Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology

Abstract

Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.

Authors and Affiliations

Adedayo Balogun, Shao Zhu

Keywords

Related Articles

Value based PSO Test Case Prioritization Algorithm

Regression testing is performed to see if any changes introduced in software will not affect the rest of functional software parts. It is inefficient to re-execute all test cases every time the changes are made. In this...

Text Independent Speaker Identification using Integrating Independent Component Analysis with Generalized Gaussian Mixture Model

  Recently much work has been reported in literature regarding Text Independent speaker identification models. Sailaja et al (2010)[34] has developed a Text Independent speaker identification model assuming tha...

Variable Reduction-based Prediction through Modified Genetic Algorithm

Due to the massive influence in the use of prediction models in different sectors of society, many researchers have employed hybrid algorithms to increase the accuracy level of the prediction model. The literature sugges...

Intrusion Detection System with Correlation Engine and Vulnerability Assessment

The proposed Intrusion Detection System (IDS) which is implemented with modern technologies to address certain prevailing problems in existing intrusion detection systems’ is capable of giving an advanced output to the s...

Air Pollution Analysis using Ontologies and Regression Models

Rapidly throughout the world economy, "the expansive Web" in the "world" explosive growth, rapidly growing market characterized by short product cycles exists and the demand for increased flexibility as well as the exten...

Download PDF file
  • EP ID EP125530
  • DOI 10.14569/IJACSA.2013.040506
  • Views 113
  • Downloads 0

How To Cite

Adedayo Balogun, Shao Zhu (2013). Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology. International Journal of Advanced Computer Science & Applications, 4(5), 36-40. https://europub.co.uk/articles/-A-125530