•  
  •  
 

Abstract

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade AntiTamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an eDiscovery application on a prototype was executed and the results are reported here.

References

[1] Mitsuyuki Takatsuka, Masataka Tada, Ryoichi Sasaki, “Proposal of the eDiscovery System for Sanitizing Disclosure Information and for Securing Evidence”, The 2007 International Workshop on Forensics for Future Generation Communication Environment (2008)

[2] Yuki Ashino,Ryoichi Sasaki, “Proposal of Digital Forensic System Using Security Device and Hysteresis Signature”, The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2007)

[3] Keisuke Fujita, Yuki Ashino, Tetsuro , Uehara, Ryoichi Sasaki, “Proposal of Digital Forensic System with a Boot Control Function against Unauthorized Programs”, 4th Annual IFIP WG11.9 Conference on Digital Forensics (2008)

[4] Kunihiko Miyazaki,seiichi siozaki,Mituru Iwamura,Tsutomu matsumoto,Ryoichi Sasaki,Hiroshi Yoshiura, “The issue of electronic document sumi coating”,ISEC2003-20, pp61-67 (2003)

[5] e-WORD Digital Forensic, “digital forensics”, http://ewords.jp/w/E38387E382B8E382BFE383ABE38395E382A9E383ACE383B3E382B8E38383E 382AF.html, (2008.2)

[6] Ji2 eDiscovery:Service outline, http://www.ji2.co.jp/service/ediscovery/, (2008.2)

[7]Ryoichi Sasaki, “@police No. 8 security commentary digital Forensic, ”http://www.cyberpolice.go.jp/column/explanation08.html, (2008.2)

[8] EnCase, “About e-Discovery”, http://www.encase.jp/glossary/eDiscovery.html(2008.2)

[9] Mitsuru Iwamura,Kunihiko Miyazaki,Tutom Matsumoto,Ryoichi Sasaki,Takeshi Takeshi, “Pass with the issue of alibi proof in the e-signature; the issue of time proof-A hysteresis signature and the concept of digital ancient documents-”, Computer science magazine bit Vol32, No11 (2000)

[10] Ron.Steinfeld ,Laurence.Bull,and Yuliang.Zheng, "Content Extraction Signatures", ICISC 2001,pp285-304(2001)

[11] Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsuro Uehara, Ryoichi Sasaki, “Extension and Evaluation of Boot Control for a Digital Forensic System”, 5th Annual IFIP WG11.9 Conference on Digital Forensic (2009)

DOI

http://doi.org/10.15394/jdfsl.2010.1073

Share

COinS
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.