CFP last date
20 May 2024
Reseach Article

Digital Chain of Custody: State of The Art

by Yudi Prayudi, Azhari Sn
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 5
Year of Publication: 2015
Authors: Yudi Prayudi, Azhari Sn
10.5120/19971-1856

Yudi Prayudi, Azhari Sn . Digital Chain of Custody: State of The Art. International Journal of Computer Applications. 114, 5 ( March 2015), 1-9. DOI=10.5120/19971-1856

@article{ 10.5120/19971-1856,
author = { Yudi Prayudi, Azhari Sn },
title = { Digital Chain of Custody: State of The Art },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 5 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number5/19971-1856/ },
doi = { 10.5120/19971-1856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:51.842490+05:30
%A Yudi Prayudi
%A Azhari Sn
%T Digital Chain of Custody: State of The Art
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 5
%P 1-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation chronologically toward evidence. The characteristics of digital evidence have caused the handling chain of custody is becoming more complicated and complex. A number of researchers have contributed to provide solutions for the digital chain custody through a different point of views. This paper gives an overview of the extent to which the problem and challenges are faced in the digital chain of custody issue as well as the scope of researches that can be done to contribute in the issue of the digital chain of custody.

References
  1. G. Giova, "Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems," Int. J. Comput. Sci. Netw. Secur. , vol. 11, no. 1, pp. 1–9, 2011.
  2. J. ?osi?, Z. ?osi?, M. Ba?a, J. Cosic, G. Cosic, and M. Baca, "An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence," JIOS, vol. 35, no. 1, pp. 1–13, 2011.
  3. UNODC, "Comprehensive Study on Cybercrime," New York, USA. , 2013.
  4. CSIC, "Net Losses?: Estimating the Global Cost of Cybercrime," Washington DC, 2014.
  5. PwC, "US cybercrime: Rising risks, reduced readiness," 2014.
  6. RSA, "THE CURRENT STATE OF CYBERCRIME 2014 An Inside Look at the Changing Threat Landscape," 2014.
  7. T. Widodo and Y. Prayudi, "Model Digital Forensic Readiness Index (DiFRI) untuk Mengukur Tingkat Kesiapan Insititusi," in Seminar Nasional Teknologi Informasi (SNTI), 2013.
  8. A. Agarwal, M. Gupta, and S. Gupta, "Systematic Digital Forensic Investigation Model," Int. J. Comput. Sci. Secur. , vol. 5, no. 1, pp. 118–134, 2011.
  9. C. Easttom and J. Taylor, Computer Crime, Investigation, and the Law. Boston, Massachusetts USA: Course Technology, 2011.
  10. Kepolisian Negara RI, "Perkap Tata Cara Pengelolaan Barang Bukti," Jakarta, 2011.
  11. J. Richter and N. Kuntze, "Securing Digital Evidence," in Fifth International Workshop on Systematic Approaches to Digital Forensic Engeneering, 2010, pp. 119–130.
  12. P. Turner, "Unification of Digital Evidence from Disparate Sources ( Digital Evidence Bags )," in Digital Forensic Research Workshop (DFRWS), 2005, pp. 1–8.
  13. B. Schatz, "Digital Evidence: Representation and Assurance," Queensland University of Technology, Australia, 2007.
  14. C. P. Grobler, C. P. Louwrens, and S. H. Von Solms, "A framework to guide the implementation of Proactive Digital Forensics in organizations," in International Conference on Availability, Reliability and Security, 2010, pp. 677–682.
  15. O. Ademu, C. O. Imafidon, and D. S. Preston, "A New Approach of Digital Forensic Model for Digital Forensic Investigation," Int. J. Adv. Comput. Sci. Appl. , vol. 2, no. 12, pp. 175–178, 2011.
  16. J. Shah and L. G. Malik, "An Approach Towards Digital Forensic Framework for Cloud," in IEEE International Advance Computing Conference (IACC), 2014, pp. 798–801.
  17. P. G. P. G. Bradford and D. A. D. A. Ray, "Using Digital Chains of Custody on Constrained Devices to Verify Evidence," in 2007 IEEE Intelligence and Security Informatics, 2007, pp. 8–15.
  18. Rajamäki and J. Knuuttila, "Law Enforcement Authorities ' Legal Digital Evidence Gathering," in European Intelligence and Security Informatics Conference, 2013, pp. 198–203.
  19. J. Cosic, G. Cosic, J. ?osi?, and Z. ?osi?, "Chain of Custody and Life Cycle of Digital Evidence," Computer Technology and Aplications, vol. 3, pp. 126–129, Feb-2012.
  20. S. L. Garfinkel, "Digital forensics research: The next 10 years," Digit. Investig. , vol. 7, pp. S64–S73, Aug. 2010.
  21. J. Cosic and M. Baca, "( Im ) Proving Chain of Custody and Digital Evidence Integrity with Time Stamp," in MIPRO,Proceedings of the 33rd International Convention International Conference, 2010, no. Im, pp. 1226 – 1230.
  22. S. Dossis, "Semantically-enabled Digital Investigations," Master, Department of Computer and Systems Sciences, Stockholm University, Swedia, 2012.
  23. T. F. Gayed, H. Lounis, and M. Bari, "Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic Web," in The 24th International Conference on Software Engineering & Knowledge Engineering, 2012, pp. 406–411.
  24. S. Raghavan, "Digital forensic research: current state of the art," CSI Trans. ICT, vol. 1, no. 1, pp. 91–114, Nov. 2012.
  25. Damshenas, A. Dehghantanha, and R. Mahmoud, "A Survey on Digital Forensics Trends," Int. J. Cyber-Security Digit. Forensics, vol. 3, no. 4, pp. 209–234, 2014.
  26. F. N. Dezfoli, A. Dehghantanha, R. Mahmoud, and N. F. Binti, "Digital Forensic Trends and Future," Int. J. Cyber-Security Digit. Forensics, vol. 2, no. 2, pp. 48–76, 2013.
  27. D. Schum, G. Tecuci, and M. Boicu, "Analyzing Evidence and its Chain of Custody?: A Mixed-Initiative Computational Approach," Int. J. Intell. Counterintelligence, vol. 22, no. 2, pp. 298–319, 2009.
  28. P. G. Bradford and D. A. Ray, "An Online Algorithm for Generating Fractal Hash Chains Applied to Digital Chains of Custody," Jul. 2013.
  29. S. Saleem, O. Popov, and R. Dahman, "Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence," in International Conference on Innovations in Information Technology, 2011, pp. 220–225.
  30. S. L. Garfinkel, "Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format ," Int. J. Digit. Crime Forensics, vol. 1, no. March, pp. 1–28, 2009.
  31. Nandhakumar and U. Agarwal, "Use of AFF4 'Chain of Custody'- Methodology for Foolproof Computer Forensics Operation," Int. J. Commun. Netw. Syst. , vol. 1, no. 1, pp. 49–57, 2012.
  32. Cohen and B. Schatz, "Hash based disk imaging using AFF4," Digit. Investig. , vol. 7, pp. S121–S128, Aug. 2010.
  33. M. Cohen, S. Garfinkel, and B. Schatz, "Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow," Digit. Investig. , vol. 6, pp. S57–S68, Sep. 2009.
  34. B. Schatz and M. Cohen, "Refining Evidence Containers for Provenance and Accurate Data Representation," IFIP Adv. Inf. Commun. Technol. , vol. 337, pp. 227–242, 2010.
  35. CDESFWG, "Survey of Disk Image Storage Formats," 2006.
  36. T. F. Gayed, H. Lounis, and M. Bari, "Cyber Forensics?: Representing and ( Im ) Proving the Chain of Custody Using the Semantic web," in COGNITIVE 2012?: The Fourth International Conference on Advanced Cognitive Technologies and Applications, 2012, no. Im, pp. 19–23.
  37. K. Lim and D. G. Lee, "A New Proposal for a Digital Evidence Container for Security Convergence," in IEEE International Conference on Control System, Computing and Engineering, 2011, pp. 171–175.
  38. W. Yi, "Extraction and Supervison Of Data Of Chain Of Custody in Computer Forensics," China Communication, vol. 12, 2010.
  39. J. ?osi? and M. Ba?a, "A framework to (Im)Prove „Chain of Custody" in Digital Investigation Process," Proc. 21st Cent. Eur. Conf. Inf. Intell. Syst. , pp. 435–438, 2010.
  40. M. Davis, G. Manes, and S. Shenoi, "A Network-Based Architecture For Storing Digital Evidence," in Advances in Digital Forensics, M. Pollitt and S. Shenoi, Eds. Springer New York, 2005, pp. 33–42.
  41. Rimage Corporation, "Digital Evidence Preservation and Distribution?: Updating the Analog System for the Digital World," 2012.
  42. X. -G. Yu and W. -X. Li, "A New Network Storage Architecture Based on NAS and SAN," in 10 th International Conference on Control, Automation, Robotics and Vision, 2008, no. December, pp. 2224–2227.
  43. D. Han and F. Feng, "Research on the High Availability Storage Network," in 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp. 1–4.
  44. K. Engelhardt, "Secure Data Storage - An Overview of Storage Technology," 2008.
  45. Kuntze, C. Rudolph, T. Kemmerich, and B. Endicott, "Chapter 1 SCENARIOS FOR RELIABLE AND SECURE DIGITAL EVIDENCE," in Ninth Annual IFIP WG 11. 9 International Conference, 2013, pp. 1–13.
  46. N. Kuntze, C. Rudolph, and I. Technology, "Secure Digital Chains of Evidence," in SADFE (Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering), 2011, pp. 1–8.
  47. R. Accorsi, "Safekeeping Digital Evidence with Secure Logging Protocols?: State of the Art and Challenges," 2009 Fifth Int. Conf. IT Secur. Incid. Manag. IT Forensics, no. 1, pp. 94–110, 2009.
  48. C. Chen and C. Huang, "Applying EPCglobal Architecture Framework for Criminal Physical Evidence Safety Monitoring System," in TANET (Taiwan Academics Network Conference), 2013, pp. 1–6.
  49. . Thion, "Access Control Models," in Cyber Warfare and Cyber Terorism, IGI Global, 2008.
  50. Samarati and S. D. C. di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundation Of Security Analysis, Springer Berlin Heidelberg, 2001.
  51. C. Hsu and Y. Lin, "A Digital Evidence Protection Method with Hierarchical Access Control Mechanisms," in IEEE International Carnahan Conference on Security Technology (ICCST), 2011, pp. 1–9.
  52. D. Zhang, "The Utility of Inconsistency in Information Security and Digital Forensics," in IEEE International Conference on Information Reuse and Integration (IRI), 2011, pp. 141 – 146.
  53. W. Zhou, "Access Control Model and Policies for Collaborative Environments," PhD Dissertation, Universitaet Potsdam, Potsdam Germany, 2008.
  54. A. Hellany, H. Achi, and M. Nagrial, "An Overview of Digital Security Forensics Approach and Modelling," in 2008 International Conference on Computer Engineering & Systems, 2008, pp. 257–260.
  55. Y. Prayudi, A. Ashari, and T. K. Priyambodo, "Digital Evidence Cabinets?: A Proposed Frameworks for Handling Digital Chain of Custody," Int. J. Comput. Appl. , vol. 109, no. 9, pp. 30–36, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics Digital Evidence Chain of Custody Cybercrime