CFP last date
20 January 2025
Reseach Article

A Framework for Digital Forensic Investigation using Authentication Technique to maintain Evidence Integrity

by Umesh Kumar Singh, Neha Gaud, Chanchala Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 6
Year of Publication: 2016
Authors: Umesh Kumar Singh, Neha Gaud, Chanchala Joshi
10.5120/ijca2016912145

Umesh Kumar Singh, Neha Gaud, Chanchala Joshi . A Framework for Digital Forensic Investigation using Authentication Technique to maintain Evidence Integrity. International Journal of Computer Applications. 154, 6 ( Nov 2016), 1-3. DOI=10.5120/ijca2016912145

@article{ 10.5120/ijca2016912145,
author = { Umesh Kumar Singh, Neha Gaud, Chanchala Joshi },
title = { A Framework for Digital Forensic Investigation using Authentication Technique to maintain Evidence Integrity },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 6 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number6/26492-2016912145/ },
doi = { 10.5120/ijca2016912145 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:28.732241+05:30
%A Umesh Kumar Singh
%A Neha Gaud
%A Chanchala Joshi
%T A Framework for Digital Forensic Investigation using Authentication Technique to maintain Evidence Integrity
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 6
%P 1-3
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital evidence is information stored or transmitted in binary form that may be relied in an investigation. Digital evidence is the core for any digital forensic investigation that takes many forms and can be found in several places. It is the evidence on which whole investigation travel and reach to an exact conclusion. Ultimately we can say that any a little bit of alteration with collected data could impact to final result, which would be extremely dangerous to grab an innocent one. In this research work we proposed a framework that covers space to lead an investigation and will keep behind all possible jeopardizes action by achieving evidence integrity associated with evidence classification and to make use of chain of custody in an appropriate position.

References
  1. Bobbler.M.M, Solms S.H.von.Modelling Live Forensic Acquisition, Workshop on digital Forensic Incident analysis (WDFIA 2009).
  2. R.Ieong FORZA digital forensics investigation frameworkthat incorporates legal issues,Digital Investigation.
  3. Vlachopoulos.K., Magkos S.E., and chrissikopoulous V.AModels for Hybrid Evidence Investigation
  4. J.cosic,Z.cosic,M.Baca,chain of digital evidence basedmodel of digital forensic investigationprocesses,International Journal of computer Science andInformation Security.
  5. Ciardhuain, s.(2004) An extended model of cyber crimeinvestigation Accessed on 20 october 2011 Available onwww.ijde.org/citeseerxist.psu/viewdoc/download?doi=10.1.1.80...Accessed on 11August 2011.
  6. Baryamureaba, V. Tushabe, F.(2004) The Enhanceddigital investigation process (2004) Available(online);http://www.dfrws.org/2004/bios/day 1/tushabeEIDIP.pdf Accessed on 15 june.
  7. Reith,M.Carr.C.Gunsch,G.(2002)an examination of digitalforensic model.Department of Electrical and ComputerEngineering Air Force institute of tehnology.Wright Patterson.Available(online)http://www.utica.edu accessed on the 7october 2011.
Index Terms

Computer Science
Information Sciences

Keywords

DigitalEvidence Evidenceintegrity EvidenceAuthentication Digital Investigation Models