Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
- 1 January 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 94-110
- https://doi.org/10.1109/imf.2009.18
Abstract
While log data are being increasingly used as digital evidence in court, the extent to which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. This paper elucidates a subset of the necessary secure requirements for digital evidence and extensively surveys the state of the art secure logging protocols, thereby demonstrating that none of the current protocols completely fulfills the elucidated requirements for admissible evidence. In analyzing the shortcoming of logging protocols, the paper also elaborates on the related research challenges.Keywords
This publication has 25 references indexed in Scilit:
- A new approach to secure loggingACM Transactions on Storage, 2009
- Personalization in privacy-aware highly dynamic systemsCommunications of the ACM, 2006
- Digital evidence bagCommunications of the ACM, 2006
- Standardizing digital evidence storageCommunications of the ACM, 2006
- Fair use, DRM, and trusted computingCommunications of the ACM, 2003
- Secure audit logs to support computer forensicsACM Transactions on Information and System Security, 1999
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Password authentication with insecure communicationCommunications of the ACM, 1981
- A note on the confinement problemCommunications of the ACM, 1973
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970