DocumentCode :
2918273
Title :
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
Author :
Bradford, Phillip G. ; Ray, Daniel A.
Author_Institution :
Alabama Univ., Tuscaloosa
fYear :
2007
fDate :
23-24 May 2007
Firstpage :
8
Lastpage :
15
Abstract :
A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of custody using an algorithm by Jakobsson and by providing a new algorithm that compliments Jakobsson´s algorithm. Our method assumes specialized hardware. The physical hardware is assumed to be memory and processor constrained. Our new algorithm is an online algorithm that generates a hash chain of n hash elements without knowledge of n before it starts. At the same time, as n grows our new algorithm stores only the [log n] pebbles which are inputs for Jakobsson´s amortized hash chain traversal algorithm. Jakobsson´s algorithm is then used to validate hash elements and thus the digital chain of custody. The complimentary algorithm presented here is used to generate and store the hash chain. The compact representation used by these algorithms is useful to store a large digital chain of custody on a small and constrained device. Our proposed method allows the use of constrained devices to validate complex and ephemeral data such as shipping manifests and handling logs.
Keywords :
distributed algorithms; security of data; constrained device; custody digital chain; digital chain authentication; digital chain validation; digital data documentation; hash chain traversal algorithm; hash element; online algorithm; Computer science; Digital forensics; Hardware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics, 2007 IEEE
Conference_Location :
New Brunswick, NJ
Electronic_ISBN :
1-4244-1329-X
Type :
conf
DOI :
10.1109/ISI.2007.379522
Filename :
4258666
Link To Document :
بازگشت