2010). Challenges to next generation services in IP multimedia subsystem. Journal of Information Processing Systems, 6(2), 129–146. CrossRef
16.
Zurück zum Zitat Satone, M., & Kharate, D. G. (2012). Face Recognition based on PCA on wavelet subband of average-half-face. Journal of Information Processing Systems, 8(3), 483–494. CrossRef Satone, M., & Kharate, D. G. (2012). Face Recognition based on PCA on wavelet subband of average-half-face. Journal of Information Processing Systems, 8(3), 483–494. CrossRef
17.
Zurück zum Zitat Nagi, G. M., Rahmat, R., Khalid, F., & Taufik, M. (2013). Region-based facial expression recognition in still images. Journal of Information Processing Systems, 9(1), 173. CrossRef Nagi, G. M., Rahmat, R., Khalid, F., & Taufik, M. (2013). Region-based facial expression recognition in still images. Journal of Information Processing Systems, 9(1), 173. CrossRef
18.
Zurück zum Zitat Ghimire, D., & Lee, J. (2013). A robust face detection method based on skin color and edges. Journal of Information Processing Systems, 9(1), 141–156. CrossRef Ghimire, D., & Lee, J. (2013). A robust face detection method based on skin color and edges. Journal of Information Processing Systems, 9(1), 141–156. CrossRef
21.
Zurück zum Zitat Lim, K.-S., & Lee, C. (2012). Applying forensic approach to live investigation using XeBag. In Computer science and its applications. Lim, K.-S., & Lee, C. (2012). Applying forensic approach to live investigation using XeBag. In Computer science and its applications.
Metadaten
Titel
A framework for unified digital evidence management in security convergence
verfasst von
Kyung-Soo Lim
Changhoon Lee
Publikationsdatum
01.09.2013
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2013
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-013-9119-y

Weitere Artikel der Ausgabe 3/2013

Electronic Commerce Research 3/2013 Zur Ausgabe