ResearchSpace

Privacy-preservation and containment in IoT forensics investigations: A comparative study

Show simple item record

dc.contributor.author Nelufule, Nthatheni
dc.contributor.author Singano, Zothile T
dc.contributor.author Shadung, Lesiba D
dc.contributor.author Masemola, Kelebogile B
dc.date.accessioned 2024-06-11T08:53:17Z
dc.date.available 2024-06-11T08:53:17Z
dc.date.issued 2023-06
dc.identifier.citation Nelufule, N., Singano, Z.T., Shadung, L.D. & Masemola, K.B. 2023. Privacy-preservation and containment in IoT forensics investigations: A comparative study. http://hdl.handle.net/10204/13692 . en_ZA
dc.identifier.uri 979-8-3503-6932-8
dc.identifier.uri DOI: 10.1109/JAC-ECC61002.2023.10479652
dc.identifier.uri http://hdl.handle.net/10204/13692
dc.description.abstract The Internet of Things has enabled unprecedented levels of devices connectivity and communication through data collection and sharing from multiple devices. These massive communications also introduced new challenges to digital forensics, particularly with respect to data security and privacy preservation. Internet of Things devices generate and collect massive amounts of sensitive data, including but not limited to personally identifiable information. These data may be valuable for digital forensics investigations, but it also raises significant data security and privacy. Digital forensic investigators must balance the need to collect and analyze evidence with the obligation to protect individual privacy. This article presents a concise but comprehensive comparative analysis of privacy-preserving Internet of Things forensic investigation techniques. The article also identifies some of the key challenges and opportunities in this emerging field and compares the different techniques available to digital forensic investigators. The article highlights the strengths, weaknesses, and applicability of each technique in various scenarios, providing valuable information for digital forensic investigators and researchers on how to select and implement the most appropriate techniques for their specific needs. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://ieeexplore.ieee.org/abstract/document/10479652 en_US
dc.relation.uri https://jac-ecc.ejust.edu.eg/ en_US
dc.source International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023 en_US
dc.subject Internet of Things en_US
dc.subject IoT en_US
dc.subject Digital forensics en_US
dc.subject Privacy Preservation en_US
dc.subject Lightweight Cryptography en_US
dc.subject Homomorphic Encryption en_US
dc.subject Zero-Knowledge Proofs en_US
dc.subject Trusted Execution Environments en_US
dc.title Privacy-preservation and containment in IoT forensics investigations: A comparative study en_US
dc.type Conference Presentation en_US
dc.description.pages 4 en_US
dc.description.note This is the preprint version of the document. en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Inf and Cybersecurity Centre en_US
dc.identifier.apacitation Nelufule, N., Singano, Z. T., Shadung, L. D., & Masemola, K. B. (2023). Privacy-preservation and containment in IoT forensics investigations: A comparative study. http://hdl.handle.net/10204/13692 en_ZA
dc.identifier.chicagocitation Nelufule, Nthatheni, Zothile T Singano, Lesiba D Shadung, and Kelebogile B Masemola. "Privacy-preservation and containment in IoT forensics investigations: A comparative study." <i>International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023</i> (2023): http://hdl.handle.net/10204/13692 en_ZA
dc.identifier.vancouvercitation Nelufule N, Singano ZT, Shadung LD, Masemola KB, Privacy-preservation and containment in IoT forensics investigations: A comparative study; 2023. http://hdl.handle.net/10204/13692 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Nelufule, Nthatheni AU - Singano, Zothile T AU - Shadung, Lesiba D AU - Masemola, Kelebogile B AB - The Internet of Things has enabled unprecedented levels of devices connectivity and communication through data collection and sharing from multiple devices. These massive communications also introduced new challenges to digital forensics, particularly with respect to data security and privacy preservation. Internet of Things devices generate and collect massive amounts of sensitive data, including but not limited to personally identifiable information. These data may be valuable for digital forensics investigations, but it also raises significant data security and privacy. Digital forensic investigators must balance the need to collect and analyze evidence with the obligation to protect individual privacy. This article presents a concise but comprehensive comparative analysis of privacy-preserving Internet of Things forensic investigation techniques. The article also identifies some of the key challenges and opportunities in this emerging field and compares the different techniques available to digital forensic investigators. The article highlights the strengths, weaknesses, and applicability of each technique in various scenarios, providing valuable information for digital forensic investigators and researchers on how to select and implement the most appropriate techniques for their specific needs. DA - 2023-06 DB - ResearchSpace DP - CSIR J1 - International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023 KW - Internet of Things KW - IoT KW - Digital forensics KW - Privacy Preservation KW - Lightweight Cryptography KW - Homomorphic Encryption KW - Zero-Knowledge Proofs KW - Trusted Execution Environments LK - https://researchspace.csir.co.za PY - 2023 T1 - Privacy-preservation and containment in IoT forensics investigations: A comparative study TI - Privacy-preservation and containment in IoT forensics investigations: A comparative study UR - http://hdl.handle.net/10204/13692 ER - en_ZA
dc.identifier.worklist 27456 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record