{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004797,"version":"3.40.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_2","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:46:09Z","timestamp":1736149569000},"page":"25-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring the Privacy of Digital Forensic Reports Using Searchable Symmetric Encryption"],"prefix":"10.1007","author":[{"given":"Aritro","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Pankaj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Sahani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"J. Beckett and J. Slay, Digital forensics: Validation and verification in a dynamic work environment, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, pp. 266a\u2013266a, 2007.","DOI":"10.1109\/HICSS.2007.175"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"D. Boneh, G. Di Crescenzo, R. Ostrovsky and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology \u2013 EUROCRYPT 2004: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, C. Cachin and J. Camenisch (Eds.), Springer, Berlin Heidelberg, Germany, pp. 506\u2013522, 2004.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2_CR3","unstructured":"\u2018 B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"2_CR4","unstructured":"E. Casey, Digital Evidence and Computer Crime, Elsevier, London, United Kingdom, 2011."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"F. Cohen, Column: Putting the science in digital forensics, Journal of Digital Forensics, Security and Law, vol. 6(1), article no. 1, 2011.","DOI":"10.15394\/jdfsl.2011.1085"},{"key":"2_CR6","unstructured":"M. Dahiya, Study on e-commerce and its impacts on market and retailers in India, Advances in Computational Sciences and Technology, vol. 10(5), pp. 1495\u20131500, 2017."},{"key":"2_CR7","unstructured":"G. Fenu and F. Solinas, Computer forensics investigation: An approach to evidence in cyberspace, Proceedings of the Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensics, pp. 4\u20136, 2013."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"E. Goh, Secure Indexes, Cryptology ePrint Archive, paper no. 2003\/216 (eprint.iacr.org\/2003\/216), 2003.","DOI":"10.1108\/09696470310476981"},{"key":"2_CR9","unstructured":"A. Greenberg, Hack brief: Anonymous stole and leaked a megatrove of police documents, Wired, July 22, 2020."},{"key":"2_CR10","unstructured":"K. Jones, R. Bejtlich and C. Rose, Real Digital Forensics: Computer Security and Incident Response, Addison-Wesley Professional, Upper Saddle River, New Jersey, 2005."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"M. Kohn, M. Eloff and J. Eloff, Integrated digital forensic process model, Computers and Security, vol. 38, pp. 103\u2013115, 2013.","DOI":"10.1016\/j.cose.2013.05.001"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"I. Lin, H. Yang, G. Gu and A. Lin, A study of information and communication security forensic technology capability in Taiwan, Proceedings of the Thirty-Seventh International Carnahan Conference on Security Technology, pp. 386\u2013393, 2003.","DOI":"10.1109\/CCST.2003.1297591"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Q. Liu, G. Wang and J. Wu, Secure and privacy preserving keyword searching for cloud storage services, Journal of Network and Computer Applications, vol. 35(3), pp. 927\u2013933, 2012.","DOI":"10.1016\/j.jnca.2011.03.010"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"M. Losavio, K. Chow, A. Koltay and J. James, The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy and security, Security and Privacy, vol. 1(3), article no. e23, 2018.","DOI":"10.1002\/spy2.23"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"B. Martini and K. Choo, An integrated conceptual digital forensic framework for cloud computing, Digital Investigation, vol. 9(2), pp. 71\u201380, 2012.","DOI":"10.1016\/j.diin.2012.07.001"},{"key":"2_CR16","unstructured":"R. McKemmish, What is forensic computing? Trends and Issues in Crime and Criminal Justice, no. 118, 2002."},{"key":"2_CR17","unstructured":"G. Mohay, A. Anderson, B. Collie, O. de Vel and R. McKemmish, Computer and Intrusion Forensics, Artech House, Norwood, Massachusetts, 2003."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"A. Nieto, R. Rios, J. Lopez, W. Ren, L. Wang, K. Choo and F. Xhafa, Privacy-Aware Digital Forensics, Institute of Engineering and Technology, London, United Kingdom, 2019.","DOI":"10.1049\/PBPC028E_ch8"},{"key":"2_CR19","unstructured":"D. Olenick, Police data leaked: A sign of the times? BankInfoSecurity (www.bankinfosecurity.com\/police-data-leaked-sign-times-a-14488), June 23, 2020."},{"key":"2_CR20","unstructured":"G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, 2001."},{"key":"2_CR21","unstructured":"L. Pan and L. Batten, Reproducibility of digital evidence in forensic investigations, Proceedings of the Digital Forensic Research Workshop, 2005."},{"key":"2_CR22","unstructured":"M. Reith, C. Carr and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"P. Rita, T. Oliveira and A. Farisa, The impact of e-service quality and customer satisfaction on customer behavior in online shopping, Heliyon, vol. 5(10), article no. e026905, 2019.","DOI":"10.1016\/j.heliyon.2019.e02690"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"L. Ryz and L. Grest, A new era in data protection, Computer Fraud and Security, vol. 2016(3), pp. 18\u201320, 2016.","DOI":"10.1016\/S1361-3723(16)30028-8"},{"key":"2_CR25","unstructured":"D. Solove, Understanding Privacy, Harvard University Press, Cambridge, Massachusetts, 2008."},{"key":"2_CR26","unstructured":"D. Solove and P. Schwartz, Information Privacy Law, Aspen Publishing, Frederick, Maryland, 2020."},{"key":"2_CR27","unstructured":"D. Song, D. Wagner and A. Perrig, Practical techniques for searches on encrypted data, Proceedings of the IEEE Symposium on Security and Privacy, pp. 44\u201355, 2000."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"F. Tseng, R. Chen and B. Lin, iPEKS: Fast and secure cloud data retrieval from public-key encryption with keyword search, Proceedings of the Twelfth IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 452\u2013458, 2013.","DOI":"10.1109\/TrustCom.2013.57"},{"key":"2_CR29","unstructured":"United Nations, Universal Declaration of Human Rights, Geneva, Switzerland (www.un.org\/sites\/un2.un.org\/files\/2021\/03\/udhr.pdf), 1948."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:15:38Z","timestamp":1745320538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}