Blockchain Hyperledger Sawtooth Enabled Digital Forensics Chain of Custody (CoC): A Review
Abstract
This project gives the architecture design and a complete understanding of the project” Blockchain Hyperledger Sawtooth Enabled Digital Forensics Chain of Custody” in this architecture design we have assign our own digital forensics engineer responsible for all the perquisite. This project is implemented to make the digital forensics Chain of Custody entire system in a decentralized environment in order to make the system free from corruption we have used smart contracts designed in the go language. We have used the concept of digital signatures and hash encrypted SHA256 function which would be widely expected to provide security and protection to digital forensics and chain of custody, as we know blockchain technology is rapidly evolving day by day, we will implement SHA-512 in future to make the system private for all the stakeholders. This project is developed to solve the problem of the investigation system, it will assist the people towards securing their data and evidence collection system that make forensic CoC more efficient than the previous system. for example, an accused is not allowed to know about investigators nor investigator is allow to see someone else details.
References
[2] S. Li, T. Qin, and G. Min, “Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems,” IEEE Trans. Computer. Soc. Syst., vol. 6, no. 6, pp. 1433– 1441, 2019, doi: 10.1109/TCSS.2019.2927431.
[3] A. H. Lone and R. N. Mir, “Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer,” Digit. Investigation., vol. 28, pp. 44–55, 2019, doi: 10.1016/j.diin.2019.01.002.
[4] Zhihong Tian, Mohan Li, Meikang Qiu, Yanbin Sun, Shen Su, Block-DEF: A secure digital evidence framework using blockchain, Information Sciences, Volume 491, 2019, Pages 151-165, ISSN 0020-0255,
[5] X. Burri, E. Casey, T. Bollé, and D. O. Jaquet-Chiffelle, “Chronological independently verifiable electronic chain of custody ledger using blockchain technology,” Forensic Sci. Int. Digit. Investig., vol. 33, no. xxxx, 2020, doi: 10.1016/j.fsidi.2020.300976.
[6] E. Nyaletey, R. M. Parizi, Q. Zhang, and K. K. R. Choo, “BlockIPFS - Blockchain-enabled interplanetary file system for forensic and trusted data traceability,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 18–25, 2019, doi: 10.1109/Blockchain.2019.00012.
[7] V. Malamas, T. Dasaklis, P. Kotzanikolaou, M. Burmester, and S. Katsikas, “A forensics-bydesign management framework for medical devices based on blockchain,” Proc. - 2019 IEEE World Congr. Serv. Serv. 2019, vol. 2642–939X, pp. 35–40, 2019, doi: 10.1109/SERVICES.2019.00021.
[8] A. J. Ehrenberg and J. L. King, “Blockchain in Context,” Inf. Syst. Front., vol. 22, no. 1, pp. 29– 35, 2020, doi: 10.1007/s10796-019-09946-6.
[9] D. O. Jaquet-Chiffelle, E. Casey, and J. Bourquenoud, “Tamperproof timestamped provenance ledger using blockchain technology,” Forensic Sci. Int. Digit. Investig., vol. 33, no. xxxx, p. 300977, 2020, doi: 10.1016/j.fsidi.2020.300977.
[10] D. Billard, “Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems,” 27 Forensic Sci. Int. Digit. Investig., vol. 32, p. 300911, 2020, doi: 10.1016/j.fsidi.2020.300911.
[11] A. Tanner and J. Bruno, “Timely: A Chain of Custody Data Visualizer,” Conf. Proc. - IEEE SOUTHEASTCON, vol. 2019-April, pp. 1–5, 2019, doi: 10.1109/SoutheastCon42311.2019.9020497.
[12] P. C. Wei, D. Wang, Y. Zhao, S. K. S. Tyagi, and N. Kumar, “Blockchain data-based cloud data integrity protection mechanism,” Futur. Gener. Comput. Syst., vol. 102, pp. 902–911, 2020, doi: 10.1016/j.future.2019.09.028.
[13] R. Montasari and R. Hill, “Next-Generation Digital Forensics: Challenges and Future Paradigms,” Proc. 12th Int. Conf. Glob. Secur. Saf. Sustain. ICGS3 2019, pp. 205–212, 2019, doi: 10.1109/ICGS3.2019.8688020.
[14] M. Zhaofeng, M. Jialin, W. Jihui, and S. Zhiguang, “Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment,” IEEE Internet Things J., vol. 8, no. 4, pp. 2116–2123, 2021, doi: 10.1109/JIOT.2020.3037733.
[15] Y. L. Gao, X. B. Chen, G. Xu, W. Liu, M. X. Dong, and X. Liu, “A new blockchain-based personal privacy protection scheme,” Multimed. Tools Appl., 2020, doi: 10.1007/s11042-020-09867-6
[16] Khan, Abdullah Ayub, and Syed Asif Ali. "Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network." International Journal of Electronic Security and Digital Forensics 13, no. 6 (2021): 600-611.
[17] Laghari, A.A., Wu, K., Laghari, R.A. et al. A Review and State of Art of Internet of Things (IoT). Arch Computat Methods Eng (2021). https://doi.org/10.1007/s11831-021-09622-6 May 2020, vol. 1501, no. 1. doi: 10.1088/1742-6596/1501/1/012022.
[18] Khan, Abdullah Ayub, Asif Ali Laghari, and Shafique Ahmed Awan. "Machine learning in computer vision: A review." EAI Transactions on Scalable Information Systems (2021): e4.
[19] Ayub Khan, A., Laghari, A. A., Shaikh, A. A., Bourouis, S., Mamlouk, A. M., & Alshazly, H. (2021). Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission. Applied Sciences, 11(22), 10917.
[20] Khan, Abdullah Ayub, Zaffar Ahmed Shaikh, Larisa Belinskaja, Laura Baitenova, Yulia Vlasova, Zhanneta Gerzelieva, Asif Ali Laghari, Abdul Ahad Abro, and Sergey Barykin. "A Blockchain and Metaheuristic-Enabled Distributed Architecture for Smart Agricultural Analysis and Ledger Preservation Solution: A Collaborative Approach." Applied Sciences 12, no. 3 (2022): 1487.
[21] Shaikh, Zaffar Ahmed, Abdullah Ayub Khan, Laura Baitenova, Gulmira Zambinova, Natalia Yegina, Natalia Ivolgina, Asif Ali Laghari, and Sergey Evgenievich Barykin. "Blockchain Hyperledger with Non-Linear Machine Learning: A Novel and Secure Educational Accreditation Registration and Distributed Ledger Preservation Architecture." Applied Sciences 12, no. 5 (2022): 2534.
[22] Khan, Abdullah Ayub, Asif Ali Laghari, De-Sheng Liu, Aftab Ahmed Shaikh, Dan-An Ma, Chao-Yang Wang, and Asif Ali Wagan. "EPS-Ledger: Blockchain Hyperledger Sawtooth-Enabled Distributed Power Systems Chain of Operation and Control Node Privacy and Security." Electronics 10, no. 19 (2021): 2395.
[23] Khan, Abdullah Ayub, Asif Ali Laghari, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh, and Awais Khan Jumani. "Innovation in Multimedia Using IoT Systems." Multimedia Computing Systems and Virtual Reality: 171-187.
[24] Khan, A. A., Shaikh, Z. A., Baitenova, L., Mutaliyeva, L., Moiseev, N., Mikhaylov, A., ... & Alshazly, H. (2021). QoS-Ledger: Smart Contracts and Metaheuristic for Secure Quality-of-Service and Cost-Efficient Scheduling of Medical-Data Processing. Electronics, 10(24), 3083.
[25] Khan, Abdullah Ayub, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh, Asif Ali Laghari, and Shahid Karim. "IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm." Multimedia Tools and Applications (2022): 1-17.