A Static Semantic Model for Trusted Forensics Using OCL

Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 276)

Abstract

According to the features of various properties of digital data, a static semantic model of features for trusted digital data using OCL (Object Constraint Language) is proposed. These features obtained from the forensic domain of digital data are hierarchically decomposed and merged based on FODA (Feature Oriented Domain Analysis) modeling process. Then a feature tree is built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data, meanwhile, formally describing the features of various attributes of digital data by OCL which has a rigorous mathematical semantics and is easy to understand. The features of digital data are classified with the concept of set in OCL, and the relevance and dependence among various features are described with the operations of set in OCL. Finally, a feature model is built in digital data of Windows system with the use of OCL operations.

Keywords

information security trusted forensics OCL feature FODA digital forensics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, S.J.: Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Computer Standards & Interfaces 29(2), 216–223 (2007)CrossRefGoogle Scholar
  2. 2.
    Lim, K.S., Savoldi, A., Lee, C., Lee, S.: On-the-spot digital investigation by means of LDFS: Live Data Forensic System. Mathematical and Computer Modelling 55(1-2), 223–240 (2012)CrossRefGoogle Scholar
  3. 3.
    Kleve, P., Mulder, R.D., Noortwijk, K.: The definition of ICT Crime. Computer Law & Security Review 27(2), 162–167 (2011)CrossRefGoogle Scholar
  4. 4.
    Ayers, D.: A second generation computer forensic analysis system. Digital Investigation 6(S), S34–S42 (2009)Google Scholar
  5. 5.
    Lee, S., Savoldi, A., Lim, K.S., Park, J.H., Lee, S.: A proposal for automating investigations in live forensics. Computer Standards & Interfaces 32(5-6), 246–255 (2010)CrossRefGoogle Scholar
  6. 6.
    Sun, G.Z., Geng, W.M., Chen, D.W., Shen, T.: One validity model of digital forensics based on trusted probability. Chinese Journal of Computers 34(7), 1262–1274 (2011) (in Chinese)Google Scholar
  7. 7.
    Smith, M., Friese, T., Engel, M., Freisleben, B.: Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. Journal of Parallel and Distributed Computing 66(9), 1189–1204 (2006)MATHCrossRefGoogle Scholar
  8. 8.
    Tao, Y.C., Jin, H., Wu, S., Shi, X.H.: Scalable DHT- and ontology-based information service for large-scale grids. Future Generation Computer Systems 26(5), 729–739 (2010)CrossRefGoogle Scholar
  9. 9.
    Ding, Q.F.: A formalized model of digital data for trusted forensics. Nanjing University of Posts & Telecommunications (2011) (in Chinese)Google Scholar
  10. 10.
    Stoica, P., Sandgren, N.: Spectral analysis of irregularly-sampled data: Paralleling the regularly-sampled data approaches. Digital Signal Processing 16(6), 712–734 (2006)CrossRefGoogle Scholar
  11. 11.
    Wöllmer, M., Al-Hames, M., Eyben, F., Schuller, B., Rigoll, G.: A multidimensional dynamic time warping algorithm for efficient multimodal fusion of asynchronous data streams. Neurocomputing 73(1-3), 366–380 (2009)CrossRefGoogle Scholar
  12. 12.
    Zhou, S.Q., Chin, K.S., Xie, Y.B., Yarlagadda, P.K.: Internet-based distributive knowledge integrated system for product design. Computers in Industry 50(2), 195–205 (2003)CrossRefGoogle Scholar
  13. 13.
    Li, C.K., Wong, D.S.: Signcryption from randomness recoverable public key encryption. Information Sciences 180(4), 549–559 (2010)MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Kenneally, E.E., Brown, C.L.: Risk sensitive digital evidence collection. Digital Investigation 2(2), 101–119 (2005)CrossRefGoogle Scholar
  15. 15.
    Schobbens, P.Y., Heymans, P., Trigaux, J.C., Bontemps, Y.: Generic semantics of feature diagrams. Computer Networks 51(2), 456–479 (2007)MATHCrossRefGoogle Scholar
  16. 16.
    Jin, X.L., Ma, H.D.: A Semantic Description Model of Features for Service Component Using OCL. Journal of Computer Research and Development 44(12), 2112–2121 (2007) (in Chinese)Google Scholar
  17. 17.
    Object Constraint Language (EB/OL), http://www.omg.org/spec/OCL/2.0/PDF
  18. 18.
    Marković, S., Baar, T.: Refactoring OCL annotated UML class diagrams. Software and Systems Modeling 7(1), 25–47 (2008)Google Scholar
  19. 19.
    Jung, C.S., Seo, H., Kang, H.G.: Estimating redundancy information of selected features in multi-dimensional pattern classification. Pattern Recognition Letters 32(4), 590–596 (2011)CrossRefGoogle Scholar
  20. 20.
    Reinhartz-Berger, I., Sturm, A.: Utilizing domain models for application design and validation. Information and Software Technology 51(8), 1275–1289 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Zehui Shao
    • 1
  • Qiufeng Ding
    • 1
  • Xianli Jin
    • 1
    • 2
  • Guozi Sun
    • 1
    • 2
  1. 1.College of ComputerNanjing University of Posts & TelecommunicationsNanjingChina
  2. 2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjingChina

Personalised recommendations