Recovering Evidentiary E-mail for Non-Repudiation Forensics
Lokendra Kumar Tiwari1, Saurabh Mishra2, Shefalika Ghosh Samaddar3
1Lokendra Kumar Tiwari, Department of Computer Science, Ewing Christian College, Allahabad (Uttar Pradesh), India.
2Saurabh Mishra, School of Management Studies, Motilal Nehru National Institute of Technology, Allahabad (Uttar Pradesh), India.
3Shefalika Ghosh Samaddar, Department of Computer Science and Engineering, NIT, (Sikkim), India.
Manuscript received on 08 September 2019 | Revised Manuscript received on 17 September 2019 | Manuscript Published on 26 October 2019 | PP: 551-557 | Volume-8 Issue-11S2 September 2019 | Retrieval Number: K108509811S219/2019©BEIESP | DOI: 10.35940/ijitee.K1085.09811S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrieving and presenting content processed electronically and stored digitally, is used for legal evidence in computer related crimes or any other unethical practice involving manipulation of digital content. Such digital content can take many forms which are manifested by different file formats and digital artifacts”. This paper concentrates on acquisition of deleted e-mail from mailbox of web servers satisfying two tier, three tier and n-tier technology. A detailed survey of several possibilities are included for non-repudiation forensic. A case study of a particular file type using suitable forensic tool is cited as a proof of concept towards this claimed inference to provide digital evidence in case of non-repudiation by sender and/or by receiver. This is simply conducted by using Encase a proprietary Digital forensic tools. The whole process is captured in step by step fashion to have a better understanding of the mechanism used. Recovery of files/emails have certain kinds of legal hurdles, the paper have addressed them as well. This paper contributes to the extend the recovered email can used as a ready digital evidence in any court of law.
Keywords: E-mail Recovery, DBX File Recovery, EnCase, Outlook Express Mail Recovery.
Scope of the Article: Standards for IoT Applications