Venkata Venugopal Rao Gudlur Saigopal, Dr. Valliappan Raju
{"title":"IoT based Secure Digital Forensic Process according to Process Management","authors":"Venkata Venugopal Rao Gudlur Saigopal, Dr. Valliappan Raju","doi":"10.1109/ICCI51257.2020.9247710","DOIUrl":null,"url":null,"abstract":"the implementation of Secure FI process by digitally by adapting the IoT based connecting many wireless smart devices may expose security vulnerabilities. The DF related to IoT based can be characterized as a field of study however ought to be utilized in defensive condition which is absence of the present world and the use of innovative and constant techniques for collect, preserve, validate, analyze, interpret and present the evidences extracted using the forensic tools and carefully separated from various sources and presenting official courtroom for justice and fair judicial processor legal cycle. The IoT smart devices will require appropriate procedural and ensured remote condition with safer and secure information reinforcement in place from secure home control to cutting edge city the executives connected networks. The smart gadgets will detect their condition with interconnected one another to shape canny brilliant spaces and any suspected or unapproved occasion will be put away and set off to the requirement office to heighten the issue or Forensic examination [1], [2]. These smart devices all things considered produce and store enormous sum delicate criminological information. The paper clarifies the current Process by zeroing in and improving on pre and post examination measure with more solid and secure cycle with back up Data stockpiling with proof. The information stream from Pre-examination to post examination and capacity or cloud-based focusing on key zones of character on irregular action registering impressions to the worker (pre-examination) when recognized and continue to post examination with assessment and sparing the information in to make sure storage.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Intelligence (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCI51257.2020.9247710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
the implementation of Secure FI process by digitally by adapting the IoT based connecting many wireless smart devices may expose security vulnerabilities. The DF related to IoT based can be characterized as a field of study however ought to be utilized in defensive condition which is absence of the present world and the use of innovative and constant techniques for collect, preserve, validate, analyze, interpret and present the evidences extracted using the forensic tools and carefully separated from various sources and presenting official courtroom for justice and fair judicial processor legal cycle. The IoT smart devices will require appropriate procedural and ensured remote condition with safer and secure information reinforcement in place from secure home control to cutting edge city the executives connected networks. The smart gadgets will detect their condition with interconnected one another to shape canny brilliant spaces and any suspected or unapproved occasion will be put away and set off to the requirement office to heighten the issue or Forensic examination [1], [2]. These smart devices all things considered produce and store enormous sum delicate criminological information. The paper clarifies the current Process by zeroing in and improving on pre and post examination measure with more solid and secure cycle with back up Data stockpiling with proof. The information stream from Pre-examination to post examination and capacity or cloud-based focusing on key zones of character on irregular action registering impressions to the worker (pre-examination) when recognized and continue to post examination with assessment and sparing the information in to make sure storage.