Ensuring Interoperability In Ediscovery Process Information Technology Essay

Digital forensic is a really sensitive issue for analysis non merely cyber offense but besides in house digital offense. For this, eDiscovery is necessary to place the grounds which is in the signifier of metadata. To treat this metadata in judicial proceeding procedure on different environment, interoperability is a large job. To work out this job, there is a criterion that is EDRM XML v1.1 but needs farther alteration to guarantee interoperability in eDiscovery procedure.

XML is a criterion for metadata processing. XML scheme ( XSD ) driven XML file that contains the metadata is the best solution to guarantee interoperability in eDiscovery procedure because XSD is a really powerful tool for strong informations binding. To formalize the above hypothesis, a XML scheme is proposed with necessary alterations from current EDRM XML v1.0 and besides the whole eDiscovery system is implemented with the aid of the propose XSD.

The enforced system is tested with different runing system besides different environment with different package. It is found from this execution that the hypothesis which province that XSD can guarantee interoperability in eDiscovery procedure is accurate. After several trial with different trial suite, it can state that the propose XSD guarantee the interoperability in eDiscovery procedure.

Chapter 1: Introduction

1.1 Introduction

Interoperability is the ability of two or more systems or constituents to interchange information and to utilize the information that has been exchanged. It is a large issue in eDiscovery ( Electronic Discovery ) procedure. It is besides a most concern issue for an organisation which is involved in civil judicial proceeding because mutual exclusiveness can halt all the related activities of the organisation. So, guaranting interoperability is a major challenge for Electronic Discovery Process. Now eDiscovery is standardized but still faces some interoperability job.

1.2 Background

Electronic find, or “ e-discovery ” , refers to electronic find in civil judicial proceeding which deals with information in electronic format besides referred to as Electronically Stored Information “ ESI ” . The ESI represents several find stuffs ( illustration: e-mail and e-mail fond regards, databases and files ) and information about those stuffs ( illustration, the beginning of the implicit in ESI, processing of that electronic information, and production of that electronic information ) . Furthermore electronic signifier is nil but presentation of information as binary Numberss. Furthermore, electronic information that is stored in binary signifier is different from ordinary ( paper ) information that is stored in paper because of its intangible signifier, transiency, volume and continuity [[ 1 ]] . In May 2005, the Electronic Discovery Reference Model ( EDRM ) Undertaking was introduced to turn to the deficiency of criterions and guidelines in the electronic find universe. This completed mention theoretical account provides a flexible, common, and extensile frame work for the choice, development, rating and usage of electronic find services and merchandises. The completed inside informations theoretical account was opened in the public usage in May2006 [[ 2 ]] . This theoretical account presents the grounds from the electronic information that is stored in the system. Electronic information is normally accompanied by metadata, which is ne’er present in paper information unless manually coded. Metadata is the information about the informations, or the information that is kept about the electronic files.

EDRM has different phases like designation, saving, aggregation, processing, reappraisal, analysis, and production. Now, it needs informations criterion from one measure of the electronic find procedure to the following, from one package plan to the following, and from one organisation to the following. To make the above transmutation, EDRM XML v1.1 has faces some jobs that are interoperability job. Furthermore, it ‘s besides required informations scheme. Though EDRM sets the criterion to guarantee interoperability but it has deficiency of some of import contains to to the full interoperable. It requires some alterations to carry through interoperability.

1.3 Research Area

To work out the interoperability job in eDiscovery procedure, XML scheme will play a critical function. So, the chief research of this undertaking is designed an XML scheme for EDD to work out this job and implement a corresponding system to prove whether the design is satisfied or non in instance of interoperability. For this, it needs to analyse the immense metadata and besides work out the being scheme job. So, an XML scheme is designed as a criterion to utilize in e-discovery procedure. Furthermore, the research country of this undertaking is concentrating merely syntactic interoperability non semantic interoperability.

1.4 Research Problem

There are several jobs in eDiscovery procedure. Metadata processing is one of them. If eDiscovery squad used package X in one procedure and Y in another procedure. Ten is used one type of informations format and Y is used other type of informations format. So interoperability job is arisen. It is besides the instance when different organisation used different package.

1.5 Research Question

The research inquiry of this undertaking is given below.

How can extinguish interoperability job in eDiscovery Procedure?

Does XML schema handle informations interoperability?

1.6 Research Goal and Purpose

The end of the thesis is to guarantee interoperability in eDiscovery. For this, a information scheme is designed for e-Discovery in an efficient manner that is XML with better than being scheme. Since, there is some empirical informations ; it needs to analyse the informations so comparing with this undertaking hypothesis. After that, the empirical informations will be collected. Then the concrete theory will be established with this information. So, the research ultimate end is set to plan a information scheme for e-Discovery procedure. Standard informations scheme can manage the job like XML scheme. With this scheme, interoperability job can be eliminated.

The intent of the thesis is to ease the motion of electronically stored information ( ESI ) from one measure of the electronic find procedure to the following, from one package plan to the following, and from one organisation to the following. Furthermore the purpose of this research is to assist civil judicial proceeding organisation significantly in streamline procedures and enable the integrating of multiple e-Discovery engineerings.

1.7 Related plants

EDRM is a good known organisation to set up guidelines, puting criterions, presenting resources for eDiscovery procedure. They set up some criterion and doing some guideline to utilize these criterion. They besides deliver XML meta informations tickets and matching XML scheme. The standard theoretical account of EDRM is given below.

Figure 1: Electronic Reference Model ( EDRM ) [ 2 ]

The EDRM diagram describes a conceptual position of the electronic find procedure, non a additive, actual, or waterfall theoretical account. One may utilize some but non all of the stairss outlined in the diagram, or one may utilize all the stairss in a different order that shown the above figure 1.

The above diagram besides portrays an iterative procedure. One might reiterate the same in tonss of times in order to acquire a more precise set of consequences. One might besides function back to earlier stairss, might polishing one ‘s attack as a better apprehension of informations.The diagram primary purpose is a footing for treatment and analysis, non as a prescription for the one and merely right manner to near electronic find [ ] .

Simon Attfield and Ann Blandford from University College London described EDD procedure on their research paper rubric as “ E-discovery viewed as incorporate human-computer sense devising: The challenge of ‘frames ‘ “ [[ 3 ]] . From their probe procedure evolved slightly over clip. What they present in the paper is the procedure in its mature signifier. They have besides restricted their egos to a description of the probe as it applied to electronic paperss, excluding mention to witness interviews which were however an of import, if non-technological, beginning of information. A figure of things are go oning in this procedure, but loosely it is seen as a procedure of information decrease achieved by different sorts of filtering and abstraction.

1.8 Methodology

The research method of the thesis is abduction. There are some empirical informations exist but non plenty. For this it needs to analysis these informations, and so drives the hypothesis. With hypothesis, the empirical information is collected to turn out that hypothesis. So, it follows the empirical data-theory-empirical informations theoretical account. The research did non take tax write-off because there is being of empirical informations. And besides did non take initiation for really limited being of empirical informations. For this, it is thought that abduction is the proper method for this thesis.

1.9 Restriction

There is fixed clip frame for this research work that is 20 hebdomads full clip work is the chief restriction of this research. Furthermore deficiency of compatible tools for latest engineering and operating system is one of the restrictions of proving some constituents in a specific environment.

1.10 Intended Audience

The thesis survey is expected to be good for digital forensic squad who is involved in judicial proceeding procedure. It is besides good for the IT Law houses and eDiscovery tools shaper sellers.

1.11 Thesis Outline

The staying parts of the study are organized as follows:

Chapter 2: Interoperability by XML

Chapter 3: Interoperability with XML Schema ( XSD )

Chapter 4: Security and Interoperability

Chapter 5: Design and Execution

Chapter 6: Testing, Evaluation and Discussion

Chapter 7: Future work and Decision

Chapter 2: Interoperability by XML

2.1 XML: Extensile Markup Language

The Extensible Markup Language ( XML ) is a simple text-based format for stand foring structured information: paperss, informations, books, constellation, bills, minutess, and much more. It was derived from an older criterion format called as SGML ( ISO 8879 ) , in order to be more suited for web usage [[ 4 ]] . Since its debut in 1998, XML has revolutionized how we think about describing, structuring and exchange information. The ways in which XML is used in the package industry are many and turning. Surely for Web services the importance of XML is paramount ; all cardinal web service engineerings are based on it [[ 5 ]] .

To put of regulations for encoding paperss electronically, XML is the best manner to make that. It is defined in the XML 1.0 Specification produced by the World Wide Web Consortium ( W3C ) that is an international community for apparatus web services criterion.

2.2 Role of XML in the field of interoperability

XML plays a critical function in the instance of informations interoperability. It has several grounds to state that XML is one of the best ways for electronic papers managing particularly for informations interoperability. Some of import characteristic of XML is described below.

XML is human clear: XML informations can easy understand from xml file signifier its ticket and matching value.

XML is a meta linguistic communication: W3C defines multiple linguistic communication that follow XML sentence structure regulations.

XML create ain vocabulary: Harmonizing to W3C specification for XML, it is unfastened to take set of element type names.

XML Documents is grammatical & A ; valid: XML papers construction is good formed and besides can formalize by scheme and W3C criterion.

XML is a textual information format, with strong support via Unicode for the linguistic communications of the universe. Although its design focuses on paperss, it is widely used for the representation of arbitrary informations constructions, for illustration in web services. Furthermore, there are a assortment of programming interfaces where package developers may utilize to entree XML information, and several schemes systems designed to help in the definition of XML-based.In add-on, XML ‘s design ends emphasize simpleness, generalization, and serviceability over the cyberspace [[ 6 ]] .

2.3 XML is a manner of extinguishing interoperability job in eDiscovery procedure

To heighten interoperability, XML is the best solution because it is a standard linguistic communication for informations description, widely used for informations exchange between different systems even for the incompatible plans, any computing machine webs, different informations constructions or assorted runing systems. XML provides structural and syntactical informations interoperability because all the exchanged files contain the same XML mark-up, indexing, seeking, uniting, and re-using text-based information, they are easy accomplished.

2.4 The propose solution for extinguishing interoperability job in eDiscovery procedure with incorporating being EDRM solution

The current XML meta tickets for EDRM v1.1 do non include some tickets that are really much of import. Since EDRM is seeking to setup standard and current version is non so stable, some meaningful meta tickets are losing. The ticket that are losing and excessively much of import are included with being solution. In add-on, some tickets are disused and that tickets are excluded in this propose XML meta tickets form being solution provided by EDRM XML meta tickets v1.1. Furthermore, some tickets need to be modified with their property for more dependable and safe side. The propose XML meta tickets are provided below.

Table 1: Propose XML meta tickets with incorporating being EDRM solution

From above figure, the xanthous grade [ ] is freshly added where sky blue [ ] is modified and the ruddy grade [ ] is deleted.

In current universe, e-mail dramas major function in communicating. So, e-mail fond regard is really common. For this, type of fond regard is a large factor in eDiscovery procedure because of storing and use of this file ( illustration: .zip, .exe, .jpeg ) . It is excessively much of import when file is hive awaying in database from one platform to another platform. Without cognizing the type, it will be complex and sometimes interoperability is impossible. As a consequence, attachment type should be included.

Security is an of import issue. Encryption is a portion of security. It is the best manner to cognize the file or fond regard or booklet is encrypted or non when those are reassigning one platform to other if there are any specific indexs is present. If those files are encrypted, decoding method must be applied to read those files. To guarantee interoperability, it should be known the file is encrypted or non. So, encoding tickets should be included with being XML meta tickets.

The bound of Long Integer should be addition from 32 spot to 64 spot because of immense storage device. Now a twenty-four hours, terabyte difficult disc is used in place computing machine system. Furthermore, computing machine processor is altering form 32 spot to 64 spot. In add-on, 64 spot runing system is available in the market in different platform. For the same ground, denary value should be increase to duplicate.

Since text ticket is used and its bound is unbound, Long text is unneeded. So, Long text should be removed from XML meta tickets.

Chapter 3: Interoperability with XML Schema ( XSD: XML Schema Definition )

3.1 XSD: XML Schema Definition

XSD is a description of XML papers. It describes the sentence structure and defines a set of grammatical regulations harmonizing to the order of elements and attributes that can be represented in a XML papers. It besides ensures that the XML papers must be specific format and specific informations type. Furthermore, in order to see as a ‘valid ‘ XML papers, this XML papers must follow a set of regulations from scheme. There are two ways a XML scheme can be expressed. One criterion from W3C and another is RELAX NG. In this research work, W3C criterion is followed because it is more widely used than RELAX NG. For better public presentation, rigorous grammatical regulations and high rang of acceptable degree ; W3C criterion is utilizing most of the web services.

3.2 Importance of XSD on informations interoperability

To guarantee interoperability, XML file must be validated with matching XSD. It ‘s a really powerful tool for informations binding of XML papers. To understand the importance of XSD, a simple working method is discussed below.

An understanding about the construction of the XML papers has been done when information is managed and exchanged in XML format between two platforms. For informations exchange, values of elements and properties must be in the expected scope every bit good as in the coveted format. For this ground, an XML Schema is needed. A Schema defines the construction of the XML papers with regulations to formalize the value of elements and attributes every bit good as their formats. So, without XSD, informations binding in XML is really hard. It is clear from above treatment that XSD is really of import factor for informations interoperability in XML papers.

3.3 The Propose XSD for EDRM v1.1

The propose XSD for EDRM V 1.1 is reflected the propose meta tickets for EDRM that is described in chapter 2, subdivision 4. In this XSD, informations type is added because it is most of import for a papers ; merely few informations type is added harmonizing to suggest XML meta ticket. And besides it is changed and modified few informations types harmonizing to suggest XML meta ticket. The information type is Stringing for text where Integer, DateTime, Double and Boolean are remainder of the types

The propose scheme is given below where the changed elements and properties are showed in drawn-out manner and the remainder of the elements and properties are in concealed manner for best sing to the reader of this research paper.


XSD is changed harmonizing to suggest XML meta tickets because of consistency of the XML papers for eDiscovery procedure. To heighten interoperability in eDiscovery procedure, the propose XSD plays the cardinal function.

Chapter 4: Security and Interoperability

4.1 Security Fundamental

Harmonizing to Matt Bishop on his Introduction to Computer Security, Computer security remainders on confidentiality, unity, and handiness [[ 7 ]] . The security hazards are categorized harmonizing to Matt Bishop ‘s computing machine security cardinal and discussed subsequently on.


Disclosure ( Unauthorized Access to Information ) : XML contains can be disclosed to the 3rd party that may be the suspected one.

Deception ( Acceptance of False Data ) : The suspected individual or organisation can direct false XML file.

Disruption ( Interruption or Prevention of Correct Operation ) : The interloper can be barricade the service so that the XSD file can non be accessible.

Trespass ( Unauthorized Control of Some Part of a System ) : The interloper can take the control of web waiter or file waiter or even the whole system.

List of Menaces:

Spying Passive voice: The suspected individual / organisation can supervise the overall advancement of digital forensic squad.

Wiretapping ( Disclosure ) : The interloper can unwrap the critical information by wiretapping.

Man in the Middle ( Disclosure, Deception, and Disruption ) : The interloper can acquire the information in the center of judicial proceeding procedure.

Masquerading, Spoofing ( Deception, Usurpation ) : The interloper can be act like the authorised individual of the squad.

Denial of Service ( Usurpation ) : The interloper can halt the service to acquire necessary information.

Tampering ( Disclosure ) : The interloper can alter contains of XML file.

Elevation of Privilege ( Disclosure, Usurpation ) : The interloper can take the privilege right of entree the system.

Beginnings of Menaces:

Open Malware: back door, Trojan Equus caballus, phishing can be a menace to steal the sensitive information from the eDiscovery System.

Skilled hackers: The hacker is ultimate interloper who can make whatever he wants if the system has non tamperproof security and contains exposures.

Choping certification accessible on the web: There is tonss of information available in the web to chop the system.

Disgruntled Employees: The dishonest squad member can unwrap the critical information to the 3rd party.

4.2 XML papers and XSD Security

When XML was conceived as a means to interchange concern informations across the Internet, it was instantly recognized that those paperss had to be secured. Consequently, in 1999, W3C and IETF jointly started the XML Signature Working Group to specify a set of specifications for digitally subscribing XML paperss. XML Signature became a W3C Recommendation in 2002. In parallel, W3C besides worked on a new specification for coding parts of XML paperss ( XML Encryption ) . XML Encoding was besides made into a W3C Recommendation in 2002.

It is natural to presume that XML Signature and XML Encryption should be used to protect XML papers. Therefore, in April 2002, IBM, Microsoft, and VeriSign jointly published a specification of WS-Security, which subsequently became the OASIS criterion Web Services Security: SOAP Message Security 1.0 ( WS-Security 2004 ) . IBM and Microsoft besides published a roadmap, puting out extra security specifications [[ 8 ]] .

4.2.1 Enhanced Secure Encryption

It is proposed to utilize intercrossed encoding engineering for heightening security on XML papers. A intercrossed attack which combines with Homomorphic Encryption Scheme ( HES ) and Function Composition ( FnC ) .

4.3 System Security

It is proposed to utilize some pique cogent evidence devices for tamping bar cogent evidence system so that XML papers every bit good as XSD should be more secure and maintained its unity and confidentiality. For this, it is proposed some firewall devices every bit good as TPE ‘s ( Tamper Proof Environments ) . Furthermore, it should be guarantee that the system must be used by authorised individual with their individuality ( strong watchword, smart card, finger print, face designation ) .

4.4 Communication channel Security

To guarantee interoperability, communicating channel security plays a critical function. There are tonss of ways security breach can be happen on the manner of communicating. To guarantee handiness of XML papers and XSD with keeping unity and confidentiality, OpenSSL and SASL protocol for communicating security is proposed for communicating channel security.

4.5 The propose Security characteristics for eDiscovery procedure when interoperability is ensured with XML

Security is a large concern for web services. Data unity must be maintained when eDiscovery procedure is traveling on. There are tonss of security characteristic that applied to maintain originality of the contents. Major security characteristics are unafraid parsing and WS-Security.

Secure parsing: Channel security is performed by SSL. Furthermore, some system has the parsing security system like J2EE Security.

WS-Security: It is combined with encoding, digital signature verified with digital certification and security items.

Chapter 5: Design and Execution

5.1 Architecture

The overall architecture of execution is shown by usage instance diagram. The usage instance diagram of eDiscovery Management System shows different interaction between different histrions within the boundary of system. There are six histrions in the system boundary. They are identifier/digital forensic squad, reviewer/analysis, jurisprudence enforce team/judge/arbitrary, and MySQL database for information shop and retrieve, XML proof engine, describing engine for grounds presentation.

Figure 2: Use instance diagram for eDiscovery Management System

The usage instance of eDiscovery Management System is described below.

Files: This usage instance represents electronic file shop in computing machine that is papers.

Electronic mails: This usage instance represents electronic mail and email fond regard.

XML file: This usage instance represents the chief grounds presentation format

XML Validator: This usage instance represents the system of formalizing XML file with scheme by XML formalizing engine.

XML scheme: This usage instance represents the construction of XML file.

Shop Evidence: This usage instance represents the procedure of hive awaying grounds into the database system

Retrieve Evidence: This usage instance represents the procedure of reassigning grounds from one platform to another platform.

Evidence Presentation: This usage instance represents the procedure of presentation of grounds to the civil judicial proceeding organisation.

5.2 Technology applied

In this system development, Java is used as an object oriented linguistic communication. To implement the system, Java EE 6 is used as a scheduling linguistic communication. In add-on JAXB is used for xml binding.

We used this tools and linguistic communication because of XML and Java engineering go together where XML is portable informations and Java codification is portable codification where Java API for XML Binding ( JAXB ) is the gum. The internal architecture of JAXB with our developed application is given below.

Figure 3: Internal System Works of JAXB with application [ 6 ]

5.2.1 JAXB informations adhering process:

The general stairss in the JAXB informations binding procedure are:

Generate categories: An XML scheme is used as input to the JAXB adhering compiler to bring forth JAXB categories based on that specific scheme.

Compile categories: It is required to roll up all the generated Java categories, beginning files and application codification.

Unmarshal: XML paperss written harmonizing to the restraints in the beginning scheme are unmarshalled by the JAXB binding model. Furthermore, JAXB besides supports unmarshalling XML informations from beginnings other than files/documents, such as DOM nodes, threading buffers, SAX Sources etc.

Generate content tree: The unmarshalling procedure produce a content tree of informations objects instantiated from the generated JAXB categories. The construction and content of the beginning XML paperss are represented by this contains tree.

Validate ( optional ) : The unmarshalling procedure indirectly involved proof of the beginning XML paperss before bring forthing the content tree. Furthermore, if the content tree is modified in Step F, below, it can be utilize the JAXB Validate operation to formalize the alterations before marshalling the content back to an XML papers.

Procedure content: The user client application can modify the XML informations represented by the Java content tree by agencies of interfaces generated by the binding compiler ( xjc ) .

Marshal: The processed content tree is marshalled out to one or more XML end product paperss. The content can be validated before marshalling. [[ 9 ]]

5.2.2 The ground behind utilizing JAXB ( Java Architecture for XML Binding )

It provides API, tools, and a model that automate the function between XML paperss and Java objects

It provides compiler that compiles XML scheme to Java categories

It has portability, JAXB constituents can be replaced without holding to do important alterations to the remainder of the beginning codification

Validation on demand

Validate the tree against the restraints in the beginning scheme

Converting a Java content tree to XML content and back to Java content once more should ensue in tantamount Java content trees before and after the transition

5.3 Database Use

MySQL Workbench 5.1 OSS is used to plan the database where MySQl 5.1 is used as a database supplier. The enforced eDiscovery direction System database design is shown on figure.

Figure 4: eDiscovery Management System Database Design

The database tabular array that is used to implement the system is described below.

Doc_file: This database tabular array contains the information related to document file.

Electronic mail: This database tabular array contains the information related to electronic mail and besides e-mail fond regard.

Batch: This database tabular array contains the information about the batch of making the grounds.

Forensic_Team: This database tabular array contains the information about forensic squad and reappraisal squad.

Case_Datails: This database tabular array contains the information related to instance designation, new version and old version of same instance etc.

Tags: This database tabular array contains the information related to tickets used in the grounds file.

5.4 Working process of the enforced system

The enforced system works is non so complex. It has user interface where a user can give the input/command to hive away grounds to the system and can acquire an xml end product from the system. The enforced system can take xml or other type of file ( besides property of file ) as an input but produce merely xml end product. When it takes xml as an input, it must be validated the XML papers with the propose XSD. And, end product XML papers besides validated with the XSD because of guaranting interoperability.

The system working procedure is divided in two parts. One portion is internal system where other portion is external system.

Figure 5: The working theoretical account of eDiscovery Management System

5.4.1 Internal System / Core System

It is the nucleus system of enforced eDiscovery direction system. It has besides several parts. The chief application is the driver that runs the whole system where Java categories are engine of this system. Furthermore, the chief application portion besides contains several constituents. The JAXB API is responsible for marshalling JAVA objects to XML papers and unmarshaling XML papers to JAVA object. The other constituent that is JAVA object is an case of JAVA categories. The remainder of the constituents of chief application are JAVA I/O and JConnector. The chief application has the ability to demo all the information stored in database and besides can execute edit and add action. Now, the other portion of internal system is the database waiter of MySQL which is a storage system. The scheme compiler ( xjc ) is the index of proof.

5.4.2 External System / UI

It is the user interface where user input and system end product is handled with JAVA Swing and AWT. It has both manner direct communications with chief application portion of internal system. It provides the interface to take user input as a XML file or other file format ( jpeg, physician, pdf, nothing, binary ) but produce merely XML end product.

5.4.3 Local files system/Remote files system/Web Server

The propose XSD is stored in either Local files system or Remote files system or Web Server. The propose scheme is used by schema compiler in internal system to formalize XML papers.

Chapter 6: Testing, Evaluation and Discussion

6.1 Testing

The enforced system is tested with JUnit proving tools. It besides performed unit and system proving where burden and emphasis testing is performed for web waiter that is Apache Tomcat 6. All proving are described below.

6.1.1 Unit Testing

JUnit is a trial tools for Java. It is used to construct trial suite for proving Java categories. All the Java categories are tested under JUnit. After go throughing trial instances, the category is eventually accepted. It reduces programming bugs and memory escapes. The undermentioned figure shows the single testing consequence of JUnit as an illustration of proving procedure and matching consequence.

Figure: Junit trial consequence for trial suite of MakeXMLTest

The figure 6 shows the end product consequence of MakeXMLTest that is designed with JUnit trial suite with different trial instances. The generated end product is expected and the trial suite is successful. It passed all the four methods that used in MakeXML.java.

Figure: Junit trial consequence for MakeXML.java category

The figure 7 shows the full position of proving consequence of MakeXML.java. It besides shows the clip that the trial instances have been taken.

6.1.2 System Testing

All the constituents of enforced system are integrated. After adding constituents, it ‘s once more proving with Junit. The state of affairs of memory pile, single method executing clip, supplication clip and the dead lock state of affairs are analyzed prior to concluding integrating. The consequence of the system proving under JUnit is given below. After component testing, all the bunch of constituents are integrated and proving the system as a whole.

Figure: The consequence of system proving

The figure 8 demonstrates the elaborative consequence of system proving with regard to memory pile, executing clip of single category and methods, supplication clip.

6.1.3 Alpha Testing

The enforced system that is eDiscovery Management System is tested in SecLab-407 at DSV, SU/KTH. The trial suite is designed by the writer of this undertaking where trial director function is performed by the supervisor of this undertaking. A group of people specially pupil of DSV performed as a examiner function.

6.1.4 Beta proving

The selected user is tested the whole system and do their reappraisal study with bugs. The beta testing is performed with the aid of different pupil of different section but they all have IT background.

6.2 Evaluation

The enforced system rating is done automatically with NetBeans profiler. The NetBeans Profiler is a powerful tool that provides of import information about the runtime behaviour of an application. Enforcing comparatively small overhead, the NetBeans Profiler keeps paths of thread province, CPU public presentation, and memory use. It uses advanced engineering to let the system developer to tightly command precisely which parts of an application are profiled, ensuing in reduced operating expense and easier to construe consequences. The profiled application can run locally or on a distributed remote system. And by being tightly integrated into the IDE work flow, the NetBeans Profiler makes it easy to place public presentation jobs and memory leaks [[ 10 ]] .

6.2.1 Profiling

NetBeans profiling tools is used to profile the enforced system. The profiling tools show the existent state of affairs of every togs of the system. In figure 9 and figure 10, the green line [ ] shows the running togss, the xanthous line [ ] shows the waiting province of togss and the deep blue shows the kiping province of togss

Figure: The end product consequence of profiler for eDiscovery Management System ( General View )

Figure: The end product consequence of profiler for eDiscovery Management System ( Details View )

The VM overview is showed the underside of figure 9 where 10 shows the signal dispatching.

Table: The end product consequence of profiler for eDiscovery Management System ( Thread View )

The tabular array 2 shows all the togss of the system. It describes the different state of affairs of the togss from running togss to kiping togss.

6.3 Testing on different environment

The enforced system is tested under different environment and besides with different package. It is tested with the package that is built on.Net engineering of Microsoft Visual Studio 2010 Beta. Furthermore, the system is besides tested via web services. In add-on, the system is besides tested on different platform that is Windowss ( XP, Vista, Windows7 ) , Linux ( Ubuntu 8.0.4 ) , Sun Os ( Open Solaris 10 ) .

6.4 Consequences

It is found that the system is to the full interoperable in different environment with different package that is the thesis end. The thesis end is achieved with the aid of different proving technique.

6.5 Discussion

The enforced system is tested with different set of trial suite. Some UI is excessively hard to proving. Furthermore, web waiter apparatus and load trial was hard in Windows 7 environment because Apache Tomcat 6 is non compatible with that Os. This job is solved with the manual configuring of some Windowss services. Linux Platform that is Ubuntu Os is best for Java, Apache Tomcat, Apache Lucene, and Mysql combination. Sun Open Solaris is besides good for the above combination. In add-on, the system is tested with the 3rd party package which is built with Microsoft.Net platform. Merely some specific characteristic is tested with that 3rd party package because it does non supply everything that is required.

Chapter 7: Future work and Decision

7.1 Decision:

The research end of this maestro thesis undertaking is guaranting interoperability in eDiscovery procedure because current EDRM v1.1 has some troubles of that.

The research found that the XML scheme ( XSD ) driven XML papers is the best solution for interoperability job. But current XML meta tickets for EDRM v1.1 need some alteration. This research recommends necessary alterations of those meta tags to guarantee interoperability in eDiscovery procedure. The recommended XSD for EDRM v1.1 is reflected by the proposed meta tickets because of consistency of the grounds paperss. So, the generated XML file must be validated by the recommended XSD to guarantee interoperability.

The research of this undertaking besides recommended some security characteristics to be added in meta tickets every bit good as XSD and application degree security. Hybrid encoding is recommended for application degree security, SASL for communicating degree security and besides WS-Security policy should be applied on whole system.

The proposed system along with recommendation is implemented with the engineering of JAXB, Apache Lucene, Apache Tomcat, MySQL and Java EE 5 because Java codification is portable and platform independent and JAXB is the gum between portable informations XML and portable codification Java. The System is tested with JUnit and TPTP tools. It is tested and evaluated by specific group of people. The consequence is positive and the system is user friendly.

The consequence of the execution indicates that the research end has been reached. The enforced system is to the full interoperable in different platform with different package and of class in different environment. Therefore all the civil judicial proceeding procedure stairss can be interoperable with each other.

7.2 Future Work

The propose system needs farther optimisation for better public presentation. In add-on, efficient seeking technique is non implemented in this research. Furthermore, RELAX NG and W3C recommend XSD is non combined in this research paper. For the hereafter work, the undermentioned things can be consider:

What is the end product of combination of W3C XSD and RELAX NG for informations interoperability in eDiscovery procedure? Is it good suit for the current tendency?

Which seeking technique is best suit for eDiscovery procedure in footings of guaranting interoperability in eDiscovery procedure?