Secure Transfer of Digital Evidence from the Crime Scene

Authors

  • Santhosh B  Associate Professor, Department of MCA, AIMIT, St Aloysius College (Autonomous), Mangalore, Karnataka, India
  • K. Annapoorneshwari Shetty  Assistant Professor, Department of MCA, AIMIT, St. Aloysius College (Autonomous), Karnataka, India

DOI:

https://doi.org//10.32628/CSEIT228118

Keywords:

Diffie-Hellman Key Exchange, message digest, Advanced Encryption Standard (AES), digital evidence

Abstract

The essential task in tracing the source of the theft is to secure the digital proof from the location where the data was misused. But, more significantly, the data evidence must be sent to the main server without being intercepted by a Man-in-the-Middle assault. Diffie-Hellman Key Exchange Algorithm is used to securely exchange cryptographic keys from the admin and investigator. Here different layers of security have been identified. The proposed method uses message digest, encryption and steganography to implement secure transfer of digital evidence from the crime scene.

References

  1. M. A. Caloyannides, N. Memon and W. Venema, "Digital Forensics," in IEEE Security & Privacy, vol. 7, no. 2, pp. 16-17, March-April 2009, doi: 10.1109/MSP.2009.34
  2. Basant Kumar, 2019, Effective Approach Toward Intrusion Detection and Pretention Systems in Implementing Defense in Depth, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) CICTAB – 2019 (Volume 7 – Issue 04),
  3. A. Taparia, S. . K. Panigrahy and S. K. Jena, "Secure Key Exchange Using Enhanced Diffie-Hellman Protocol Based on String Comparison," 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), no. 2017, 2017.
  4. W. D. a. M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. vol. 22, no. 6, pp. pp. 644-654, 18 July Nov. 1976
  5. B. Dickson, "Portswigger," 06 February 2020. [Online]. Available: https://portswigger.net/daily-swig/what-is-steganography-a-complete-guide-to-the-ancient-art-of-concealing-messages.
  6. H. Q. Beyers, "Database forensics: Investigating compromised database management systems", 2014.
  7. Iacob, N.-M. (2011). Fragmentation and data allocation in the distributed environments. Annals of the University of Craiova, Mathematics and Computer Science Series. 38. 76-83.
  8. Dworkin, M. , Barker, E. , Nechvatal, J. , Foti, J. , Bassham, L. , Roback, E. and Dray, J. (2001), Advanced Encryption Standard (AES), Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.FIPS.197.
  9. K. Thangadurai and G. Sudha Devi, "An analysis of LSB based image steganography techniques," 2014 International Conference on Computer Communication and Informatics, 2014, pp. 1-4, doi: 10.1109/ICCCI.2014.6921751.
  10. Cinthya Grajeda, Frank Breitinger, and Ibrahim Baggili. “Availability of Datasets for digital forensics – and what is missing”. In: Digital Investigation (2017). (Presented at DFRWS 2017, Austin,

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Santhosh B, K. Annapoorneshwari Shetty, " Secure Transfer of Digital Evidence from the Crime Scene, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.123-127, January-February-2022. Available at doi : https://doi.org/10.32628/CSEIT228118