Forthcoming articles


International Journal of Electronic Security and Digital Forensics


These articles have been peer-reviewed and accepted for publication in IJESDF, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJESDF are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Electronic Security and Digital Forensics (8 papers in press)


Regular Issues


  • The preservation of digital evidence and its admissibility in the court   Order a copy of this article
    by Fernando T. Molina Granja, Glen D. Rodríguez Rafael 
    Abstract: This articles objective is to screen and analyze the common models of digital preservation that exist, the elements, the degree of compliance with the general guidelines, the use of techniques and compliance with specific requirements as well as to evaluate the need for a solution to the environment of criminal investigation institutions, in the scenario that lacks a specific model. The importance of the preservation of digital objects is currently heavily analyzed. Several aspects may serve to make the digital objects worthless, such as the uselessness of hardware, the deficiency of ancient computing formats to support their use, human errors, and malicious software. The majority of crimes currently have a digital component, such that Governments and the police are obliged by law to indefinitely hold digital evidence for a cases history. Until the presentation of the digital evidence in Court, the evidence must be collected, preserved and properly distributed. The systems currently used often involve multiple steps that do not meet the demands of the growing digital world. The volume of digital evidence continues to grow, and these steps will soon become operationally and economically unfeasible for agencies responsible for performing these tasks.
    Keywords: digital preservation;digital evidence;preservation of digital evidence;admissibility of evidence; criminal investigation institutions; cybercrime; preservation model; integrity of evidence.

  • Cryptographic Collusion-resistant Protocols for Secure Sum   Order a copy of this article
    by Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi 
    Abstract: Secure summation is one of the most applicable functions of secure multiparty computation (MPC) in which a group of users securely computes the summation value of their private inputs. The current solutions to this problem are basically on adding a random number to private inputs or splitting the inputs among users which need secure channel among members. Moreover, to be resistant against collusion of n-2 players, they impose high communication cost. In this paper, we propose three cryptography-based protocols for secure sum that do not need secure channel and are secure against collusion of n-2 players. Also, the communication cost of the proposed protocols is of complexity O(n). Based on the privacy requirements, the proposed protocols can provide the final result privacy as well as the private input privacy.
    Keywords: Multiparty Computation; Cryptography; Data Privacy; Collusion.

  • A New Kind of Steganography Schemes for Image   Order a copy of this article
    by Zhihai Zhuo, Ning Zhong 
    Abstract: Message security is more and more important in our modern life. As encryption arousing suspicion easily, steganography which aims at hiding secret message in a cover and has little influence on the cover becomes popular. There are many steganography algorithms having been proposed. Most of them are based on binary, but binary sequence is longer than ternary sequence of a same decimal sequence. In this paper, to have a shorter sequence to represent secret message and protect it, we propose a new method to deal with secret message and get a binary sequence, a ternary sequences and a quaternary sequence. For the ternary sequence and quaternary sequence, we propose a ternary JSteg method and a quaternary JSteg method; this method can keep the histogram characters. So for same secret message, our method will have less influence on the cover.
    Keywords: Steganography; ternary Jsteg.

  • Vanishing files: protocols and regulations for immaterial documents   Order a copy of this article
    by Rosario Culmone 
    Abstract: Regulatory and technological aspects of cloud technology are showing both opportunities and gaps in the rules on security and accessibility. Our proposal aims at addressing a problem that has not yet manifested using a protocol and discussing the normative aspects regarding the possibility of rendering a document completely immaterial. Our article proposes a protocol that uses the network in an unconventional way to make a document fully immaterial. By immaterial we mean that is not localizable anywhere in its entirety. If we continue the analogy to climate, we want to realize a fog of files rather than a cloud. The files are distributed on a public or private network and only the injectors and extractors can access them. The inaccessibility by others, the non-location, and the dynamics of the system offer significant advantages in terms of security but raise some legal problems.
    Keywords: network security; cloud architecture; network protocols; legal and normative aspects.

  • Forensically Ready Digital Identity Management Systems, Issues of Digital Identity Life Cycle and Context of Usage   Order a copy of this article
    by Mehrdad Tajbakhsh, Elaheh Homayounvala, Sajad Shokohyar 
    Abstract: Collecting necessary digital and network forensics to prove the identity of an individual who is responsible for a crime, or suspected of a malicious attack, or has used a device during an incident, with minimum doubt to the court or other legitimate organizations based on the digital forensic investigation model is one of the most important legal and security issues of digital identity management systems (DIMSs). Without a good understanding and identification of the most important parameters of DIMS based on the digital forensic investigation model, it is not possible to do digital forensic investigation and provide required evidence. Therefore, the main goal of this paper is to identify and prioritize DIMS parameters by considering a users digital identity lifecycle, the contexts of usage challenges, and constraints that should be considered in a digital forensic readiness model.
    Keywords: Digital Identity; Digital Identity Management Systems; Digital Forensic Investigation Process; Forensic Readiness.

  • ASEAN Users Privacy Concerns & Security in Using Online Social Networks   Order a copy of this article
    by Narumon Sriratanaviriyakul, Mathews Nkhoma, Anna Felipe, Thanh Kim Cao, Quyen Ha Tran, Roger Epworth, Avinash Shankaranarayanan 
    Abstract: As the ASEAN consumers are increasingly moving online, the number of internet users according to UBS increase to 32% across the region and 112% penetrated by mobile technology. More than 50% of ASEAN users are participating to Online Social Network (OSN). This research is to investigate the awareness and influence of security and privacy issues on Internets users trust, and building a safer OSN landscape in South East Asian region by examining the relationships among online privacy concerns, security, trust, and intention. Using Structural Equation Modelling, the findings shows that privacy correlates with security but these two variables do not have significant impact on users trust. Moreover, only trust and security affect users intention to use OSN.
    Keywords: Online social network; privacy concerns; security; trust.

  • VolNet: A Framework for Analyzing Network based Artifacts From Volatile Memory   Order a copy of this article
    by Nilay Mistry, Mohindersinh Dahiya 
    Abstract: Volatile memory contains an affluence of information regarding the current state of the running system. Memory forensics techniques inspect RAM to extract information such as credentials, encryption keys, network activity and logs, malware, MFT records and the set of processes, open file descriptors currently executed by the operating system, etc. To achieve retrievability of potential artifacts, a memory dump should be taken prior to shutting down the system. It is the most vital aspect for carving information residing into the volatile memory. Volatile memory dump is used for offline investigation of volatile data. The analysis provides information regarding the activities being performed over the running system. This research focuses on our developed framework called as VolNet through which investigator can extract and analyze the artifacts related to network communication, social chats, cloud-based artifacts, private browsing and anonymous surfing and other potential artifacts that can be obtained from RAM dumps of live systems.
    Keywords: Digital Forensics; Anonymous Surfing; Volatile; Random Access Memory; Credentials; Communication; Private Browsing.

  • Phishing URL Detection Based Feature Selection to Classifiers   Order a copy of this article
    by S. Carolin Jeeva, Elijah Blessing Rajsingh 
    Abstract: Phishing is an online scandalous act that occurs when a malevolent webpage impersonates as legitimate webpage in the intension of exploiting the confidential information from the user. Phishing attack continues to pose serious risk for web users and annoying threat in the field of electronic commerce. Feature selection is the process of removing unrelated features and thus reduces the dimensionality of the feature. This paper focuses on identifying the foremost features that categorize legitimate websites from phishing websites based on feature selection. In real world identifying phishing URL with low computational time and accuracy is very important and thus feature selection is considered in this work. A comparative study is carried out on different data mining classifiers before and after feature selection and the performance are evaluated in terms of accuracy and computational rate. The results indicate that the proposed approach detects phishing websites with considerable accuracy.
    Keywords: Web security; Cyber-crime; Phishing; Attribute selection; classification and machine learning.