Computer Science ›› 2016, Vol. 43 ›› Issue (7): 131-135.doi: 10.11896/j.issn.1002-137X.2016.07.023

Previous Articles     Next Articles

Trustworthiness Analysis of Digital Evidences Based on Chain of Evidences

ZHAO Zhi-yan and SHI Wen-chang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Computers are necessary in our lives along with the popularization of information technology,and they are also important tools in criminal activities.Digital evidences often play a major role in the judicial case or trial,but digital evidences have usually been questioned in the courts because they are easy to forge.To prove the trustworthiness of di-gital evidences is a big challenge of forensic research.In this paper,we put forward a framework to analyze trustworthiness of digital evidences based on chain of evidences by means of building chain to access associated evidences and ju-dging the consistency among evidences to deduce the their trustworthiness.

Key words: Chain of evidences,Digital evidences,Framework,Trustworthiness

[1] Wang Fang.The nature of digital evidence and the related rules[J].Law Science,2004,273(8):72-79(in Chinese) 王芳.数字证据的性质及相关规则[J].法学,2004,273(8):72-79
[2] Caloyannides M A.Forensics Is So "Yesterday"[J].Security & Privacy IEEE,2009,7(2):18-25
[3] Anobah M,University S,Saleem S,et al.Testing Frameworkfor Mobile Device Forensics Tools[J].Journal of Digital Forensics Security & Law,2014,9(2):221-234
[4] Casey E,Casey E.Error,Uncertainty and Loss in Digital Evi-dence[J].International Journal of Digital Evidence,2002,1(2):1-45
[5] Erbacher R F.Validation for Digital Forensics[C]∥2010 Se-venth International Conference on Information Technology:New Generations (ITNG).IEEE,2010:756-761
[6] Jansen A.Digital Records Forensics:Ensuring Authenticity and Trustworthiness of Evidence Over Time[C]∥ International Workshop on Systematic Approaches to Digital Forensic Engineering.2010:84-88
[7] Adams R,Hobbs V,Mann G.The Advanced Data Acquisition Model (ADAM):A Process Model For Digital Forensic Practice[J].Journal of Digital Forensics Security & Law,2014,8(4):25-48
[8] Horsman G,Laing C,Vickers P.A Case Based ReasoningFramework for Improving the Trustworthiness of Digital Forensic Investigations[C]∥2013 12th IEEE International Confe-rence on Trust,Security and Privacy in Computing and Communications.IEEE,2012:682-689
[9] Tanne A L,Dampie D A.An Approach for Managing Know-ledge in Digital Forensic Examinations[J].International Journal of Computer Science & Security,2010,4(5):451-465
[10] Kwan M,Chow K P,Law F,et al.Reasoning about evidenceusing Bayesian network[J].Advances in Digital Forensics IV Ch,2008,12(3):263-278
[11] Cohen F.A method for forensic analysis of control[J].Compu-ters & Security,2010,29(8):891-902
[12] Levine B N,Liberatore M.DEX:Digital evidence provenancesupporting reproducibility and comparison[J].Digital Investigation the International Journal of Digital Forensics & Incident Response,2009,6:48-56
[13] Tian Z H,Yu X Z,Zhang H L,et al.A Real-Time Network Intrusion Forensics Method Based on Evidence Reasoning Network[J].Chinese Journal of Computers,2014,37(5):1184-1194(in Chinese) 田志宏,余翔湛,张宏莉,等.基于证据推理网络的实时网络入侵取证方法[J].计算机学报,2014,37(5):1184-1194
[14] Casey E.Digital Evidence and Computer Crime-ForensicScien-ce,Computers and the Internet(3rd Edition)[M].Elsevier,2011
[15] Case A,Cristina A,Marziale L,et al.FACE:Automated digital evidence discovery and correlation[J].Digital Investigation,2008,5(Suppl 1):65-75

No related articles found!
Full text



No Suggested Reading articles found!