scholarly journals Two-Level Blockchain System for Digital Crime Evidence Management

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3051
Author(s):  
Donghyo Kim ◽  
Sun-Young Ihm ◽  
Yunsik Son

Digital evidence, such as evidence from CCTV and event data recorders, is highly valuable in criminal investigations, and is used as definitive evidence in trials. However, there are risks when digital evidence obtained during the investigation of a case is managed through a physical hard disk drive until it is submitted to the court. Previous studies have focused on the integrated management of digital evidence in a centralized system, but if a centralized system server is attacked, major operations and investigation information may be leaked. Therefore, there is a need to reliably manage digital evidence and investigation information using blockchain technology in a distributed system environment. However, when large amounts of data—such as evidence videos—are stored in a blockchain, the data that must be processed only within one block before being created increase, causing performance degradation. Therefore, we propose a two-level blockchain system that separates digital evidence into hot and cold blockchains. In the criminal investigation process, information that frequently changes is stored in the hot blockchain, and unchanging data such as videos are stored in the cold blockchain. To evaluate the system, we measured the storage and inquiry processing performance of digital crime evidence videos according to the different capacities in the two-level blockchain system.

Author(s):  
Prof. Sachin Babulal Jadhav

Digital crimes are taking place over the entire world. For any digital crime which commit at any part of world, computer or any electronic devices are used. The devices which are used to commit the crime are useful evidences which must be identified and protected for further use. The crimes involving electronic devices are called as cyber-crime. To investigate such crimes, a scientific procedures needs to be followed. The data collection, analysis, preservation and presentation of digital evidence is must in order investigate the cybercrime. This paper highlights the practices that are used worldwide in the investigation process of cyber-crime. Keywords: Digital Forensics, Analysis, Investigation, models of investigation.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


Author(s):  
Matthew N.O. Sadiku ◽  
Adebowale E. Shadare ◽  
Sarhan M. Musa

Digital chain of custody is the record of preservation of digital evidence from collection to presentation in the court of law. This is an essential part of digital investigation process.  Its key objective is to ensure that the digital evidence presented to the court remains as originally collected, without tampering. The chain of custody is important for admissible evidence in court. Without a chain of custody, the opposing attorney can challenge or dismiss the evidence presented. The aim of this paper is to provide a brief introduction to the concept of digital chain custody.


2021 ◽  
Vol 5 (1) ◽  
pp. 45-54
Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Muhammad Irwan Syahib

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.


Author(s):  
Cheng-Yong Liu ◽  
Ruey-Cheng Chen

In recent years there has been a phenomenon of “Thirst for Credit Investigation Information” within China's internet finance industry. To compensate for the new credit investigation demands that traditional measures of credit investigation lack, big data credit investigation has been widely recognized as a viable solution. Big data credit investigation however poses greater risks to the rights and interests of the information subject. In order to solve the existing problems associated with the data credit investigation industry, the author advocates that special laws and regulations be revised or formulated on the basis of balancing the rights and interests of the information subject with those of public interests. In the future, the combination of big data credit investigation system with blockchain technology may effectively solve the problems that are harmful to the rights and interests of the information subject, such as information-isolated island and information security.


Author(s):  
Cheng-Yong Liu ◽  
Ruey-Cheng Chen

In recent years there has been a phenomenon of “Thirst for Credit Investigation Information” within China's internet finance industry. To compensate for the new credit investigation demands that traditional measures of credit investigation lack, big data credit investigation has been widely recognized as a viable solution. Big data credit investigation however poses greater risks to the rights and interests of the information subject. In order to solve the existing problems associated with the data credit investigation industry, the author advocates that special laws and regulations be revised or formulated on the basis of balancing the rights and interests of the information subject with those of public interests. In the future, the combination of big data credit investigation system with blockchain technology may effectively solve the problems that are harmful to the rights and interests of the information subject, such as information-isolated island and information security.


Author(s):  
Bernd Carsten Stahl ◽  
Moira Carroll-Mayer ◽  
Peter Norris

In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals. These need to have a high level of competence in technical matters, but they must also be able to evaluate technical issues with regards to the legal environment. Digital evidence is worth nothing if it is not presented professionally to a court of law. This chapter describes the process of designing a university course (a full undergraduate BSc degree) in forensic computing. The aim of the chapter is to present the underlying rationale and the design of the course. It will emphasise the problem of interdisciplinary agreement on necessary content and the importance of the different aspects. It is hoped that the chapter will stimulate debate between individuals tasked with designing similar academic endeavours and that this debate will help us come to an agreement what the skills requirement for forensic computing professionals should be.


Author(s):  
Seong-Kyu Kim ◽  
Jun-Ho Huh

Abstract This paper deals with the current Blockchain adopted in the various types of trading markets supporting smart contracts that process text-based transaction information only when exchanging cryptocurrencies. Even though the Blockchain itself is decentralized, services can still be provided through a centralized system in order to provide adequate services to the users. It also allows the Autochain to apply Blockchain technology to existing businesses conducted under the Fourth Industrial Revolution to realize higher productivity or competitiveness and improve profitability to a remarkable extent. The Autochain is adaptable to all Blockchain technologies, companies, or research works around the world to overcome the limitations of the existing Blockchain technology. It creates the Blockchain-platform ecology chain and ecosystem, making our lives more convenient while revolutionizing every industry. In addition, it automates all Blockchain-based systems and offers a base for constructing a system wherein everyone can easily provide, operate, and maintain Blockchain services. This paper discusses a number of Blockchain-related technologies and presents a decentralized Application (dApp) exclusively designed for mobile use, taking house rental service as an example. It also presents the existing Blockchain and the Blockchain database storage method and proposes the dApp based on it.


2021 ◽  
Vol 7 (2) ◽  
pp. 149
Author(s):  
Nero Chaniago ◽  
Parman Sukarno ◽  
Aulia Arif Wardana

Ethereum is one of the oldest examples of blockchain technology provides a system that converts centralized storage to distributed and records transactions by way of decentralized and not by a centralized system and can be verified by each node, therefore it is suitable for storing fingerprints from official diploma documents and transcripts that are published. Smart contract is needed for making contract transactions to Ethereum with programming code, so contracts such as diplomas and transcripts uploaded on the Ethereum blockchain can distribute and produce diploma validation and the authenticity of transcripts with transaction hash, consensus, and comply with ERC-721 token standardization. The results showed that a sample of 5 electronic documents in pdf format with a transaction speed of 1 second on each file that were published and secured with Ethereum blockchain technology can be easily verified for authenticity, the system proposed and developed by us takes in consideration invalid and failure cases by giving the necessary feedback to the user.


2021 ◽  
Vol 40 ◽  
pp. 03037
Author(s):  
Anurag Gharat ◽  
Pratik Aher ◽  
Punit Chaudhari ◽  
Bhavana Alte

Public Healthcare issues have been the main focus of any governing body for the last decade. Each day a large amount of Healthcare data is generated by individual and Medical Organizations. This information is considered highly sensitive and private, which needed to be securely stored and protected against unauthorized access. In a traditional system, all the data is stored in a centralized system which comes with lots of drawbacks. This where blockchain technology comes in because of its Peer-To-Peer nature and Security. Several studies highlight the importance of blockchain and how it can be implemented in Electronic Medical Record(EMR) systems which face problems regarding privacy,security,decentralization and confidentiality.In this paper, We explain how blockchain technology may be utilised to improve EMR systems and how it could be a solution to these problems. We offer a framework for implementing blockchain technology in the healthcare industry for EMR.The aim of our proposed framework is first to implement blockchain technology for EHR and secondly to provide secure storage of electronic records by defining granular access rules for the users of the proposed framework. Moreover,this framework provides the EHR system with the benefits of a blockchain-based solution that is scalable, secure, and integrated.


Sign in / Sign up

Export Citation Format

Share Document