The Community for Technology Leaders
2014 Twelfth Annual Conference on Privacy, Security and Trust (PST) (2014)
Toronto, ON, Canada
July 23, 2014 to July 24, 2014
ISBN: 978-1-4799-3502-4
pp: 129-138
Ali Dehghantanha , Faculty of Computer Science and Information Technology, University Putra Malaysia, Malaysia
Katrin Franke , Testimon Digital Forensics Lab, Gjøvik University College- Norway
the forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once the private data is exposed it is impossible to ‘undo’ its exposure effects should the suspect is found innocent! Moreover, it is not uncommon that during a suspect investigation, private information of other innocent parties becomes apparent to the forensics investigator. These all raise the concern for development of platforms for enforcing privacy boundaries even to authorized forensics investigators. To the best of authors' knowledge, there is no practical model for privacy-respecting digital investigation which is capable of considering different jurisdictions requirements and protecting subjects' data privacy in line with investigation warrant permissions and data-origin privacy requirements.
Privacy, Data privacy, Digital forensics, Cryptography, Data models

A. Dehghantanha and K. Franke, "Privacy-respecting digital investigation," 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST), Toronto, ON, Canada, 2014, pp. 129-138.
85 ms
(Ver 3.3 (11022016))