By Topic

Using Digital Chains of Custody on Constrained Devices to Verify Evidence

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Bradford, P.G. ; Alabama Univ., Tuscaloosa ; Ray, D.A.

A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of custody using an algorithm by Jakobsson and by providing a new algorithm that compliments Jakobsson's algorithm. Our method assumes specialized hardware. The physical hardware is assumed to be memory and processor constrained. Our new algorithm is an online algorithm that generates a hash chain of n hash elements without knowledge of n before it starts. At the same time, as n grows our new algorithm stores only the [log n] pebbles which are inputs for Jakobsson's amortized hash chain traversal algorithm. Jakobsson's algorithm is then used to validate hash elements and thus the digital chain of custody. The complimentary algorithm presented here is used to generate and store the hash chain. The compact representation used by these algorithms is useful to store a large digital chain of custody on a small and constrained device. Our proposed method allows the use of constrained devices to validate complex and ephemeral data such as shipping manifests and handling logs.

Published in:

Intelligence and Security Informatics, 2007 IEEE

Date of Conference:

23-24 May 2007