Forensic Evidence Security System Using Blockchain Technology

Forensic Evidence Security System Using Blockchain Technology

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-8
Year of Publication : 2023
Author : Akinseye Oluwaseyitan Charles, Abiodun Oguntimilehin, Oniyide Alabi Bello
DOI : 10.14445/22315381/IJETT-V71I8P212

How to Cite?

Akinseye Oluwaseyitan Charles, Abiodun Oguntimilehin, Oniyide Alabi Bello, "Forensic Evidence Security System Using Blockchain Technology," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 143-151, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P212

Abstract
When cybercrime is being investigated, digital evidence is crucial because it can be used to connect criminals to their victims. As digital evidence moves through the chain of custody at various levels of hierarchy during a criminal investigation, it is crucial to ensure its integrity, authenticity, and auditability. There is a need for a safe proof system which guarantees that case files containing forensic evidences are safe throughout the period of their handling and after. The system developed in this work, named Digital Threat Investigator, is built on Hyperledger Fabric, a permissioned network that requires authorization for all users. In order to effectively address privacy and confidentiality concerns, access control, channel permissions, and participant settings are important. Furthermore, the blockchain can be used to store and share data assets. The original forensic data is fragmented, stored in the cloud, and connected via the blockchain in the Digital Threat Investigator, while the usage history of the original data is also stored on the blockchain. For data access scalability and traceability, the two processes collaborate. Programming was done using WordPress, HTML, CSS and PHP. Results from the testing of the system showed that the latency decreased steadily as the number of nodes in the blockchain decreased. Results showed an increase from 150ms to 353ms as the number of nodes increased from 1 to 8. This system proved to be a workable tool that could aid digital forensics investigation and ensure the safe handling of forensic evidences.

Keywords
Blockchain, Cyber-crime, Forensic, Hierarchy, Hyperledger.

References
[1] Luuc Van Der Horst, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac, “Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core,” IEEE Access, vol. 5, pp. 22385–22398, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ameer Al-Nemrat, “Identity Theft on e-government/e-governance and Digital Forensics,” International Symposium on Programming and Systems (ISPS), pp. 1–1, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Luca Caviglione, Steffen Wendzel, and Wojciech Mazurczyk, “The Future of Digital Supply Chain: Challenges and the Road Ahead,” IEEE Security and Privacy, vol. 15, no. 6, pp. 12-17, 2017.
[CrossRef] [Publisher Link]
[4] Maxim Chernyshev et al., “Internet of Things Block Chain: The Need, Process Models, and Open Issues,” IT Professional, vol. 20, no. 3, pp. 40–49, 2018.
[CrossRef] [Publisher Link]
[5] Mumin Cebe et al., “Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles,” IEEE Communications Magazine, vol. 56, no. 10, pp. 50 – 57, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Lone, A. H., & Mir, R. N., “Forensic-Chain: Ethereum Blockchain based Digital Forensics Chain of Custody,” Scientific & Practical Cyber Security Journal, vol. 1, no. 2, pp. 21-27. 2018.
[Google Scholar] [Publisher Link]
[7] Emmanuel Nyaletey et al., “BlockIPFS - Blockchain-Enabled Interplanetary File System for Supply chain and Trusted Data Traceability,” IEEE International Conference on Blockchain (Blockchain), pp. 18–25, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Larry E. Daniel, and Lars E. Daniel, Digital Forensics for Legal Professionals, Understanding Digital Evidence from the Warrant to the Courtroom, Elsevier, Syngress Book Co., 2012.
[Google Scholar] [Publisher Link]
[9] Shancang Li et al., “Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2299-2308, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Cheng Li, Liang-Jie Zhang, “A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things,” IEEE International Congress on Internet of Things (ICIOT), pp. 33–41, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ezz El-Din Hemdan, and D. H. Manjaiah, “CFIM : Toward Building New Cloud Forensics Investigation Model,” Innovations in Electronics and Communication Engineering, Lecture Notes in Networks and Systems, vol. 7, pp. 545–554, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mahmud Hossain, Yasser Karim, and Ragib Hasan, “FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger,” IEEE International Congress on Internet of Things (ICIOT), pp. 33–40, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ghita Mezzour et al., “A Socio-Computational Approach to Predicting Bioweapon Proliferation,” IEEE Transactions on Computational Social Systems, vol. 5, no. 2, pp. 458–467, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Yang Liu, and Shiyan Hu, “Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes,” IEEE Transactions on Computational Social Systems, vol. 2, no. 4, pp. 148 – 158, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Auqib Hamid Lone, and Roohie Naaz Mir, “Forensic-Chain: Ethereum Blockchain-Based Digital Forensics Chain of Custody,” Scientific & Practical Cyber Security Journal, pp. 21-27, 2017.
[Google Scholar] [Publisher Link]
[16] Christopher S Meffert et al., “Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics through IoT Device State Acquisition,” Proceedings of the 12th International Conference on Availability, Reliability and Security, vol. 56, pp. 1-11, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17]S. Li et al., "IoT Forensics: Amazon Echo as a Use Case," in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6487-6497, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[18] Ghita Mezzour et al., “A Socio-Computational Approach to Predicting Bioweapon Proliferation,” IEEE Transactions on Computational Social Systems, vol. 5, no. 2, pp. 458–467, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mahmud Hossain, Yasser Karim, and Ragib Hasan, “FIF-IoT: A Supply Chain Investigation Framework for IoT Using a Public Digital Ledger,” IEEE International Congress on Internet of Things (ICIOT), pp. 33–40, 2018.
[CrossRef] [Publisher Link]
[20] T. Rajendran et al., “A Study on Blockchain Technologies for Security and Privacy Applications in a Network,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 6, pp. 69-91, 2023.
[CrossRef] [Publisher Link]
[21] Shuai Wang et al., “Parallel Crime Scene Analysis Based on ACP Approach,” IEEE Transactions on Computational Social Systems, vol. 5, no. 1, pp. 244–255, 2018. [CrossRef] [Google Scholar] [Publisher Link]
[22] Ana Nieto, Rodrigo Roman, and Javier Lopez, “Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices,” IEEE Network, vol. 30, no. 6, pp. 34 – 41, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Shancang Li, Li Da Xu, and Xinheng Wang, “Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2177–2186, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Hubert Ritzdorf et al., “Toward Shared Ownership in the Cloud,” IEEE Transactions on Information Blockchain and Security, vol. 13, no. 12, pp. 3019–3034, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ankit Shah et al., “Understanding Tradeoffs between Throughput Quality and Cost of Alert Analysis in a CSOC,” IEEE Transactions on Information Forensics Security, vol. 14, no. 5, pp. 1155-1170, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Shancang Li, Tao Qin, and Geyong Min, “Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems,” IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1433-1441, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Zhaoli Liu et al., “Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management,” IEEE Access, vol. 6, pp. 73940–73951, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Giannis Tziakouris, “Cryptocurrencies-A Forensic Challenge or Opportunity for Law Enforcement? An Interpol Perspective,” IEEE Security Privacy, vol. 16, no. 4, pp. 92-94, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Abigail Paradise et al., “Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks,” IEEE Transactions on Computational Social Systems, vol. 4, no. 3, pp. 65-79, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Yong Zhang et al., “A Blockchain-Based Process Provenance for Cloud Forensics,” 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 2470-2473, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Shams Zawoad, Ragib Hasan, and Anthony Skjellum, “OCF: An Open Cloud Forensics Model for Reliable Digital Forensics,” IEEE 8th International Conference on Cloud Computing, pp. 437-444, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Aleksandar Valjarevic, and Hein Venter, “A Harmonized Process Model for Digital Forensic Investigation Readiness,” IFIP International Conference on Digital Forensics, vol. 410, pp. 67-82, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Stuart Haber, and W. Scott Stornetta, “How to Time-Stamp A Digital Document,” Journal of Cryptology, vol. 3, pp. 99-111, 1991.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf