Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform

Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform

Zbigniew Kwecka, William J. Buchanan
Copyright: © 2012 |Pages: 20
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch713
Cite Chapter Cite Chapter

MLA

Kwecka, Zbigniew, and William J. Buchanan. "Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1620-1639. https://doi.org/10.4018/978-1-61350-323-2.ch713

APA

Kwecka, Z. & Buchanan, W. J. (2012). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1620-1639). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch713

Chicago

Kwecka, Zbigniew, and William J. Buchanan. "Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1620-1639. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch713

Export Reference

Mendeley
Favorite

Abstract

Investigators often define invasion of privacy as collateral damage. Inquiries that require gathering data from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impact the relationship between the data subject and the data controller. In this research a novel privacy-preserving approach to mitigate collateral damage during the acquisition process is presented. This approach is based on existing Private Information Retrieval (PIR) protocols, which cannot be employed in an investigative context. This paper provides analysis of the investigative data acquisition process and proposes three modifications that can enable existing PIR protocols to perform investigative enquiries on large databases, including communication traffic databases maintained by ISPs. IDAP is an efficient Symmetric PIR (SPIR) protocol optimised for the purpose of facilitating public authorities’ enquiries for evidence. It introduces a semi-trusted proxy into the PIR process in order to gain the acceptance of the general public. In addition, the dilution factor is defined as the level of anonymity required in a given investigation. This factor allows investigators to restrict the number of records processed, and therefore, minimise the processing time, while maintaining an appropriate level of privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.