首页 | 官方网站   微博 | 高级检索  
     

Fractional Order [Proportional Integral] Controllers Parameters Algorithm Based on the Vector Method
作者姓名:Jingsha He  Gongzheng Liu  Bin Zhao  Xuejiao Wan
作者单位:School of Software Engineering,Beijing University of Technology;Dept. of Computer Science,Jining University;State Key Laboratory of Digital Publishing Technology,Peking University Founder Group Co.,Ltd
基金项目:Sponsored by Shandong Natural Science Foundation-Youth Found Project(Grant No. ZR2013FQ024)and the Opening Project of State Key Laboratory of Digital Publishing Technology). *
摘    要:In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper,we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method,the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data,which includes the digital evidence,the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android,we can ensure the authenticity and non-misuse of data evidence in digital forensics.

关 键 词:digital  forensics  authenticity  non-misuse  digital  evidence
收稿时间:5/6/2014 12:00:00 AM

Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital Forensics
Jingsha He,Gongzheng Liu,Bin Zhao,Xuejiao Wan.Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital Forensics[J].Journal of Harbin Institute of Technology,2015,22(1):85-90.
Authors:Jingsha He  Gongzheng Liu  Bin Zhao and Xuejiao Wan
Affiliation:1. School of Software Engineering, Beijing University of Technology, Beijing 100124, China
2. School of Software Engineering, Beijing University of Technology, Beijing 100124, China;Dept.of Computer Science,Jining University, Qufu 273155, China;State Key Laboratory of Digital Publishing Technology,Peking University Founder Group Co.,Ltd, Beijing 100871, China
Abstract:In forensic investigations, it is vital that the authenticity of digital evidence should be ensured. In addition, technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper, we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method, the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data, which includes the digital evidence, the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android, we can ensure the authenticity and non-misuse of data evidence in digital forensics.
Keywords:digital forensics  authenticity  non-misuse  digital evidence
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《哈尔滨工业大学学报(英文版)》浏览原始摘要信息
点击此处可从《哈尔滨工业大学学报(英文版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号