Securing Digital Evidence with Blockchain

Show simple item record

dc.contributor.author Siaam, Istiaq Bin Salam
dc.contributor.author Mahmud, Nafis
dc.contributor.author Titas, Abu Raihan
dc.date.accessioned 2023-03-15T10:08:00Z
dc.date.available 2023-03-15T10:08:00Z
dc.date.issued 2022-05-30
dc.identifier.citation [1] F. M. Bencic and I. P. Zarko, “Distributed ledger technology: Blockchain compared to directed acyclic graph,” in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). IEEE, Jul. 2018. [Online]. Available: https://doi.org/10.1109/icdcs.2018.00171 [2] M. M. Hossain, R. Hasan, and S. Zawoad, “Probe-iot: A public digital ledger based forensic investigation framework for iot.” in INFOCOM workshops, 2018, pp. 1–2. [3] A. Shahaab, C. Hewage, and I. Khan, “Preventing spoliation of evidence with blockchain: A perspective from south asia,” in 2021 The 3rd International Conference on Blockchain Technology, 2021, pp. 45–52. [4] Y. Aumann and Y. Lindell, “Security against covert adversaries: Efficient protocols for realistic adversaries,” Journal of Cryptology, vol. 23, no. 2, pp. 281–343, 2010. [5] X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, “A taxonomy of blockchain-based systems for architecture design,” in 2017 IEEE international conference on software architecture (ICSA). IEEE, 2017, pp. 243–252. [6] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE symposium on security and privacy (SP). IEEE, 2016, pp. 839–858. [7] D. Ongaro and J. Ousterhout, “In search of an understandable consensus algorithm,” in 2014 USENIX Annual Technical Conference (Usenix ATC 14), 2014, pp. 305–319. [8] A. H. Lone and R. N. Mir, “Forensic-chain: Blockchain based digital forensics chain of custody with poc in hyperledger composer,” Digital investigation, vol. 28, pp. 44–55, 2019. [9] I. Eyal, A. E. Gencer, E. G. Sirer, and R. V. Renesse, “Bitcoin-ng: A scalable blockchain protocol,” in 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, Mar. 2016, pp. 45–59. [Online]. Available: https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/eyal 29 REFERENCES 30 [10] Z. Tian, M. Li, M. Qiu, Y. Sun, and S. Su, “Block-DEF: A secure digital evidence framework using blockchain,” Information Sciences, vol. 491, pp. 151–165, Jul. 2019. [Online]. Available: https://doi.org/10.1016/j.ins.2019.04.011 [11] D. Kim, S.-Y. Ihm, and Y. Son, “Two-level blockchain system for digital crime evidence management,” Sensors, vol. 21, no. 9, p. 3051, Apr. 2021. [Online]. Available: https://doi.org/10.3390/s21093051 [12] F.-C. Cheng, “Automatic and secure wi-fi connection mechanisms for iot end-devices and gateways,” in International conference for emerging technologies in computing. Springer, 2018, pp. 98–106. [13] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017. [14] A. MacDermott, T. Baker, and Q. Shi, “Iot forensics: Challenges for the ioa era,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018, pp. 1–5. [15] T. D. Nguyen, S. Marchal, M. Miettinen, M. H. Dang, N. Asokan, and A.-R. Sadeghi, “D¨ıot: A crowdsourced self-learning approach for detecting compromised iot devices,” arXiv preprint arXiv:1804.07474, 2018. [16] H. Haddadi, V. Christophides, R. Teixeira, K. Cho, S. Suzuki, and A. Perrig, “Siotome: An edge-isp collaborative architecture for iot security,” Proc. IoTSec, 2018. [17] P. Andriotis, G. Oikonomou, and T. Tryfonas, “Forensic analysis of wireless networking evidence of android smartphones,” in 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2012, pp. 109–114. [18] M. A. Khan and K. Salah, “Iot security: Review, blockchain solutions, and open challenges,” Future generation computer systems, vol. 82, pp. 395–411, 2018. [19] O. Yousuf and R. N. Mir, “A survey on the internet of things security: State-of-art, architecture, issues and countermeasures,” Information & Computer Security, 2019. [20] S. Bonomi, M. Casini, and C. Ciccotelli, “B-coc: A blockchain-based chain of custody for evidences management in digital forensics,” arXiv preprint arXiv:1807.10359, 2018. [21] A. Nieto, R. Roman, and J. Lopez, “Digital witness: Safeguarding digital evidence by using secure architectures in personal devices,” IEEE Network, vol. 30, no. 6, pp. 34–41, 2016. [22] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques. Springer, 1987, pp. 369–378. REFERENCES 31 [23] Y. Liu, K. Wang, Y. Lin, and W. Xu, “$\mathsf{LightChain}$: A lightweight blockchain system for industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3571–3581, Jun. 2019. [Online]. Available: https://doi.org/10.1109/tii.2019.2904049 [24] J. Kang, R. Yu, X. Huang, M. Wu, S. Maharjan, S. Xie, and Y. Zhang, “Blockchain for secure and efficient data sharing in vehicular edge computing and networks,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4660–4670, Jun. 2019. [Online]. Available: https://doi.org/10.1109/jiot.2018.2875542 en_US
dc.identifier.uri http://hdl.handle.net/123456789/1771
dc.description Supervised by Dr. Md. Moniruzzaman, Asst. Professor, Department of Computer Science and Engineering(CSE), Islamic University of Technology (IUT) Board Bazar, Gazipur-1704, Bangladesh. This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022. en_US
dc.description.abstract Blockchain, is a tamper-proof secure data storage technology that can be effectively used to solve a multitude of privacy, security and data integrity problems. In our particular attempt of research we’ve studied the phenomenon of using this technology to secure digital evidences that can be used in the court of law. Being government policy compliant and synced with data security goals, a successful implementation of this line of work can bring upon significant betterment to the judicial system of Bangladesh. In this particular line of work, we have studied, assessed and analysed the available and potential solutions for ensuring the security for digital evidence, which can be further developed and appropriated into technologically sound workarounds. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh en_US
dc.subject Blockchain, Digital Ledger, IoT, Digital Evidence, Digital Forensics en_US
dc.title Securing Digital Evidence with Blockchain en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics