Professional Documents
Culture Documents
Seyi Article
Seyi Article
BLOCKCHAIN TECHNOLOG
I. INTRODUCTION
Our society is becoming increasingly digitized. This can be seen in the number of
smartphones and computers coming onto the market. It is evident that this has led to easier
business transactions, higher productivity, profitable management, and easier access to
information [3]. However, these technologies have their drawbacks, digital crime has
increased and nations have grappled with these challenges. It may not be possible to
completely stop digital crimes; however, significant and useful improvements in digital crime
prosecution, processing, and storage of digital crime evidence have been implemented,
improving the crime investigation process [4]. A blockchain is a growing list of records. It
began with the invention of Bitcoin in 2008 and has since evolved, increasingly impacting all
sectors and industries [29]. It is a technology used to record details on a blockchain [28]. The
first block in a blockchain is called the genesis block and only contains the hash value of
subsequent blocks. The decentralized nature of the blockchain allows for the retrieval of
manipulated data [24]. This permits for data to be adequately verified ensuring its correctness
and purity [6]. Although the system can be amazingly complex, it can preserve digital
evidence and make it increasingly accessible to investigators [10].
Blockchain technology consists of a sequence of blocks that contain the ledger transaction.
However, there is nothing to prevent it from being used in this way in the future, as consensus
would need to be reached to add these systems to Bitcoin [18]. It records the transaction in a
ledger called a blockchain [25]. It is a distributed ledger that records transactions in which
values are stored and where multiple copies of ledgers exist and are distributed among
multiple participants in the criminal investigation process [27].
The ledger is distributed across multiple nodes over a network that is used to log each new
item of data that is added to the ledger. Every time new data is added or changed in the
system, the nodes have to agree on whether or not to add it to the blockchain. However, the
platform is beginning to expand its use beyond the financial sector [5].
Digital evidence plays a very important role in solving crimes, as it allows people to be
linked to their criminal activities, so there must be a guarantee of their integrity and
authenticity when moving from one hierarchy level to another [17]. If there are indications of
a change in evidence, it may not be valuable when brought to court [22,23]. The detection of
criminal activities is essential in the digital forensic investigation process [13]. Chain of
Custody refers to the documentation of the forensic registration process. It contains all the
important steps that the investigator takes to solve the crime [9]. This chain of custody aids
the investigation by allowing the investigator to show where the crime was committed, who
did it, and what type of equipment or tool was used to commit the crime. The evidence
collected is then uploaded to a blockchain to make it tamper-proof and preserve its purity
when presented in court [23]. The investigator examines the forensic copy to determine what
information or data can be gleaned from it. Subsequently, all the information received is
forwarded to the police along with the evidence [1]. However, the challenge with this system
is that digital security and evidence integrity can be compromised. It is possible for evidence
to be altered by an individual once the device is in police custody, or for someone to break
into the computer system used by the investigator to alter certain parts of the evidence [32].
This leaves the current system open to attack and unsafe for proper forensic investigation.
Faced with this challenge, blockchain technology has emerged as a possible solution [19].
return decrypted.toString();}
G Sharing of encryption and decryption keys amongst users of the application
A public key is a cryptographic key that can be distributed to the public and does not require
secure storage. Messages encrypted by the public key can only be decrypted by the
corresponding private key. Private Keys are used by the recipient to decrypt a message that is
encrypted using a public key. Since the message is encrypted using a given public key, it can
only be decrypted by the matching private key.
V. CONCLUSION
This study designed and developed a new Digital Forensic Investigation (DFI) model that
included a digital blockchain to protect the confidentiality, integrity, and authenticity of
digital evidence. The results obtained showed that the Digital Threat Investigator model was
able to fulfill the attributes of confidentiality, integrity and authenticity of the digital evidence
and the Digital Threat Investigator model.
ACKNOWLEDGMENT
My appreciation goes to Almighty GOD whose love, infinite mercy, and grace made it
possible for me to complete this project work successfully. My sincere appreciation goes to
my Supervisor - Dr. A. Oguntimilehin who doubles as the Head of Computer Science
Programme for his advice, tolerance, prompt attention and encouragement which led to the
successful completion of this work and the author thank Afe Babalola University, Ado Ekiti,
Nigeria for supporting this research.
REFERENCES
[1] Adeshola K. (2019), “Process memory investigation of the bitcoin clients electrum and
bitcoin core,” IEEE Access, vol. 5, pp. 22 385–22 398.
[2] Al-Nemrat D. (2018) “Identity theft on e-government/e-governance and digital forensics,”
International Symposium on Programming and Systems (ISPS), Algiers, Algeria. pp. 1–1.
[3] Aptara M. (2017), “The future of digital supply chain: Challenges and the road ahead,”
IEEE Security Privacy, vol. 15, no. 6, pp. 12–17.
[4] Aste M., Zeadally S., Baig Z., and Woodward A. (2017), “Internet of things block chain:
The need, process models, and open issues,” IT Professional, vol. 20, no. 3, pp. 40–49.
[5] Cebe M., Erdin E., Akkaya K., Aksu H., and Uluagac S. (2018), "Block4Forensic:
AnIntegrated Lightweight Blockchain Framework for Forensics Applications of Connected
Vehicles," in IEEE Communications Magazine, Miami, Florida. vol. 56, no. 10, pp 50 –
57.
[6] Chen A. and Mir A. (2018), “Supply chain-chain: Ethereum blockchain-based digital
supplychain chain of custody,” Scientific & practical cyber security journal-ISSN 2587-4667.
[7] Cognoscenti E., Parizi R., Zhang Q., and Choo K. (2016) BlockIPFS - Blockchain-
Enabled Interplanetary File System for Supply chain and Trusted Data Traceability. In
Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta,
GA, USA, 14–17 pp. 18–25.
[8] Daniel, L., & Daniel, L. (2012). Digital forensics for legal professionals. Syngress Book
Co, 1, 287–293.
[9] Gopalan Q. (2019), “Distributed consensus algorithm for events detection in cyber-
physical systems,” IEEE Internet of Things Journal, pp. 1–1.
[10] Hamayoun C. (2018). “A Blockchain Based New Secure Multi-Layer Network Model
for Internet of Things”. In Proceedings of the 2017 IEEE International Congress on
Internet of Things (ICIOT), Honolulu, Hawaii, USA, 25–30; pp. 33–41.
[11] Hemdan, E. E., & Manjaiah, D. H. (2018). CFIM : Toward Building New Cloud
Forensics Investigation Model. 545–554.
[12] Hossain M., Karim L., and Hasan R. (2018), “FIF-IoT: A Forensic Investigation
Frameworkfor IoT Using a Public Digital Ledger,” in 2018 IEEE International Congress on
Internet of Things (ICIOT), pp. 33–40, Honolulu, Hawaii, USA.
[13] Hosseini G., Frankenstein G., Carley K and Carley L. (2019), “A Socio-Computational
Approach to Predicting Bioweapon Proliferation,” IEEE Transactions on Computational
Social Systems, vol. 5, no. 2, pp. 458–467.
[14] Liu Y. and Hu S. (2015) “Cyberthreat Analysis and Detection for Energy Theft in Social
Networking of Smart Homes,” IEEE Transactions on Computational Social Systems, vol. 2,
no. 4, pp. 148 – 158, Southampton, United Kingdom.
[15] Lone A. and Mir A. (2018), “Forensic-chain: Ethereum blockchain-based digital
forensics chain of custody,” Scientific & practical cyber security journal— ISSN 2587-4667.
[16] Meffert, C., Clark, D., Baggili, I., & Breitinger, F. (2017). Forensic State Acquisition
from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT
Forensics through IoT Device State Acquisition. Proceedings of the 12th International
Conference on Availability, Reliability and Security, 56:1--56:11.
https://doi.org/10.1145/3098954.3104053
[17] Megget S. (2018), “IoT Supply chain: Amazon Echo as a Use Case,” IEEE Internet of
Things Journal, pp. 1–1.
[18] Mezzour G., Frankenstein G., Carley K and Carley L. (2018), “A Socio-Computational
Approach to Predicting Bioweapon Proliferation,” IEEE Transactions on Computational
Social Systems, vol. 5, no. 2, pp. 458–467.
[19] Miller M. (2018), “FIF-IoT: A Supply chain Investigation Framework for IoT Using a
Public Digital Ledger,” in 2018 IEEE International Congress on Internet of Things (ICIOT),
San Francisco, California, USA. pp. 33–40.
[20] Nyaletey E., Parizi R., Zhang Q. and Choo K. (2019) BlockIPFS - Blockchain-Enabled
Interplanetary File System for Forensic and Trusted Data Traceability. In Proceedings of the
2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, Georgia, USA,
14–17 pp. 18–25.
[21] Osanaiye S. (2015), “Parallel Crime Scene Analysis Based on ACP Approach,” IEEE
Transactions on Computational Social Systems, vol. 5, no. 1, pp. 244–255.
[22] Parizi A., Roman R., and Lopez J. (2018), “Digital witness: Safeguarding digital
evidence by using secure architectures in personal devices,” IEEE Network, vol. 30, no. 6, pp.
34 – 41.
[23] Renuka L., and Trivedi X. (2021) “Compressed sensing signal and data acquisition in
wireless sensor networks and internet of things,” IEEE Transactions on Industrial Informatics,
vol. 9, no. 4, pp. 2177–2186.
[24] Robinson H., (2018) “Toward shared ownership in the cloud,” IEEE Transactions on
Information Blockchain and Security, vol. 13, no. 12, pp. 3019 – 3034.
[25] Shah A., Ganesan R., Jajodia S., and Cam H. (2018) "Understanding tradeoffs between
throughput quality and cost of alert analysis in a CSOC", IEEE Transactions on Information
Forensics Security, vol. 14, no. 5, pp. 1155-1170.
[26] Shancang L., Tao Q., Geyong M. (2019), "Blockchain-Based Digital Forensics
InvestigationFramework in the Internet of Things and Social Systems", IEEE Transactions on
Computational Social Systems, vol.6, no.6, pp.1433 - 1441.
[27] Tasatanattakool Z. (2018), “Behavior rhythm: A new model for behavior visualization
and its application in system security management,” IEEE Access, vol. 6, pp. 73 940–73 951.
[28] Tziakouris G. (2018), “Cryptocurrencies a forensic challenge or opportunity for law
enforcement? An Interpol perspective,” IEEE Security Privacy, vol. 16, no. 4,
[29] Watanabe A., Shabtai A., Puzis R., Elyashar A., Elovici Y., Roshandel M. and Peylo C
(2016), “Creation and Management of Social Network Honeypots for Detecting Targeted
Cyber Attacks,” IEEE Transactions on Computational Social Systems, vol. 4, no. 3, pp.65–79.
[30] Zhang J., Wu S., Jin B., and Du J. (2017), “A blockchain-based process provenance for
cloud forensics,” 3rd IEEE International Conference on Computer and Communications
(ICCC), Chengdu, China; pp. 2470 – 2473
[31] Ritzdorf H., Soriente C., Karame G., Marinovic S., Gruber D., and Capkun S. (2018)
“Toward shared ownership in the cloud,” IEEE Transactions on Information Forensics and
Security, vol. 13, no. 12, pp. 3019 – 3034.
[32] Valjarevic A. and Venter H. (2013), “A harmonized process model for digital forensic
investigation readiness,” in IFIP International Conference on Digital Forensics. Springer,
Orlando, Florida, USA; pp. 67 – 82.
[33] Haber S., and Stornetta W.S. (1991) How to time-stamp a digital document. J.
Cryptology 3, 99-111 https://doi.org/10.1007/BF00196791
[34] Nakamoto S. (2008) "Bitcoin: A Peer-to-Peer Electronic Cash System,"[Online].
Available: https://bitcoin.org/bitcoin.pdf
[35] Zawoad, S., Hasan, R., & Skjellum, A. (2015). OCF: an open cloud forensics model for
reliable digital forensics. 2015 IEEE 8th International Conference on Cloud Computing, pp.
437–444
[36] Zawoad, S., & Hasan, R. (2015). A trustworthy cloud forensics environment. IFIP
Advances in Information and Communication Technology, 462, 271–285.
https://doi.org/10.1007/978-3-319-24123-4_16