CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

XML Approach for the Solution of Chain of Custody of Digital Evidence

by Devi Ratnasari, Yudi Prayudi, Bambang Sugiantoro
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 23
Year of Publication: 2018
Authors: Devi Ratnasari, Yudi Prayudi, Bambang Sugiantoro
10.5120/ijca2018916445

Devi Ratnasari, Yudi Prayudi, Bambang Sugiantoro . XML Approach for the Solution of Chain of Custody of Digital Evidence. International Journal of Computer Applications. 179, 23 ( Feb 2018), 20-25. DOI=10.5120/ijca2018916445

@article{ 10.5120/ijca2018916445,
author = { Devi Ratnasari, Yudi Prayudi, Bambang Sugiantoro },
title = { XML Approach for the Solution of Chain of Custody of Digital Evidence },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 23 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number23/29008-2018916445/ },
doi = { 10.5120/ijca2018916445 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:14.483418+05:30
%A Devi Ratnasari
%A Yudi Prayudi
%A Bambang Sugiantoro
%T XML Approach for the Solution of Chain of Custody of Digital Evidence
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 23
%P 20-25
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Traditionally, the concept of recording information about physical evidence (electronic and non-electronic) in various law enforcement agencies is done using paper-based documentation. A form is generally applied to document the chronological information of the evidence during the investigation process. In the future, the traditional concept can be problematic when it applied to digital evidence. It is because the physical evidence and the digital evidence have different characteristics. This paper present the Chain of Custody application for digital evidence documentation using XML approach. XML is selected as the chain of custody information documentation storage media. In the application, there are two types of the chain of custody information, such as information entered by the user and information extracted from the attribute of digital evidence file. This application can be applied for various file types from various electronic sources. In addition, this paper also conducted a preliminary experiment using this application to know that Chain of custody information can be properly recorded and this approach does not alter the digital evidence. The output of this application is the chain of custody form in the .pdf document format.

References
  1. B. Carrier, FileSystem Forensic Analysis. Adisson Wesley Professional, 2005.
  2. Y. Prayudi, “Problems and Solutions for Digital Chain Of Custody in Cybercrime Investigation Process (In Indonesian Language)” Senasti, no. ISSN : 235-536X, 2014.
  3. J. Cosic, “Formal Acceptability of Digital Evidence,” Springer Int. Publ., 2017.
  4. A. Luthfi and Y. Prayudi, “Digital Forensics Business Model for Supporting of Handling Digital Evidence and Cybercrime Investigation (In Indonesian Language)" Konf. Nas. Inform. STIE ITB Bandung, 2015.
  5. Y. Prayudi and A. SN, “Digital Chain of Custody : State of the Art,” Int. J. Comput. Appl., vol. 114, no. 5, p. 8887, 2015.
  6. Y. Prayudi, A. Ashari, and T. K. Priyambodo, “Digital Evidence Cabinets : A Proposed Framework for Handling Digital Chain of Custody,” Int. J. Comput. Appl., vol. 107, no. 9, pp. 30–36, 2014.
  7. J. Cosic and M. Baca, “A Framework to (Im) Prove „ Chain of Custody “ in Digital Investigation Process,” Proc. 21st Cent. Eur. Conf. Inf. Intell. Syst., pp. 435–438, 2010.
  8. Y. Prayudi, A. Luthfi, A. Munasir, R. Pratama, and K. Kunci, “An Ontological Approach for Representing Body of Knowledge of Digital Chain of Custody (In Indonesian Language)” Cybermatika, vol. 2, pp. 36–43, 2014.
  9. J. Cosic, Z. Cosic, and M. Baca, “An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence,” JIOS J. Inf. Organ. Sci., vol. 35, no. 1, pp. 1–13, 2011.
  10. C. Hosmer, “DIGITAL EVIDENCE BAG,” Commun. ACM, vol. 49, no. 2, 2006.
  11. S. Airi and F. Tompa, “‘Why Use XML ?’. In Communicating with XML,” Springer US, pp. 69–91, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Crime Digital Evidence Digital Chain Of Custody XML Schema