Forensic Evidence Management Using Blockchain Technology
Forensic Evidence Management Using Blockchain Technology
user-centricity. The authors explore emerging technologies cases. This flexibility empowers organizations to design
like blockchain and decentralized identifiers, offering bespoke blockchain solutions optimized for their unique
solutions for identity verification and data sharing. business needs, fostering innovation and digital
Additionally, they discuss the societal implications of transformation. Fabric's support for modular consensus
decentralized identity systems, such as addressing identity protocols further enhances its appeal, allowing organizations
theft and digital exclusion. Real-world applications, from to tailor the blockchain network's consensus mechanism to
identity wallets to voting systems, demonstrate the versatility align with their trust models and operational requirements.
of decentralized solutions. In conclusion, Goodell and Moreover, Fabric's compatibility with standard
colleagues envision a future where decentralized identity programming languages eliminates the need for platform-
empowers individuals, protects their rights, and fosters specific smart contract languages, thereby lowering the
inclusivity. Their paper calls on policymakers and barrier to entry for developers and accelerating blockchain
technologists to embrace decentralized identity as a means adoption. Beyond its technical prowess, Fabric embodies an
to create a more equitable digital society. ethos of openness, collaboration, and community-driven
innovation within the Hyperledger ecosystem. Through
Personal Archive Service System using Blockchain continuous evolution and adaptation, Fabric remains at the
Technology: Case Study, Promising and Challenging forefront of distributed ledger technology, poised to redefine
In this research, Yixuan Zhu et al. have proposed enterprise blockchain and empower organizations to thrive
Blockchain is an ever-expanding collection of records, or in the digital age. Androulaki et al.'s paper serves as a
blocks, connected and safeguarded by encryption. A seminal contribution to the field, illuminating the path
timestamp, transaction data, and a hash pointer serving as a towards a more inclusive, interoperable, and scalable
link to a previous block are normally included in every blockchain ecosystem, where innovation knows no bounds.
block. Blockchains are by their very nature resistant to data
alteration. The blockchain is "an open, distributed ledger B-CoC: A Blockchain-Based Chain of Custody for
that can record transactions between two parties efficiently Evidences Management in Digital Forensics
and in a verifiable and permanent way." A blockchain is In their groundbreaking paper, Silvia Bonomi and
usually maintained via a peer-to-peer network that follows a colleagues delve into the intricate realm of digital forensics,
common protocol for verifying new blocks in order to emphasizing the paramount importance of effective evidence
function as a distributed ledger. Once recorded, the data in a management—a cornerstone of successful investigations
block cannot be changed backward without changing all and legal proceedings. Central to digital forensics is the
blocks that come after it, which calls for the majority of the meticulous management of evidentiary artifacts,
network to operate together. Digital money, like Bitcoin, is encompassing activities from collection to presentation in
the most straightforward and widely used blockchain court, known as the Chain of Custody (CoC). This process
application. Bitcoins, in contrast to conventional money, are ensures the integrity and admissibility of evidence despite
totally virtual. Coins, either real or digital, do not exist in passing through multiple stakeholders. The CoC process
and of themselves. In transactions when value is transferred requires stringent protocols at each stage to prevent
from sender to receiver, the coins are inferred. Bitcoin users tampering, contamination, or unauthorized access.
own keys that enable them to authenticate transactions Evidentiary integrity, upheld through rigorous
inside the network, releasing the value so they may spend it documentation and tracking mechanisms, underpins the
or give it to another person. Usually, each user's computer reliability of digital evidence in legal proceedings. Multi-
has a digital wallet where such keys are kept. The sole need stakeholder involvement necessitates effective collaboration
to spend bitcoins is to have the key that unlocks the and communication to safeguard the evidential chain. In the
transaction, giving each user complete power. These days, an digital age, managing evidence is further complicated by the
increasing number of businesses and entrepreneurs are dynamic nature of digital data. Bonomi et al. propose a
utilizing blockchain in finance records, medical records, and comprehensive framework for digital evidence management,
other records management activities, like identity integrating advancements like blockchain and cryptographic
management, transaction processing, documenting hashing to enhance security and integrity. Interdisciplinary
provenance, or food traceability, due to its decentralization, collaboration and knowledge sharing are advocated to
trustlessness, collective maintenance, and dependability. promote consistency and reliability in evidentiary practices.
Overall, the paper provides invaluable insights into
Hyperledger Fabric: A Distributed Operating System for navigating evidence management complexities, ensuring the
Permissioned Blockchains integrity and admissibility of digital evidence in legal
In their seminal paper, Elli Androulaki and colleagues proceedings, and advancing the field of digital forensics.
delve into Fabric, an innovative modular and extensible
open-source system designed for deploying and managing III. EXISTING SYSTEM
permissioned blockchains. Positioned as a flagship project
under the Hyperledger umbrella hosted by the Linux Recognizes the critical role of evidence in forensic
Foundation, Fabric represents a significant leap forward in science, emphasizing its significance in solving cases and
distributed ledger technology. Its modular architecture, a delivering justice by preventing alterations. Highlights the
departure from traditional monolithic blockchain systems, essentiality of the Chain of Custody process, underscoring
enables developers to seamlessly integrate custom that its failure may render evidence inadmissible in court,
consensus protocols and components tailored to specific use leading to potential case dismissal. Advocates for a digital
Login
By requiring a username and password, the login
module offers banks and users a safe authentication method.
In order to customize access rights, it differentiates between
normal users and banks based on responsibilities. Fig 1 System Architecture Algorithm Details
User Sign-Up A text or data file may be signed using the SHA 256
Through the collection of necessary data, including technique, often known as a digest. A text may be signed
first and last name, email address, cell phone number, with a nearly unique 256-bit (32-byte) signature using SHA-
username, and password, user registration makes it easier to 256. A hash is a cryptographic "one-way" characteristic that
create new accounts. The basis for user involvement in the has a set size for all source text sizes; unlike encryption, it
block chain-based security system is laid forth in this cannot be decoded back to the original text. Because of this,
module. it's perfect for comparing "hashed" copies of texts instead of
decrypting them to get the original version.
Home
The Home module, which shows important details for Basic Initialization will be done for 8 Items
every block, contains all of the block chain system's
essential features. This contains the hash of the previous Step 1: Information is a array 8 things in length
block, the hash of the current block, the block number, the where everything is 32 bits.
timestamp, the contents, and the nonce (a cryptographic Step 2: out is array 8 things in length where everything is
integer). By gaining access to the block chain's structure, 32 bit.
users may verify the accuracy of the data contained within. Step: 3 Compute all the capacity boxes and store those
qualities. Allude to them by work name
Step: 4 Store input, right moved by 32 bits, into out. User Signup, Home, Keys, Data , and Authenticate. User-
Now, in the out exhibit, E is an inappropriate worth and friendly input and output interfaces are given priority in the
A is unfilled design, which improves usability and accessibility. The
Step: 5 Store the capacity boxes. Presently we have to system's objective is to mitigate the dangers associated with
compute out E and out A. note: Supplant the modulo centralized forensic evidence management and promote
orders with a bitwise AND 2^ (32-1) confidence in an increasingly digital environment by
Step: 6 Store (Input I + CH + ((XT+YT) AND 2^31)) offering a dependable and robust platform for users and
AND 2^31 As Mod1 banks, via methodical testing and deployment. Because of
Step: 7 Store (Sum1 + Mod1) AND 2^31 as Mod2 the thorough methodology used throughout the development
Step:8 Store (b + Mod2) AND 2^31 into out E Presently and implementation phases, the system is positioned as a
out E is right and all we need is out A viable and efficient means of handling the ever-evolving
Step: 9 Store (NA + Mod2) AND 2^31 as Mod3 complexity of Forensic evidence management.
Step:10 Store (Sum0 + Mod3) AND 2^31 into output.
FUTURE WORK
V. RESULT ANALYSIS
The personal identification security system based on
The suggested approach shows a significant increase, blockchain may be improved in the future by being
innovative and adjusting to new technology. Integrating
obtaining an accuracy rate of 88%, compared to the present
algorithm's 75% accuracy rate. This improvement points to smart contracts and sophisticated consensus techniques
a significant improvement in the suggested algorithm's might improve the security and usefulness of the system
ability to handle and analyze data effectively or carry out its even further. Examining the integration of verified
credentials and decentralized identifiers (DIDs) might
intended function. Numerous variables, including
optimization approaches, algorithmic modification, or the improve the interoperability and scalability of digital
incorporation of more reliable data preparation methods, identities. In addition, the system may benefit from
investigating biometric authentication techniques to offer
may contribute to the suggested algorithm's increased
one more degree of user verification.
accuracy. This improvement in accuracy highlights the
suggested algorithm's ability to provide more dependable
outcomes and favourably impact its targeted application REFERENCES
area.
[1]. R. Kumar, A. Malik, and V. Ranga, "Identification
Table 1 Comparison Table Verification System via Blockchain Technology,"
Nov. 2022, vol. 256, art. no. 109762, Knowledge-
Algorithm Accuracy
Based Systems.
Existing 75
[2]. BPDIMS: A Blockchain-based Personal Data and
Proposed 88 Identity Management System, W. Wang, S. Jian, Y.
Tan, Q. Wu, and C. Huang, Compute. Secure.,
vol.112, Jan.2022, Art. no.102537.
[3]. "Personal Archive Service System using Blockchain
Technology: Case Study, Promising and
Challenging," by J. Oughton, W. Lehr, K. Katsaros, I.
Selinis, D. Bubley, and J. Kusuma June 2021,
Telecom Policy, vol. 45, no. 5, Art. no. 102127
In February 2021, B. A. Tama and S. Lim published
"Blockchain-based Identity Management with
Mobile Device" in Computer Science and
Engineering Review, vol. 39, art. no. 100357.
[4]. "Blockchain-Based Identity Management Systems: A
Review," by S. Lei, C. Xia, Z. Li, X. Li, and T. Wang
IEEE Trans. Netw. Sci. Eng., Oct. 20, 2021, vol. 8,
no. 4, pp. 3257–3274
Fig 2 Comparison Graph [5]. "Blockchain-Based Identity Management System
and Self-Sovereign Identity Ecosystem: A
VI. CONCLUSION Comprehensive Survey," by Y. Cheng, Y. Xu, H.
Zhong, and Y. Liu IEEE Internet Things Journal, Jan.
To sum up, the suggested blockchain-based SHA-256 2021, vol. 8, no. 1, pp. 144–155.
encryption Forensic evidence management system offers a [6]. "DNS-IdM: A Blockchain Identity Management
strong and creative response to the problems associated with System to Secure Personal Data Sharing in a
protecting digital identities. The system assures data Network," by X. Li, M. Zhu, L. T. Yang, M. Xu, Z.
integrity, user privacy, and secure financial transactions in Ma, C. Zhong, H. Li, and Y. Xiang IEEE
addition to establishing a decentralized and transparent Transactions on Dependable Secure Computing, vol.
framework via the integration of modules including Login, 18, no. 4, July/Aug. 2021, pp. 1591–1604