Advertisement

Proof of Concept of the Online Neighbourhood Watch System

  • Stacey OmelezeEmail author
  • Hein S. Venter
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 171)

Abstract

Potential digital evidence captured by an onlooker at a crime scene when stored in a repository can be used during criminal investigations, or as admissible evidence in a court of law. However, to employ the captured and stored potential digital evidence (PDE) some challenges are required to be dealt with, such as, retaining the forensic soundness of the captured PDE, adequate measures to secure the PDE and measures to protect the privacy rights of the PDE uploader (citizens).

In previous work, the authors proposed a conceptual model termed online neighbourhood watch (ONW). The ONW model allows community members to use their mobile devices in capturing PDE, store the captured PDE to a repository to be used in neighbourhood crime investigation in South Africa. But, the focus of this paper is to present a proof of concept of the ONW model. The proof of concept outlines the functional and architectural requirements specifications of the ONW system and evaluates the performance of the underlying functional requirements using mathematical proofs in testing the forensic soundness of the captured and stored PDE. Furthermore, using the information security services mechanisms, the forensic soundness indicators (FSI) are generated. The FSI ensures originality, authenticity and admissibility of PDE from the ONW system.

Keywords

PDE Forensic soundness ONW system Digital evidence Information security services Repository 

Notes

Acknowledgment

This work is based on the research supported wholly or in part by the National Research Foundation of South Africa (Grant Numbers 88211, 89143 and TP13081227420).

References

  1. 1.
    Aker, J.C., Fafchamps, M.: Mobile phone coverage, producer markets: evidence from west africa. World Bank Econ. Rev. lhu006 (2014)Google Scholar
  2. 2.
    Cohen, F.A.: Digital Forensic Evidence Examination. Fred Cohen and Associates Out of Livermore, 3rd edn. (2009). 9781878109446Google Scholar
  3. 3.
    Government Gazette: Electronic Communications and Transactions Act, Act 25 of 2002. Technical report, PDF Scanned by Sabinet. Accessed 08 February 2014. South Africa Government Gazette - Legislation- South Africa - National/Acts and Regulations/E/Electronic Communications and Transactions Act No. 25 Of 2002/The Act, August 2002Google Scholar
  4. 4.
    Hargreaves, C.J.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D. thesis, Deartment of Informatics and Sensors, Cranfield University, UK (2009)Google Scholar
  5. 5.
    Holovaty, A., Kaplan-Moss, J.: The Definitive Guide to Django: Web Development Done Right. Apress (2009)Google Scholar
  6. 6.
    Klir, G., Yuan, B.: Fuzzy Sets and Fuzzy Logic, vol. 4. Prentice Hall, New Jersey (1995)zbMATHGoogle Scholar
  7. 7.
    Bass, R.K.L., Clements, P.: Software Architecture in Practice. Part of the SEI Series in Software Engineering Series, 3rd edn. Addison-wesley Professional, USA (2012). ISBN -13: 000-0321815734, ISBN-10: 0321815734Google Scholar
  8. 8.
    Omeleze, S., Venter, H.S.: Towards a model for acquiring digital evidence using mobile devices. In: Tenth International Network Conference (INC 2014) and WDFIA 2014 Plymouth University, UK, pp. 1–14 (2014)Google Scholar
  9. 9.
    Omeleze, S., Venter, S.H.: A model for access management of potential digital evidence. In: 10th International Conference on Cyber Warfare and Security (ICCWS), pp. 491–501. CSIR, University of Vender and Academic Conferences Limited (2015)Google Scholar
  10. 10.
    Pawlak, Z.: Rough set theory and its applications to data analysis. Cybern. Syst. 29(7), 661–688 (1998)CrossRefzbMATHGoogle Scholar
  11. 11.
    Charles Pfleeger, P., Pfleeger, S.L.: Security in Computing, 4th edn, pp. 35–43. Prentice Hall Publication, Upper Saddle Rivers (2006). ISBN:0132390779zbMATHGoogle Scholar
  12. 12.
    Government-Gazette POPI-Act: Privacy and data protection - discussion paper 109 (project 124) - South African law reform commission (2005–2010). Technical report, Accessed 08 August 2014. South Africa Government Gazette - Legislation - South Africa - National/Acts - Privacy and data protection Act No. 4, August 2013Google Scholar
  13. 13.
    Saleem, S., Popov, O., Dahman, R.: Evaluation of security methods for ensuring the integrity of digital evidence. Institute of Electrical Electronics Engineers (IEEE Xplore Digital Library) (2011)Google Scholar
  14. 14.
    Schwikkard, P.-J., Van der Merwe, S.E.: Principles of Evidence. Juta and Company Ltd. (2009). ISBN:978 0 7021 79501Google Scholar
  15. 15.
    Susanto, H., Almunawar, M.N., Tuan, Y.C.: Information security manage-ment system standards: a comparative study of the big five (2011)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  1. 1.ICSA Research Group, Computer Science DepartmentUniversity of PretoriaPretoriaSouth Africa
  2. 2.Computer Science Dept.University of PretoriaPretoriaSouth Africa

Personalised recommendations