Font Size: a A A

The Method Of Tracing Data Based On Trusted Digital Forensics

Posted on:2015-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z H ShaoFull Text:PDF
GTID:2298330467464793Subject:Information security
Abstract/Summary:PDF Full Text Request
In the modern time, information technology facilities are growing fast with irresistible speed.While smart devices bring all the convenience of daily life, the disadvantages are also becomingobvious. Once the saved data in the device is stolen by criminals, it can be used by them.Meanwhile the crime has become increasingly dependent on cell phones, computers and otherinformation technology equipment. Therefore, the forensic technology of digital data stored in thesedevices should be synchronized as soon as possible.Based on trusted digital forensics, this paper firstly proposed the digital forensics metadatainformation standards with trusted timestamp technology. Metadata framework designed with areasonable structure can make it easier to manage and analyze information generated in the digitalforensics process. The metadata after timestamp signature can effectively prevent tampering, andenhance the credibility of the evidence in the static properties.Based on the metadata standards, this paper then proposed the trusted digital forensics model onthe basis of workflow. The model focuses on the credibility of the digital forensics process, iedynamic behavior believable. A digital forensics model based on trusted workflow is established tointroduce the function management module and function realization module. Every step stored therelevant and useful information, which is helpful to look back and trace data afterwards. The paperalso proposed the concept of the formula Trust Probability, which to some degree quantified theelements that can affect the credibility of the forensic results. It is more intuitive to judge thereliability of the process from quantity. Workflow technology determines the evidence under theproposed model is traceable, and forensics process is trusted.Finally, evidence of actual case studies, the feasibility of the proposed model, in terms ofcredible forensic data traceability, is expressed by studying the forensic process of the actual crimecase. A simple trusted workflow forensics system prototype is built to display the result from theforensics model. The proposed model is demonstrated from both theory and application.
Keywords/Search Tags:Trusted Digital Forensics, Data Provenance, Metadata, Workflow, TimestampTechnology
PDF Full Text Request
Related items