Skip to main content

ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence

  • Conference paper
Book cover Trust, Privacy, and Security in Digital Business (TrustBus 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8058))

  • 1012 Accesses

Abstract

It is an undisputable fact that nowadays many different types of crime are conducted by utilizing some type of electronic device - communication. To address this new situation, modern forensics tools evolved, becoming sophisticated enough to handle almost all kinds of digital content. However, surprisingly enough, collecting and validating the authenticity of online content remains, until now, a problem to resolve. The common practice is to capture (screen-shot) or save a web page, the authenticity of which is usually validated in a judicial process by an expert’s testimony. In this paper, we introduce ProCAVE , a simple software architecture with a set of accompanying procedures, and we argue that their combined use can deliver evidence from online sources in the court, in a sound and privacy-preserving manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berghel, H.: Hiding data, forensics, and anti-forensics. Communications of the ACM 50(4) (April 2007)

    Google Scholar 

  2. CanProve - Capture Online Evidence, http://canprove.com (last visited: March 2013)

  3. Careless, J.: Collecting and authenticating online evidence, CBA Practicelink, http://www.cba.org/cba/practicelink/careerbuilders_technology/web-evidence.aspx (last visited: March 2013)

  4. Commonwealth vs. Michael M. OLaughlin: Burglary, armed assault in a dwelling, assault and battery by means of a dangerous weapon, practice, criminal, required finding, Appellate Court Decision, No. 04-P-48 (2005)

    Google Scholar 

  5. Council of Europe (CoE), Explanatory Report to the Convention on Cybercrime, ETS 185 (2001), http://conventions.coe.int/Treaty/en/Reports/Html/185.htm

  6. DVers - Digital Verification Services, http://www.dvers.gr (last visited: March 2013)

  7. Fenner, M.G.: Evidentiary Problems Associated with the Introduction of Web-Based Evidence, LSN: Evidence (Public Law) (Sub-Topic) (December 2010), Available at SSRN: http://ssrn.com/abstract=1722714

  8. Garfinkel, S.L.: Digital forensics research: The next 10 years. Digital Investigation: The International Journal of Digital Forensics & Incident Response 7, S64-S73 (2010)

    Google Scholar 

  9. Gibson, J.: A Primer on Admitting Web Page into Evidence, Nevada Lawyer Magazine, http://nvbar.org/articles/content/primer-admitting-web-pages-evidence (last visited: March 2013)

  10. Hosmer, C.: Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence 1(1) (2002)

    Google Scholar 

  11. Karyda, M., Mitrou, L.: Internet Forensics: Legal and Technical issues. In: 2nd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos, Greece (August 2007)

    Google Scholar 

  12. Kerzner, M.: Evidence Authentication: Web Site Content, Atkison Baker, http://www.depo.com/E-letters/TheDiscoveryUpdate/2008/October/Articles/website_authentication.html (last visited: March 2013)

  13. Leroux, O.: Legal Admissibility of Electronic Evidence. International Review of Law Computers and Technology 18(2), 193–220 (2004)

    Article  MathSciNet  Google Scholar 

  14. Lorraine, J.R., Mack, B.: Plaintiffs v. Markel American Insurance Company, Defendants. Civil Action No. PWG-06-1893, United States District Court for the District of Maryland (2007)

    Google Scholar 

  15. Mylonas, A., Meletiadis, V., Mitrou, L., Gritzalis, D.: Dynamic Evidence Acquisition for Smartphone Forensics. In: Proceedings of the 27th IFIP International Information Security and Privacy Conference. AICT, vol. 267, pp. 245–256. Springer (2012)

    Google Scholar 

  16. Mylonas, A., Meletiadis, V., Mitrou, L., Gritzalis, D.: Smartphone Sensor Data as Digital Evidence. Computers & Security (Special Issue: Cybercrime in the Digital Economy) (to appear 2013)

    Google Scholar 

  17. Nixon, R.: Plug-In PHP: 100 Power Solutions: Simple Solutions to Practical PHP Problems. McGraw-Hill Education (2010)

    Google Scholar 

  18. PHP Scriptable Web Browser, http://www.simpletest.org/en/browser_documentation.html (last visited: March 2013)

  19. Similarity Analyzer, http://tool.motoricerca.info/similarity-analyzer.phtml (last visited: March 2013)

  20. Sommer, P.: Digital Evidence, Digital Investigations and E-Disclosure: A Guide to Forensic Readiness for Organisations, Security Adviders and Lawyers, 3rd edn. Version 3.0, Information Assurance Advisory Council (March 2012)

    Google Scholar 

  21. Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice Hall Professional Technical Reference (2002)

    Google Scholar 

  22. ProCAVE Tool. Access available upon request

    Google Scholar 

  23. The OpenSSL Toolkit, http://www.openssl.org (last visited: March 2013)

  24. U.S.Courts, Federal Rules of Evidence (December 1, 2010), http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/2010%20Rules/Evidence.pdf

  25. Web Statistics - Key data of the Web, http://www.scriptol.com/web/statistics.php (last visited: March 2013)

  26. X1 Social Discovery, http://www.x1discovery.com/social_discovery.html (last visited: March 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lalas, E., Mitrou, L., Lambrinoudakis, C. (2013). ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2013. Lecture Notes in Computer Science, vol 8058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40343-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40343-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40342-2

  • Online ISBN: 978-3-642-40343-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics