Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 5
Abstract
Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.
Authors and Affiliations
Adedayo Balogun, Shao Zhu
QOS,Comparison of BNP Scheduling Algorithms with Expanded Fuzzy System
Parallel processing is a filed in which different systems run together to save the time of the processing and to increase the performance of the system. It has been also seen that it works somewhat up to the load balanci...
Representing Job Scheduling for Volunteer Grid Environment using Online Container Stowage
Volunteer grid computing comprises of volunteer resources which are unpredictable in nature and as such the scheduling of jobs among these resources could be very uncer-tain. It is also difficult to ensure the successful...
Distributed Energy Efficient Node Relocation Algorithm (DEENR)
Wireless Sensor Networks (WSNs) due to their inherent features are vulnerable to single or multiple sensor node failure. Node’s failure can result in partitioning of the networks resulting in loss of inter-node connectiv...
Rule Based Artificial Intelligent System of Cucumber Greenhouse Environment Control with IoT Technology
The method proposed here allows control cucumber greenhouse environment based on IoT technology. IoT sensors are to measure the room and air temperature, relative humidity, CO2 content, water supply, liquid fertilizer, w...
A Study of Feature Selection Algorithms for Predicting Students Academic Performance
The main aim of all the educational organizations is to improve the quality of education and elevate the academic performance of students. Educational Data Mining (EDM) is a growing research field which helps academic in...