Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems 2014
DOI: 10.1145/2598918.2598922
|View full text |Cite
|
Sign up to set email alerts
|

Secure streaming forensic data transmission for trusted cloud

Abstract: The proliferation of cloud computing requires excessive forensic data to be acquired, transmitted, and analyzed in a timely manner. However, current digital forensic technology is ill-suited to cloud as it exposes the problems of trusted data acquisition and secure data transmission. In this paper, we present a novel scheme that secure forensic data collection and transmission. Our scheme allows forensic investigator to authenticate custodies by remotely attesting the platform that is run by custodies. To expe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 26 publications
(26 reference statements)
0
1
0
Order By: Relevance
“…Large amounts of data may require reliable cloud space as well as a unified algorithm for checking the integrity of streaming data, which allows authorized users to verify the integrity of forensic data and identify and localize any malicious information changes [11].…”
Section: Blockchain Technologies In Digital Forensic Logisticsmentioning
confidence: 99%
“…Large amounts of data may require reliable cloud space as well as a unified algorithm for checking the integrity of streaming data, which allows authorized users to verify the integrity of forensic data and identify and localize any malicious information changes [11].…”
Section: Blockchain Technologies In Digital Forensic Logisticsmentioning
confidence: 99%