RESEARCH CHALLENGES & OPEN PROBLEMS IN DIGITAL FORENSICS (DF)
Keywords:
Cyber Crime, forensics models, Investigation, Analysis, digital devices.Abstract
Digital forensics is a branch of forensic science concerned with the use of digital information produced, stored and transmitted by computers as source of evidence in investigations and legal proceedings. Digital forensics has existed for as long as computers have stored data that could be used as evidence. For many years, digital forensics was performed primarily by government agencies, but has become common in the commercial sector over the past several years. Originally, much of the analysis software was custom and proprietary and eventually specialized analysis software was made available for both the private and public sectors. The first part of this paper provides a brief overview of digital forensics Process, followed by the models of digital forensics. In the further part of the paper, we consider the need of the “Digital Forensic Investigation Model” which is currently an active area of research in the academic world, which aims to ameliorate procedures followed in this field. At last, we discuss challenges and future scope of digital forensics.
References
R. Sandhu, D. Ferraiolo, and R. Kuhn, “The NIST Model for Role-based Access Control: Towards a Unfiied Standard,” in Proc. the fifth ACM workshop on Role-based access control 47-63, 2000.
N. Safoev, and J. C. Jeon, “Reliable Design of Reversible Universal Gate Based on QCA,” Advanced Science Letters, vol. 23(10), pp. 9818-9823, 2017.
An Introduction to Role-Based Access Control, ITL, NIST, December 1995.
Irgasheva D. Indicators of Efficiency of Synthesis of Access Control Systems //2021 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2021. – С. 1-4.
Irgasheva D. On the Basic Method for Solving the Problem of Synthesizing Access Control Systems //2020 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2020. – С. 1-4.
Oracle System Administration Guide: Security Services. http://docs.oracle.com/cd/E19963-01/html/821-1456/concept-1.html
N. T. Abdelmajid, M. A. Hossain, S. Shepherd, and K. Mahmoud, “Location-Based Kerberos Authentication Protocol,” in Proc. IEEE Second International Conference On Social Computing (SosialCom), 20-22 August, 2010, pp. 1099-1104.
N. Safoev and J. C. Jeon, "Implementation of high-speed shifting operation in quantum-dot cellu-lar automata technology." Int J Mech Eng Technol. Vol. 10 (2), pp. 576-586, (2019).
Safoev N, Jeon JC (2020) Design of high-performance QCA incrementer/decrementer circuit based on adder/subtractor methodology. Microprocess Microsyst 72:102927
A. Rosenthal, L. Seligman, and A. Chapman, “Barbara Blaustein, Scalable Access Controls for lineage,” in Proc. TAPP09 First Workshop on Theory and Practice of Provenance
N. Safoev and J. C. Jeon, "Low Complexity Design of Conservative QCA with Two-Pair Error Checker." Advanced Science Letters. Vol. 23 (10), pp. 10077-10081, (2017).
K.-Q. Guan, H.-X. Li, and X.-L. Kong, “Application of RBAC Model in System Kernel,” TELKOMNIKA, vol. 10, no. 7, pp. 1541-1546, November 2012.
Safoev N, Ahmed S, Tashev K, Naz SF. Design of fault tolerant bifunctional parity generator and scalable code converters based on QCA technology. International Journal of Information Technology. 2022 Mar;14(2):991-8.
R. Boutaba, W. Ng, and L.-G. Alberto, “Web-Based Customer Management of VPNs,” Journal of Network and Systems Management, vol. 9, issue 1, pp. 67-87, March, 2001.
H. Schroeder, “VPN resource connectivity in large-scale enterprise networks,” US Patent 8443435 B1, May 14, 2013.