dc.contributor.author |
Nelufule, Nthatheni
|
|
dc.contributor.author |
Singano, Zothile T
|
|
dc.contributor.author |
Shadung, Lesiba D
|
|
dc.contributor.author |
Masemola, Kelebogile B
|
|
dc.date.accessioned |
2024-06-11T08:53:17Z |
|
dc.date.available |
2024-06-11T08:53:17Z |
|
dc.date.issued |
2023-06 |
|
dc.identifier.citation |
Nelufule, N., Singano, Z.T., Shadung, L.D. & Masemola, K.B. 2023. Privacy-preservation and containment in IoT forensics investigations: A comparative study. http://hdl.handle.net/10204/13692 . |
en_ZA |
dc.identifier.uri |
979-8-3503-6932-8
|
|
dc.identifier.uri |
DOI: 10.1109/JAC-ECC61002.2023.10479652
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/13692
|
|
dc.description.abstract |
The Internet of Things has enabled unprecedented levels of devices connectivity and communication through data collection and sharing from multiple devices. These massive communications also introduced new challenges to digital forensics, particularly with respect to data security and privacy preservation. Internet of Things devices generate and collect massive amounts of sensitive data, including but not limited to personally identifiable information. These data may be valuable for digital forensics investigations, but it also raises significant data security and privacy. Digital forensic investigators must balance the need to collect and analyze evidence with the obligation to protect individual privacy. This article presents a concise but comprehensive comparative analysis of privacy-preserving Internet of Things forensic investigation techniques. The article also identifies some of the key challenges and opportunities in this emerging field and compares the different techniques available to digital forensic investigators. The article highlights the strengths, weaknesses, and applicability of each technique in various scenarios, providing valuable information for digital forensic investigators and researchers on how to select and implement the most appropriate techniques for their specific needs. |
en_US |
dc.format |
Fulltext |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://ieeexplore.ieee.org/abstract/document/10479652 |
en_US |
dc.relation.uri |
https://jac-ecc.ejust.edu.eg/ |
en_US |
dc.source |
International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023 |
en_US |
dc.subject |
Internet of Things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
Digital forensics |
en_US |
dc.subject |
Privacy Preservation |
en_US |
dc.subject |
Lightweight Cryptography |
en_US |
dc.subject |
Homomorphic Encryption |
en_US |
dc.subject |
Zero-Knowledge Proofs |
en_US |
dc.subject |
Trusted Execution Environments |
en_US |
dc.title |
Privacy-preservation and containment in IoT forensics investigations: A comparative study |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.description.pages |
4 |
en_US |
dc.description.note |
This is the preprint version of the document. |
en_US |
dc.description.cluster |
Defence and Security |
en_US |
dc.description.impactarea |
Inf and Cybersecurity Centre |
en_US |
dc.identifier.apacitation |
Nelufule, N., Singano, Z. T., Shadung, L. D., & Masemola, K. B. (2023). Privacy-preservation and containment in IoT forensics investigations: A comparative study. http://hdl.handle.net/10204/13692 |
en_ZA |
dc.identifier.chicagocitation |
Nelufule, Nthatheni, Zothile T Singano, Lesiba D Shadung, and Kelebogile B Masemola. "Privacy-preservation and containment in IoT forensics investigations: A comparative study." <i>International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023</i> (2023): http://hdl.handle.net/10204/13692 |
en_ZA |
dc.identifier.vancouvercitation |
Nelufule N, Singano ZT, Shadung LD, Masemola KB, Privacy-preservation and containment in IoT forensics investigations: A comparative study; 2023. http://hdl.handle.net/10204/13692 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Nelufule, Nthatheni
AU - Singano, Zothile T
AU - Shadung, Lesiba D
AU - Masemola, Kelebogile B
AB - The Internet of Things has enabled unprecedented levels of devices connectivity and communication through data collection and sharing from multiple devices. These massive communications also introduced new challenges to digital forensics, particularly with respect to data security and privacy preservation. Internet of Things devices generate and collect massive amounts of sensitive data, including but not limited to personally identifiable information. These data may be valuable for digital forensics investigations, but it also raises significant data security and privacy. Digital forensic investigators must balance the need to collect and analyze evidence with the obligation to protect individual privacy. This article presents a concise but comprehensive comparative analysis of privacy-preserving Internet of Things forensic investigation techniques. The article also identifies some of the key challenges and opportunities in this emerging field and compares the different techniques available to digital forensic investigators. The article highlights the strengths, weaknesses, and applicability of each technique in various scenarios, providing valuable information for digital forensic investigators and researchers on how to select and implement the most appropriate techniques for their specific needs.
DA - 2023-06
DB - ResearchSpace
DP - CSIR
J1 - International Japan - Africa Conference on Electronics, Communications & Computation (JAC-ECC 2023), Egypt-Japan University of Science and Technology (E-JUST), and Egypt University of Informatics (EUI), 18-20 December 2023
KW - Internet of Things
KW - IoT
KW - Digital forensics
KW - Privacy Preservation
KW - Lightweight Cryptography
KW - Homomorphic Encryption
KW - Zero-Knowledge Proofs
KW - Trusted Execution Environments
LK - https://researchspace.csir.co.za
PY - 2023
T1 - Privacy-preservation and containment in IoT forensics investigations: A comparative study
TI - Privacy-preservation and containment in IoT forensics investigations: A comparative study
UR - http://hdl.handle.net/10204/13692
ER -
|
en_ZA |
dc.identifier.worklist |
27456 |
en_US |