File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/IIHMSP.2011.28
- Scopus: eid_2-s2.0-83455164517
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Privacy preserving confidential forensic investigation for shared or remote servers
Title | Privacy preserving confidential forensic investigation for shared or remote servers |
---|---|
Authors | |
Keywords | Commutative encryption Homomorphic encryption Privacy preserving forensics Search on encrypted data Computing technology |
Issue Date | 2011 |
Publisher | IEEE, Computer Society. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001543 |
Citation | The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), Dalian, China, 14-16 October 2011. In Proceedings of the 7th IIHMSP, 2011, p. 378-383 How to Cite? |
Abstract | It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be easy to clone a copy of data from the storage device(s) due to the huge volume of data. Even if it is possible to make a clone, there are many irrelevant information/data stored in the same device for which the investigators have no right to access. The other alternative is to let the service provider search the relevant information and retrieve the data for the investigator provided a warrant can be provided. However, sometimes, due to the confidentiality of the crime, the investigator may not want the service provider to know what information they are looking for or the service provider herself may be one of the suspects. The problem becomes even more obvious in terms of cloud computing technology. In this paper, we address this problem and using homomorphic encryption and commutative encryption, we provide two forensically sound schemes to solve the problem so that the investigators can obtain the necessary evidence while the privacy of other users can be protected and at the same time, the service provider cannot know what information the investigators are interested in. © 2011 IEEE. |
Description | The Best Paper Award |
Persistent Identifier | http://hdl.handle.net/10722/152021 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hou, S | en_US |
dc.contributor.author | Uehara, T | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, CK | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.date.accessioned | 2012-06-26T06:32:34Z | - |
dc.date.available | 2012-06-26T06:32:34Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), Dalian, China, 14-16 October 2011. In Proceedings of the 7th IIHMSP, 2011, p. 378-383 | en_US |
dc.identifier.isbn | 978-0-7695-4517-2 | - |
dc.identifier.uri | http://hdl.handle.net/10722/152021 | - |
dc.description | The Best Paper Award | - |
dc.description.abstract | It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be easy to clone a copy of data from the storage device(s) due to the huge volume of data. Even if it is possible to make a clone, there are many irrelevant information/data stored in the same device for which the investigators have no right to access. The other alternative is to let the service provider search the relevant information and retrieve the data for the investigator provided a warrant can be provided. However, sometimes, due to the confidentiality of the crime, the investigator may not want the service provider to know what information they are looking for or the service provider herself may be one of the suspects. The problem becomes even more obvious in terms of cloud computing technology. In this paper, we address this problem and using homomorphic encryption and commutative encryption, we provide two forensically sound schemes to solve the problem so that the investigators can obtain the necessary evidence while the privacy of other users can be protected and at the same time, the service provider cannot know what information the investigators are interested in. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.publisher | IEEE, Computer Society. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001543 | - |
dc.relation.ispartof | Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | en_US |
dc.subject | Commutative encryption | en_US |
dc.subject | Homomorphic encryption | en_US |
dc.subject | Privacy preserving forensics | en_US |
dc.subject | Search on encrypted data | en_US |
dc.subject | Computing technology | - |
dc.title | Privacy preserving confidential forensic investigation for shared or remote servers | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Hou, S: shhou@hku.hk | en_US |
dc.identifier.email | Uehara, T: uehara@media.kyoto-u.ac.jp | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_US |
dc.identifier.email | Hui, CK: hui@cs.hku.hk | - |
dc.identifier.email | Chow, KP: chow@cs.hku.hk | - |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Hui, CK=rp00120 | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/IIHMSP.2011.28 | en_US |
dc.identifier.scopus | eid_2-s2.0-83455164517 | en_US |
dc.identifier.hkuros | 203063 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-83455164517&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 378 | en_US |
dc.identifier.epage | 383 | en_US |
dc.publisher.place | United States | - |
dc.description.other | The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), Dalian, China, 14-16 October 2011. In Proceedings of the 7th IIHMSP, 2011, p. 378-383 | - |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Uehara, T=35243665300 | en_US |
dc.identifier.scopusauthorid | Hou, S=36809489300 | en_US |