2022
DOI: 10.1109/access.2022.3151403
|View full text |Cite
|
Sign up to set email alerts
|

Secure Storage Model for Digital Forensic Readiness

Abstract: Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environment and access to the evidence are secure. Attackers can go to extreme lengths to cover up their tracks, which is a serious concern to digital forensics particularly digital forensic readiness. If an attacker gains access to the location where evidence is stored, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…We added categories to cover incident phases described in Section IV-C, i.e., Access Control, Anomaly Detection, Phenomenon Evaluation, Stopping from Propagating, Self-Adaptiveness, and Evidence. For each category, we went through existing studies and other sources [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57] to examine the completeness of the coverage by the standards and complement the missing pieces. All these recommendations were again validated against our inclusion and exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We added categories to cover incident phases described in Section IV-C, i.e., Access Control, Anomaly Detection, Phenomenon Evaluation, Stopping from Propagating, Self-Adaptiveness, and Evidence. For each category, we went through existing studies and other sources [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57] to examine the completeness of the coverage by the standards and complement the missing pieces. All these recommendations were again validated against our inclusion and exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
“…Evidence [33], [54] All evidence data are secured. Evidence, Encryption [56], [57] Evidence storage is reliable. Evidence [55] a) Access Control: Access control ensures that data cannot be changed or read by unauthorized entities.…”
Section: B Tagsmentioning
confidence: 99%
“…The SDCA [28] tool is designed to perform the analysis of the differences automatically between two versions of SQL schema, in addition to its ability to analyze the query. In [29]aid forensic investigation in general, by developing a model and a platform to secure potential digital evidence, the SecureRS model can help to prevent unauthorized access and comply with regulations and privacy policies, the result shows a method of ensuring forensically sound digital evidence for DFR as well as for digital forensics processes in general. In [7] the authors discussed the tools used to acquire the data from iOS or Android devices for both rooted and jailbreak mobile; the results have shown that the XRY software tool can recover deleted materials and can be able to extract all the data from the phone but it cannot retrieve deleted data for not jailbroken iPhone,…”
Section: ) Mobile Forensics Toolsmentioning
confidence: 99%
“…It is also referred to as infrastructure readiness 21 . The addressed controls are aimed toward, for example, evidence storage 22,23 and evidence integrity 24 . In the latter, blockchain‐based solutions have gained prominence recently 25,26 .…”
Section: Related Workmentioning
confidence: 99%