IoT based Secure Digital Forensic Process according to Process Management

Venkata Venugopal Rao Gudlur Saigopal, Dr. Valliappan Raju
{"title":"IoT based Secure Digital Forensic Process according to Process Management","authors":"Venkata Venugopal Rao Gudlur Saigopal, Dr. Valliappan Raju","doi":"10.1109/ICCI51257.2020.9247710","DOIUrl":null,"url":null,"abstract":"the implementation of Secure FI process by digitally by adapting the IoT based connecting many wireless smart devices may expose security vulnerabilities. The DF related to IoT based can be characterized as a field of study however ought to be utilized in defensive condition which is absence of the present world and the use of innovative and constant techniques for collect, preserve, validate, analyze, interpret and present the evidences extracted using the forensic tools and carefully separated from various sources and presenting official courtroom for justice and fair judicial processor legal cycle. The IoT smart devices will require appropriate procedural and ensured remote condition with safer and secure information reinforcement in place from secure home control to cutting edge city the executives connected networks. The smart gadgets will detect their condition with interconnected one another to shape canny brilliant spaces and any suspected or unapproved occasion will be put away and set off to the requirement office to heighten the issue or Forensic examination [1], [2]. These smart devices all things considered produce and store enormous sum delicate criminological information. The paper clarifies the current Process by zeroing in and improving on pre and post examination measure with more solid and secure cycle with back up Data stockpiling with proof. The information stream from Pre-examination to post examination and capacity or cloud-based focusing on key zones of character on irregular action registering impressions to the worker (pre-examination) when recognized and continue to post examination with assessment and sparing the information in to make sure storage.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Intelligence (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCI51257.2020.9247710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

the implementation of Secure FI process by digitally by adapting the IoT based connecting many wireless smart devices may expose security vulnerabilities. The DF related to IoT based can be characterized as a field of study however ought to be utilized in defensive condition which is absence of the present world and the use of innovative and constant techniques for collect, preserve, validate, analyze, interpret and present the evidences extracted using the forensic tools and carefully separated from various sources and presenting official courtroom for justice and fair judicial processor legal cycle. The IoT smart devices will require appropriate procedural and ensured remote condition with safer and secure information reinforcement in place from secure home control to cutting edge city the executives connected networks. The smart gadgets will detect their condition with interconnected one another to shape canny brilliant spaces and any suspected or unapproved occasion will be put away and set off to the requirement office to heighten the issue or Forensic examination [1], [2]. These smart devices all things considered produce and store enormous sum delicate criminological information. The paper clarifies the current Process by zeroing in and improving on pre and post examination measure with more solid and secure cycle with back up Data stockpiling with proof. The information stream from Pre-examination to post examination and capacity or cloud-based focusing on key zones of character on irregular action registering impressions to the worker (pre-examination) when recognized and continue to post examination with assessment and sparing the information in to make sure storage.
基于流程管理的物联网安全数字取证流程
通过数字方式实现安全FI过程,通过适应基于物联网的连接许多无线智能设备可能会暴露安全漏洞。与物联网相关的DF可以被定性为一个研究领域,但应该在缺乏当前世界的防御条件下使用,并使用创新和持续的技术来收集,保存,验证,分析,解释和呈现使用法医工具提取的证据,并从各种来源中仔细分离,并呈现官方法庭正义和公平的司法处理器法律周期。物联网智能设备将需要适当的程序和确保远程条件,从安全的家庭控制到尖端的城市管理人员连接的网络,需要更安全、更可靠的信息强化。这些智能设备将检测它们的状态,并相互连接,形成精明的辉煌空间,任何可疑或未经批准的场合将被搁置,并送到需求办公室进行强化问题或法医检查[1],[2]。这些智能设备产生并存储了大量微妙的犯罪信息。本文通过对前后考核措施的归零和改进,明确了目前的流程,建立了更可靠、安全的周期,并进行了备份数据的存档和证明。信息流从预检到后检,容量或云化,集中在关键的性格区域,不规范的动作,在识别后给工人留下印象(预检),并继续进行后检评估,并保留信息,以确保存储。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信