Skip to main content
Log in

A framework for unified digital evidence management in security convergence

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Digital Forensics is being actively researched and performed in various areas against changing IT environment such as mobile phone, e-commerce, cloud service and video surveillance. Moreover, it is necessary to research unified digital evidence management for correlation analysis from diverse sources. Meanwhile, various triage approaches have been developed to cope with the growing amount of digital evidence being encountered in criminal cases, enterprise investigations and military contexts. Despite of debating over whether triage inspection is necessary or not, it will be essential to develop a framework for managing scattered digital evidences. This paper presents a framework with unified digital evidence management for appropriate security convergence, which is based on triage investigation. Moreover, this paper describes a framework in network video surveillance system to shows how it works as an unified evidence management for storing diverse digital evidences, which is a good example of security convergence.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69.

    Article  Google Scholar 

  2. Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383–400.

    Article  Google Scholar 

  3. Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456.

    Article  Google Scholar 

  4. Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223.

    Article  Google Scholar 

  5. Lim, K.-S., Park, J., Lee, C., & Lee, S. (2011). A new proposal for a digital evidence container for triage investigation. In ICCSCE’11.

    Google Scholar 

  6. Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrot, S. (2006). Computer forensics field triage process model. In Conference on digital forensics, security and law.

    Google Scholar 

  7. Richard, G. G. III, Roussev, V., & Marziale, L. (2007). Forensic discovery auditing of digital evidence containers. Digital Investigation, 4, 88–97.

    Article  Google Scholar 

  8. Lim, K.-s., Lee, S., & Lee, S. (2009). Applying a stepwise forensic approach to incident response and computer usage analysis. In 2nd international conference on computer science and its application (CSA 2009).

    Google Scholar 

  9. Turner, P. (2005). Unification of digital evidence from disparate sources (digital evidence bags). Digital Investigation, 2(3), 223–228.

    Article  Google Scholar 

  10. Turner, P. (2006). Selective and intelligent imaging using digital evidence bags. Digital Investigation, 3 Supplement, 59–64.

    Article  Google Scholar 

  11. Turner, P. (2007). Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation, 4(1), 30–35.

    Article  Google Scholar 

  12. Encase Portable kits. http://www.guidancesoftware.com/encase-portable.htm.

  13. IP camera definition. http://en.wikipedia.org/wiki/IP_camera.

  14. Chang, K., Chen, C., Chen, J., & Chao, H. (2010). Challenges to next generation services in IP multimedia subsystem. Journal of Information Processing Systems, 6(2), 129–146.

    Article  Google Scholar 

  15. CCTV definition. http://en.wikipedia.org/wiki/Closed_circuit_elevision.

  16. Satone, M., & Kharate, D. G. (2012). Face Recognition based on PCA on wavelet subband of average-half-face. Journal of Information Processing Systems, 8(3), 483–494.

    Article  Google Scholar 

  17. Nagi, G. M., Rahmat, R., Khalid, F., & Taufik, M. (2013). Region-based facial expression recognition in still images. Journal of Information Processing Systems, 9(1), 173.

    Article  Google Scholar 

  18. Ghimire, D., & Lee, J. (2013). A robust face detection method based on skin color and edges. Journal of Information Processing Systems, 9(1), 141–156.

    Article  Google Scholar 

  19. Axis’s video management sofware. http://www.axis.com/products/video/about_networkvideo/platforms.htm.

  20. PKZip file structure. http://www.absolutestronomy.com/topics/ZIP_(file_format).

  21. Lim, K.-S., & Lee, C. (2012). Applying forensic approach to live investigation using XeBag. In Computer science and its applications.

    Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number 2010-0005571).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changhoon Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lim, KS., Lee, C. A framework for unified digital evidence management in security convergence. Electron Commer Res 13, 379–398 (2013). https://doi.org/10.1007/s10660-013-9119-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-013-9119-y

Keywords

Navigation