[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3487664.3487734acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

An Adaptative and Compliant Forensics Admissibility Metrics Generation Methodology

Published: 30 December 2021 Publication History

Abstract

The paper aims to solve the lack or absence of effective metrics that reflect the sized system’s forensics readiness, providing intrinsic weights to the gathered evidence. This paper proposes a new adaptive methodology to elicit forensics metrics that measure the evidence admissibility attributes. It considers the legislation difference between countries and required procedures. It also helps in measuring the computing system forensics soundness to generate admissible evidence. The article presents an application of the methodology within Cloud computing services as a demonstration example.

References

[1]
Aymen Akremi and Mohsen Rouached. 2021. A comprehensive and holistic knowledge model for cloud privacy protection. J. Supercomput. 77, 8 (2021), 7956–7988. https://doi.org/10.1007/s11227-020-03594-3
[2]
Aymen Akremi, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. 2020. Applying Digital Forensics to Service Oriented Architecture. Int. J. Web Serv. Res. 17, 1 (2020), 17–42.
[3]
Aymen Akremi, Hassen Sallay, Mohsen Rouached, Rafik Bouaziz, and Mohamed Abid. 2015. Forensics-aware web services composition and ranking. In Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015. ACM, 56:1–56:10. https://doi.org/10.1145/2837185.2837226
[4]
Aymen Akremi, Mohamed-Foued Sriti, Hassen Sallay, and Mohsen Rouached. 2019. Ontology-Based Smart Sound Digital Forensics Analysis for Web Services. Int. J. Web Serv. Res. 16, 1 (2019), 70–92. https://doi.org/10.4018/IJWSR.2019010104
[5]
Ahmad R Amran, Raphael C-W Phan, and David J Parish. 2009. Metrics for network forensics conviction evidence. In 2009 International Conference for Internet Technology and Secured Transactions,(ICITST). IEEE, 1–8.
[6]
Catherine Barrett. 2019. Are the EU GDPR and the California CCPA becoming the de facto global standards for data privacy and protection?Scitech Lawyer 15, 3 (2019), 24–29.
[7]
Matthew Braid. 2001. Collecting Electronic Evidence After a System Compromise.
[8]
Peter Carey. 2018. Data protection: a practical guide to UK and EU law. Oxford University Press, Inc.
[9]
Eoghan Casey. 2011. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (3rd ed.). Academic Press.
[10]
Fred Cohen. 2009. Digital Forensic Evidence Examination. Fred Cohen & Associates.
[11]
Luciana Duranti and Corinne Rogers. 2012. Trust in digital records: An increasingly cloudy legal area. Computer Law & Security Review 28, 5 (2012), 522 – 531.
[12]
Eric Goldman. 2020. An Introduction to the California Consumer Privacy Act (CCPA). Santa Clara Univ. Legal Studies Research Paper (2020).
[13]
John Goodenough, Howard Lipson, and Chuck Weinstock. 2007. Arguing security-creating security assurance cases. rapport en ligne (initiative build security-in du US CERT), Université Carnegie Mellon(2007).
[14]
Emily Howie. 2018. Protecting the human right to freedom of expression in international law. International journal of speech-language pathology 20, 1 (2018), 12–15.
[15]
ISO/IEC 27004:2016 2016. Information technology – Security techniques – Information security management – Monitoring, measurement, analysis and evaluation(second edition). Standard. International Organization for Standardization.
[16]
Orin S Kerr. 2001. Searching and seizing computers and obtaining electronic evidence in criminal investigations. Office of Legal Education, Executive Office for United States Attorneys.
[17]
Dave Larson and Jigang Liu. 2013. A New Security Metric for SOA Implementations. In Proceedings of the 2013 IEEE Seventh International Conference on Software Security and Reliability Companion(SERE-C ’13). IEEE Computer Society, Washington, DC, USA, 102–108.
[18]
Changwei Liu, Anoop Singhal, and Duminda Wijesekera. 2017. Identifying Evidence for Cloud Forensic Analysis. In Advances in Digital Forensics XIII, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer International Publishing, Cham, 111–130.
[19]
Rodney McKemmish. 2008. When is Digital Evidence Forensically Sound?. In Advances in Digital Forensics IV. Springer US, Boston, MA, 3–15.
[20]
Peter Mell, Karen Scarfone, and Sasha Romanosky. 2007. CVSS: A Complete Guide to the Common Vulnerability Scoring System Version 2.0. FIRST: Forum of Incident Response and Security Teams.
[21]
Waweru Mwangi, Wilson Cheruiyot, 2017. A survey of information retrieval techniques. Advances in Networks 5, 2 (2017), 40.
[22]
David Nuñez, Carmen Fernández-Gago, and Jesús Luna. 2016. Eliciting metrics for accountability of cloud systems. Computers & Security 62(2016), 149–164.
[23]
Muhammad Akbar Rivai, Jarot S Suroso, and Firman Pangemanan. 2020. Review of The Risk Analysis Using MEHARI Model: The Guideline To Analyze Risk For Startup Educational Platform. In 2020 International Conference on Information Management and Technology (ICIMTech). IEEE, 577–582.
[24]
Siti Rahayu Selamat, Shahrin Sahib, Nor Hafeizah, Robiah Yusof, and Mohd Faizal Abdollah. 2013. A forensic traceability index in digital forensic investigation. Journal of Information Security 4, 1 (2013), 19–32.

Cited By

View all
  • (2022)A forensic-driven data model for automatic vehicles events analysisPeerJ Computer Science10.7717/peerj-cs.8418(e841)Online publication date: 5-Jan-2022

Index Terms

  1. An Adaptative and Compliant Forensics Admissibility Metrics Generation Methodology
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence
        November 2021
        658 pages
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 December 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Cloud services
        2. Digital forensics
        3. Eliciting metrics methodology
        4. Foreniscs metrics

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • Deanship of scientific research at Umm Al-Qura University

        Conference

        iiWAS2021

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 21 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)A forensic-driven data model for automatic vehicles events analysisPeerJ Computer Science10.7717/peerj-cs.8418(e841)Online publication date: 5-Jan-2022

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media