透過您的圖書館登入
IP:52.14.130.13
  • 期刊
  • OpenAccess

Proposal and Evaluation of an Evidence Preservation Method for Use in a Common Number System

並列摘要


In recent years, the introduction of a common number system has been planned by the government of Japan, and the possibility of illegal use of personal information in this system has been considered. Access records in log files are analyzed when possible illegal use is being investigated. Therefore, a method by which to maintain the integrity of the log file becomes a significant problem because alteration of digital data is very easy. Moreover, in the case of a common number system, a method that keeps verification secure as well as secret from certain organizations is needed, because various organizations will have access to the common number system. In the present paper, we propose an evidence preservation method that enables privacy and concealment to be maintained by introducing a cipher system and a hysteresis signature.

參考文獻


B. Schneier, and J. Kelsey, Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2(2), p159-176, 1999. http://dx.doi.org/10.1145/317087.317089.
R. Accorsi, Safe-Keeping digital evidence with secure logging protocols: state of the art and challenges. In O. Goebel, R. Ehlert, S. Frings, D. Guenther, H. Morgenstern, and D. Schadt (Eds.), Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (p94-110). Los Alamitos, CA: IEEE Computer Society, 2009. http://dx.doi.org/10.1109/IMF.2009.18.
S. Zhao, K. Chen, and W. Zheng, Secure logging for auditable file system using separate virtual machines. In X. Liao, H. Jin, R. Zheng, and D. Zou (Eds.), Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications (p153-160). Los Alamitos, CA: IEEE Computer Society, 2009. http://dx.doi.org/10.1109/ISPA.2009.32.
I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram, Secure logging as a service-delegating log management to the cloud. IEEE Systems Journal, 7(2), p323-334, 2013. http://dx.doi.org/10.1109/JSYST.2012.2221958.
Y. Ashino, and R. Sasaki, Proposal of digital forensic system using security device and hysteresis signature. In B.-Y. Liao, J.-S. Pan, Lakhmi C. Jain, M. Liao, H. Noda, and Anthony T.S. Ho (Eds.), Proceedings of the 3rd IEEE Intelligent Information Hiding and Multimedia Signal Processing (p3-7). Los Alamitos, CA: IEEE Computer Society, 2007. http://dx.doi.org/10.1109/IIH-MSP.2007.249.

被引用紀錄


卓韋佑(2017)。基於Android平台之智慧校園推播與導覽系統設計與建置〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2017.00748
Chiu, P. F. (2010). 應用於低耗能可攜式裝置之非揮發性8T2R靜態隨機存取式記憶體 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2010.00530
Hsiao, C. L. (2010). Role of amino acid residues (Lys)305 and (Arg)306 of tumor suppressor p53 in nucleotide excision repair of UVC-induced DNA lesion [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2010.00168
張仕承(2007)。固態微光學腔的製作及量測〔碩士論文,國立清華大學〕。華藝線上圖書館。https://doi.org/10.6843/NTHU.2007.00513
蔡承竣(2007)。氮氣電漿對矽進行氮化處理以提升高介電係數材料蝕刻選擇比之研究〔碩士論文,國立清華大學〕。華藝線上圖書館。https://doi.org/10.6843/NTHU.2007.00019

延伸閱讀