We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15
Developing a Blockchain
based Evault for Legal
Records Ravi Kumar P Department of Computer Science Engineering Vidyavardhaka College of Engineering, Mysore – 570001
Abstract-eVault, a operations and improve
blockchain-based platform, is access to critical an inventive way to solve the information. Yet, despite problems with the legal these advancements, records management system. challenges persist in Our goal is to establish an environment that is safe, ensuring the integrity, open, and responsive to the security, and accessibility requirements of all parties of legal records. The need involved—lawyers, courts, for a robust, tamper-proof, clients, and registrars, among and transparent system for others. First and foremost, managing legal documents our system is based on a has never been more strong blockchain platform, pressing. such as Ethereum, which makes good use of smart The legal profession is contracts to control changing dramatically in transactions, access, and the digital age. Electronic authorization. As a result, documents and records are every interaction within the becoming more and more system is guaranteed to be important to the justice, completely transparent and secure. For all stakeholders, legal practitioners, and we have created user-friendly clients as a means of interfaces for our eVault streamlining procedures system. Legal document and enhancing access to uploads and retrievals, vital information. However, modification tracking, and difficulties still exist in information sharing are all guaranteeing the accuracy, made simple for judges, safety, and usability of legal attorneys, clients, and documents. It is more registrars alike. However, we have taken other steps as well important than ever to have further by including a a reliable, unchangeable, function for creating and and open system for saving documents in our handling legal papers. website and app. The creation and safe storage of legal papers is made possible by By improving their this function, which expedites security, openness, and the whole documentation efficiency and guaranteeing process. compliance with legal and regulatory standards, this ground-breaking project I. seeks to completely INTRODUCTION transform the way legal In the digital age, the legal records are administered. In industry is undergoing a the future, legal profound transformation. professionals, clients, and Legal professionals, clients, authorities will be able to and the judiciary rely on a state-of-the-art increasingly rely on system to protect the electronic documents and integrity of legal documents records to streamline and expedite legal Upon storing a legal processes since this project document in the eVault, a will create a blockchain- distinct cryptographic hash based digital eVault for is produced for each legal records. document. Located on the blockchain, this hash A. BLOCKCHAIN resembles a digital TECHNOLOGY fingerprint. Any alterations to the document would Blockchain is a distributed result in a hash change, ledger system that operates notifying all parties on a decentralized network involved of the attempted of computers to provide tampering. By ensuring that safe, transparent, and the validity and integrity of the document can be unchangeable record- independently confirmed by keeping of transactions. anybody with blockchain Peer-to-peer networking is access, this helps to boost how it functions. public confidence in the where a copy of the legal system. complete blockchain is stored on each node, or 2) Smart Contracts: These member, in the network. can be used in the legal The data is kept in blocks, system to automate and and the term "blockchain" enforce the performance of refers to the chain of blocks contracts. A smart contract, that is created when each for instance, may be used to block is connected to the automatically transfer preceding one using ownership of real estate cryptographic hashes. after payment is received. Because smart contracts are The key features of self-executing, they blockchain include: minimize Smart contracts' 1) Decentralization: The self-executing feature network is not under the lessens the chance of jurisdiction of a single conflicts, streamlines organization or body. procedures, and eliminates Rather, everyone in the the need for middlemen. group agrees and validates the ledger's current status. 3)Chain of Custody: 2) Transparency: Openness Blockchain's and trust in the system are decentralized and encouraged by the fact that transparent nature is all players have access to particularly valuable in the same information. maintaining an 3) Immutability: It is very immutable chain of difficult to change or custody for evidence or remove data that has been critical legal documents. added to the blockchain. Each transfer of custody Cryptographic hashing and is recorded as a consensus techniques are transaction on the used to accomplish this blockchain, creating a immutability. clear and traceable 4) Security: Blockchain history. This feature is employs cutting-edge crucial in legal cases cryptography methods to where the integrity and protect transactions and authenticity of evidence guarantee data integrity. are paramount.
4) Chain of Custody: The
B. Blockchain-Based decentralized and eVault for Legal System: transparent characteristics 1)Verification and of blockchain are very Authenticity of Documents: helpful in upholding an The security and reliability unchangeable chain of of the system are enhanced custody for important legal by consensus techniques papers or evidence. A like Proof of Work and transparent and traceable Proof of Stake. history is produced via the blockchain, where each 7) Decentralization and change of custody is Redundancy: The absence documented as a of a single point of failure transaction. This aspect is is guaranteed by the critical in court proceedings decentralized structure of where the veracity and blockchain technology. integrity of the evidence are There is redundancy critical. 4) Digital Identity because every member of and Access Control: A the network owns a copy of secure, decentralized the whole blockchain. This system for managing digital improves the overall identities can be established dependability of the eVault using blockchain for the legal system by technology. Every user may making the system resistant possess a distinct to cyberattacks or data loss. cryptographic key that functions as their online Blockchain technology, by persona. This allows for utilizing these safe and precise access characteristics, provides a management to legal papers strong and safe basis for while also lowering the handling legal documents, possibility of identity theft. automating procedures, and With smart contracts, improving the general access rights may be effectiveness and reliability controlled to guarantee that of the legal system via an only those with permission eVault. can access data can access and change particular data. C. Django Framework: Above a table, a heading is 5) Time-Stamping and displayed using the "table Notarization: The legal head" style. This will system can benefit from number the table for you blockchain's capacity to automatically. Any timestamp transactions for footnotes follow the format notarization. An of a "table footnote," unchangeable record of the appearing beneath the table. exact moment an event Within the table, happened is provided by the superscript lowercase timestamp attached to every letters denote footnotes. transaction on the Table I, below, provides an blockchain. This function is example of a table. A web essential for creating a application is a piece of trustworthy timeline, software that can be resolving disputes, and accessed via a web browser establishing the chronology and is executed on a web of events in legal server. It is typically procedures. created to carry out particular tasks or offer 6) Consensus Mechanism: consumers particular In a blockchain, consensus services. Django is a well- ensures that all users are in liked framework for Python agreement over the ledger's web application current state. Validating development. Django is an transactions and adding open-source, high-level them to the blockchain are web framework that the steps involved in promotes efficient reaching this agreement. development and simple, with their associated straightforward design. Django views. In the MVC architecture, it serves as a With its combination of controller, forwarding tools, frameworks, and incoming requests to the conventions that ease relevant view function in typical development chores, accordance with the Django makes it easier to specified URL patterns. create scalable and reliable This aids in maintaining a online applications. It comprehensible and emphasizes the division of manageable URL structure responsibilities and for the application. encourages code reuse by adhering to the Model- 5) Middleware: Django's View-Controller (MVC) middleware enables global architectural paradigm. request and response Here is a quick rundown of processing either before and the essential elements and after the view is reached. It ideas found in a web can be applied to security, application built with the authentication, and Django framework: request/response 1) Model: The data modification operations. structure of an application is represented by models, 6) Admin Interface: To which are defined by manage models and data, Django using an Object- Django comes with an Relational Mapping (ORM) integrated admin interface framework. By defining the that creates an fields and behaviors of the administration panel on its data entities, models— own. Without creating a Python classes—make it separate admin section, this simple to interface with functionality makes it databases without having to simple for developers to write complex SQL queries. carry out CRUD (Create, Read, Update, Delete) 2) View: Django views actions on the application's manage how the application data. is presented. They take the user's requests, run the data 7) Forms and through the models, and Authentication: Django then provide the proper comes with strong answer. Views provide the authentication built right in, ability to interact with the making it easier to create underlying data, render forms that require user HTML templates, and input. Forms are utilized for manage form submissions. managing user-submitted data and data validation, 3) Template: The user- and authentication facing HTML pages are guarantees safe user access structured and arranged to various program according to predefined components. Django templates. The display layer and business logic can be clearly 8) Django ORM: Through distinguished from one the abstraction of the another because to underlying database templates' potent ability to architecture, the Django render data dynamically ORM streamlines database within HTML. interactions. Python code can be used by developers 4)Controller (URLconf): to design models and URL configuration, or URL execute database mapping, associates URLs operations; Django handles converting these actions data, guaranteeing into SQL queries. transparency and These components work detectability of changes. together to give developers Public-private key pairs are the ability to quickly and used to move blockchain effectively create feature- representations of assets, or rich and maintainable web tokens, between addresses applications using Django. during transactions. Building a wide range of Blockchains come in two web applications, from tiny flavors: public and projects to large-scale, permissioned. They can be enterprise-level systems, is decentralized or centralized. popular with it due to its Blockchain helps with emphasis on best practices, recordkeeping by scalability, and security. monitoring changes and improving privacy by allowing users to control their own data. But issues like scalability and legal II. problems continue to exist. LITERATURE REVIEW In [3]Maisha. Afrida [1]NyaYa is a blockchain- Tasnim, Abdullah Al Omar, based Electronic Law (EL) Mohammad Shahriar management system that Rahman, and Md. Zakirul Verma and Ashwin Alam Bhuiyan present a introduced for digitalized blockchain-based system judicial investigations. that emphasizes data Stakeholder registration, integrity, authenticity, and case registration on a public tamper-proof protection for blockchain using meta-hash the safe storage and keys, updates between law administration of criminal enforcement agencies, and records. The technology case resolution through seeks to prevent smart contracts are the four unauthorized changes and stages of NyaYa. NyaYa is improve overall data a viable option for safe and security by incorporating effective digital evidence criminal records into a management in the judicial blockchain and using a system, since simulation peer-to-peer cloud network demonstrates that it for decentralization. The performs better than suggested system makes it traditional EL storage in a possible for law number of areas, including enforcement and other mining cost, query time, authorized users to and trust likelihood. effectively handle and access criminal records. To secure data validity and In [2]In her work, Victoria avoid manipulation, the L. Lemieux discusses decentralized data Blockchain, a distributed management process uses ledger technology that aims blockchain technology, to provide transaction digital signatures, records that cannot be encryption, and altered. Promises of secure preregistered users. and reliable recordkeeping are driving fast changes in a In [4]A blockchain-based number of industries, data storage and access including healthcare, real structure was suggested by estate, and banking. The Ali, Saqib, Wang Guojun, technique uses White Bebo, Cottrell, and cryptographical chaining to Roger Leslie for PingER, a join blocks of transaction global Internet performance [6]Finding a balance monitoring project. between data security and Metadata is saved on the storage efficiency in blockchain and actual files archival systems is a are stored off-chain in a challenge that Mark W. decentralized way using Storer, Kevin Greenan, Distributed Hash Tables Darrell D. E. Long, and (DHT) and a permissioned Ethan L. Miller address. blockchain. Through Encryption, which aims to distributed processing, hide data patterns, and decentralized storage, and traditional deduplication, effective file retrieval, this which optimizes storage by system lessens dependency removing duplicated data, on a single repository. Peer- are at odds. The method to-peer cloud storage is one suggested in the study of the many applications allows for deduplication that permissioned while preserving encryption blockchains are ideal for, by constantly generating aside from cryptocurrency. encryption keys from data They improve security by chunks. This guarantees allowing only authenticated that keys stay private and and authorized participants. that identical chunks Enhancing PingER's data encrypt to the same management and ciphertext. The method accessibility is the goal of offers improved data the framework. security and effective storage for both distributed and single server storage [5]The crucial topic of systems. The security offsite data recovery and measures are described in security in the event of detail, and the system's catastrophes and ability to accomplish secure cyberattacks is covered by deduplication is assessed. Olumide Malomo, Danda Rawat, and Moses Garuba. Cyber attacks have grown [7]The use of blockchain increasingly complex and technology in forensics to difficult to protect against, preserve and manage the particularly in relation to chain of custody is data storage. The necessity examined by Danielle for secure remote storage Batista, Ana Lara Mangeth, solutions is highlighted by Isabella Frajhof, Paulo the notable increase in Henrique Alves, Rafael ransomware attacks that Nasser, Gustavo Robichez, target sensitive data. In this Gil Marcio Silva, and study, a federated cloud Fernando Pellon de computing infrastructure Miranda. They concentrate with Blockchain support is in particular on physical proposed, which provides evidence. A comprehensive digital assets with effective, review of the literature private, and secure offsite (SLR) was carried out, storage. The framework examining 26 sources that promises to improve data addressed blockchain-based security, avoid breaches, remedies for problems with and surpass conventional the evidence chain of methods in terms of custody. The findings efficiency and effectiveness showed a dearth of research by utilizing blockchain on using blockchain technology and putting technology to resolve issues rigorous access controls in with the chain of custody place. for physical evidence. The study highlights the necessity of bridging this gap in future research. Chain of custody, highlights the importance of blockchain, smart contracts, evaluating blockchain's tangible evidence, and capabilities through an forensics are some of the archival science terms that are used. perspective. This makes the paper relevant for evaluating blockchain- [8]In his discussion of based recordkeeping blockchain technology's solutions. relationship to legal frameworks, Kamshad Mohsin focuses on how it affects international laws, contracts, intellectual III. property, and the security of OBJECTIVES OF personal data. It explains PROJECT the contradiction between laws that permit and restrict blockchain technology and To improve the examines the advantages management, security, and and disadvantages of it. It accessibility of legal emphasizes the necessity of records, a project to build integrating technology with an eVault for them using changing legal blockchain technology is requirements across the aiming to make use of globe and acknowledges the blockchain technology. A burgeoning topic of project of this kind can blockchain law. The have the following main document urges compliance goals: with various data To ensure that legal records regulations worldwide and are as secure and discusses the impact of unchangeable as possible, it blockchain technology on is almost hard to change or distributed ledger tamper with them once they technology. Regulatory are saved. Legal documents sandboxes and their are kept more authentic as a function in promoting result. blockchain innovation are also covered. Trust and Transparency: Create an auditable, [9]Victoria Lemieux transparent record-keeping presents a new approach, system that instills based on archive science confidence in legal experts, concepts, for evaluating clients, and authorities, how blockchain and among other stakeholders. distributed ledger Efficiency and technologies might provide Accessibility: Create rapid, reliable and unchangeable secure access to records recordkeeping. Interest in from any location, cut down blockchain is growing on administrative burden, worldwide, particularly in and simplify legal areas such as property procedures to enhance the transfers and medical data, efficiency of legal record where its capacity to administration. provide reliable, unchangeable records Decreased Costs: By without depending on a switching to a digital, central authority is blockchain-based system, appealing. In order to fully you may be able to reduce understand use cases that the expenses related to rely significantly on safe manual document handling, and authentic physical record storage, and recordkeeping, the article retrieval. documents related to the Legal Compliance: cases. Nonetheless, in order Maintain adherence to legal to digitize and maintain and regulatory obligations court data, certain courts for privacy, data security, have implemented and record-keeping in order Electronic Case to lower the likelihood of Management Systems fines and legal conflicts. (CMS). Paper-based records are frequently Data Integrity: Ensure that converted into electronic legal records remain intact formats by these systems, throughout time, with a usually as PDF documents. lower chance of destruction In certain areas, legal or deterioration than with records are also stored on records kept on traditional the National Judicial Data paper. Grid (NJDG) platform with Fostering cooperation and an emphasis on case communication between the specifics. Constraints: various parties involved in the legal system—including 1) Restricted Accessibility attorneys, judges, notaries, and Damage Risk: Due to and clients—is important. the physical storage of legal records, authorized Easy-to-use Interface: personnel may find it Make the system accessible difficult to promptly obtain to a broad spectrum of users information. Additionally, by offering an easy-to-use tangible records run the interface that allows legal danger of being lost or practitioners and clients to damaged, which could view, maintain, and compromise the accuracy of contribute to legal records. the legal documents. Compatibility problems: Decreased Fraud: Put When trying to robust authentication and communicate information, cryptography procedures in there may be discrepancies place to lessen the in the CMS software and likelihood of document systems used by various fraud, forgeries, and courts. This lack of disputes. standards may make it more difficult for various judicial Preservation of Legal authorities to work together History: Assure the safe and communicate data in an and trustworthy efficient manner. preservation of past court 3) NJDG Restriction: While decisions and cases for the NJDG platform is in future use as precedent, operation, it may not research, and reference. include all pertinent data, Scalability and lifespan: To particularly evidence, and assure the system's lifespan, instead concentrates on provide a platform that can maintaining case facts. grow to support an Maintaining an extensive increasing number of and centralized repository records and accommodate of legal records is made evolving blockchain more difficult by this technology. restriction. IV. Concerns Regarding the EXISTING SYSTEM Chain of Custody: Under the current system, there is a chance that evidence will A. EXISTING METHOD be tampered with while it is Conventionally, the courts in the chain of custody. where the cases were heard Evidence integrity may be physically store the legal compromised by a lack of a transparent and safe system standardized and for monitoring its handling technologically advanced and transportation. solutions. 5) Conversion to Digital There exist disparities in the quality and completeness of digital data V. due to variations in the PROPOSED SYSTEM process of digitizing legal A. PROBLEM records throughout courts. IDENTIFICATION Ineffectiveness of a centralized digital records system can result from this to create an eVault system lack of consistency. for legal records based on 6) Multiple Signatures: It's blockchain technology that possible that clients will be can be integrated with asked to sign legal current case management documents more than once, and legal database systems which could lead to while guaranteeing security, duplication and mistakes transparency, and during the paperwork accessibility for all parties process. Inefficiencies involved. could arise from this labor- intensive manual process. B. BLOCK DIAGRAM 7) Integration of Dummy image Original Specialized Courts: Some specialized courts are not entirely incorporated into Coming soon the NJDG, including labor tribunals, consumer forums, and family courts. A comprehensive understanding of legal proceedings across various court types can be hampered by the silos that can be created by this lack of integration. 8) Writing Legal Statements by Hand: Writing legal statements by hand takes time and might cause delays in court cases. Clients, attorneys, and This process's automation judges are the end users or and digitization could legal professionals who use greatly increase the system. Courts productivity and lower the presiding over legal possibility of mistakes. matters, attorneys assisting clients in need of legal Limited accessibility, counsel, and other incompatibility, partial individuals or organizations digitization, issues with participating in the legal evidence integrity, and lack system can all be included. of integration for specialized courts are some User Interface: The of the challenges facing the graphical or user-friendly current approach. To interface that the client, improve efficiency, attorney, or judge uses to transparency, and general communicate with the efficacy in the management system is this component. It of legal records, it would be gives customers a platform necessary to address these to enter data, look up constraints by using more information, and carry out different legal-related tasks. C. MODULES
Web Application: The In order to guarantee the
program that runs on a web confidentiality, integrity, server and offers the user and accessibility of legal interface is known as a web data, an eVault system for application. In order to blockchain-based legal carry out different tasks records usually consists of connected to legal services, four essential modules. like document management, case management, and user 1) Client Module: The authentication, it processes client module serves as the user requests, manages user interface between users and authentication, tracking the eVault system, cases, corresponding, and including clients, law firms, more interacts with the and legal experts. It consists application backend API. of web interfaces and software programs that let Application Backend API: users safely upload, access, This section of the system and manage legal records. deals with interfacing with A user's list of available other components and activities includes the processing requests from ability to upload legal the web application. It can documents, search for execute business logic, records, authorize access, retrieve and save data, and and track document interface with the modifications over time. blockchain network to store Encryption and data, among other things. authentication methods may be included in the client module to guarantee that Blockchain Network: The only authorized users may technology behind the view and edit legal records. blockchain is a distributed, decentralized ledger. It 2) Server Module: In serves as a safe and charge of overseeing the impenetrable data storage blockchain network and the solution. Contracts, legal databases of the eVault documents, and other system, the server module sensitive data are stored is either a distributed or there under this centralized server architecture. Because infrastructure. Legal blockchain technology records are redundantly and guarantees data integrity securely stored thanks to its and immutability, it can be handling of data storage, applied in legal contexts replication, and where data security and synchronization amongst authenticity are critical. blockchain nodes. Additional components for managing system resources, responding to user requests, File Storage: This part is an and keeping an eye on the example of a blockchain- system's health and integrated storage system. performance are included in Case files, legal documents, the server module. and other files are kept there for a long time. Files 3) Docker Module: kept on the blockchain are Designed to assist manage easily retrievable and and deploy applications and cryptographically secured. their dependencies in separate containers, Docker is a containerization tool. Within the framework of a case number, is presented legal records eVault for each case. system, the Docker module can fulfill multiple functions:It makes it easier c) Case Details: The judge to scale and manage the can obtain comprehensive system by enabling the details about a particular containerization of different case, including case system components. characteristics and any supporting papers, by 4) Smart Contract Module: selecting that particular Smart contracts are case. The judge can record automatically executing rulings, take notes, and agreements that have the update the status of the case provisions of the contract using the technology. directly encoded into the code. Smart contracts are essential to the automation 2) Attorney: and enforcement of a) Sign in: The attorney regulations pertaining to uses their Special ID to sign record storage and access in in. a legal eVault system. The smart contracts themselves, b) Homepage: The lawyer's which are set up on the cases are shown on their blockchain, make up the homepage. Relevant details, smart contract module. including parties and case These smart contracts lay number, are included in the out the guidelines for list of cases. generating, amending, and c) Upload Functionality: gaining access to legal Attorneys can upload any documents. Rules for required documents straight record validation and access from their homepage, control might also be including any supporting included. By automating documentation or evidence. tasks like confirming the The submission and legitimacy of documents management of documents and managing access rights, linked to cases is made smart contracts promote easier with this openness, security, and functionality. confidence in the system. The blockchain network 3) The Ordinary Citizen and smart contracts are used by users to create, edit, a)The average citizen uses and query legal records. their unique ID to log in.
D. METHODOLOGY b) Homepage: Information
about the citizen's Aadhar Judge number-related cases is shown on the homepage. a) Login: The judge uses Should cases be pending, their unique ID to log in. the system furnishes details including case number, b) Homepage: The judge is status, and pertinent taken to a homepage that updates. lists every case that is currently ongoing in their c) The ability to search for jurisdiction after specific situations is successfully logging in. For provided by an interactive an ordered view, cases are search bar. The public has arranged by the date of the access to court documents upcoming hearing. All of that are available for the pertinent information, reading, can read case facts, including the parties and and can keep track of legal developments. The ability workflow and decision- to actively participate in the making processes by legal system is provided by simultaneously using a this feature. machine learning algorithm built into the search The system starts an function to find pertinent identity management case citations. function when a user signs up, which starts the process VI. of creating a digital identity CONCLUSION for the user. The SHA-3 With an emphasis on algorithm is used to encrypt managing legal procedures the data derived from the and expediting interactions, user's true identity, the project offers a strong guaranteeing the security and secure platform and privacy of the user's designed for legal data. This is a critical step professionals, including in creating a safe and judges, attorneys, and reliable environment. Once clients. The creative the user has successfully incorporation of blockchain authenticated, they are technology for file storage taken to the homepage, enhances the capabilities of which displays a the system by guaranteeing consolidated collection of the immutability and case facts from the user's integrity of important data past and present. Users can and legal documents. This click on the blocks that blockchain-based system represent each of their cases provides a tamper-proof to view more specific storage for legal documents information about them. by guarding against This easily navigable unwanted changes or interface improves manipulation. The web openness and accessibility application's ease of use for people interacting with improves the user the legal system. experience in general by Authorized officials can encouraging effective upload case papers communication and quick immediately through an and easy information upload button, which is an retrieval. The system's added capability. By thoughtfully crafted ensuring that pertinent case backend API enhances the papers are effectively scalability and adaptability integrated into the system, of the platform by enabling this capability lessens the seamless interactions, real- administrative burden that time updates, and attorneys bear. Due to their professional collaboration safe storage on the among legal practitioners. blockchain network, these This all-encompassing documents offer improved approach, which prioritizes data integrity, transparency, data security, openness, and and tamper-proofing. The dependability, represents a homepage features a search promising development for option to make it easier for easing the management of regular persons in need of legal cases and services and legal assistance to access guaranteeing a reliable and the information. The process of finding legal effective workflow for all practitioners can be parties involved in the legal streamlined by allowing business. users to search for lawyers depending on their area and unique scenario. Officers can optimize their VII. RESULTS A. SCREENSHOTS Using blockchain Dummy images Original technology to implement an Coming soon eVault for legal records has many benefits. Records are protected against manipulation and unwanted access by the decentralized, unchangeable ledger of blockchain technology. Blockchain's use of cryptographic algorithms improves security by protecting the privacy of sensitive legal data. All stakeholders have the capacity to confirm the authenticity of records and follow their history thanks to the inherent properties of transparency and traceability. Organizations may increase productivity, cut down on administrative costs, and simplify operations by using smart contracts to automate jobs and digitize record-keeping procedures. Moreover, blockchain-based eVaults make it easier to comply with regulations by providing a safe and auditable record-keeping option. The worldwide reach of blockchain technology facilitates effortless retrieval of legal documents from any location, fostering cooperation and effectiveness amongst geographically separated parties. Even while the advantages seem great, interoperability, data privacy, and regulatory compliance are only a few of the elements that must be carefully taken into account for successful deployment. However, there is a great deal of promise for blockchain-based eVaults to transform legal record keeping, providing a reliable and long-lasting option for businesses looking to update their procedures. and Anonymity in Computation, Communication, and Storage: 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings 11 (pp. 294-303). Springer International Publishing. [4] Ali, S., Wang, G., White, B., & Cottrell, R. L. (2018, August). A REFERENCES blockchain-based In order to improve natural decentralized data language comprehension storage and access and produce conversational framework for material for analysis, the pinger. In 2018 17th author(s) of this work IEEE international employed chatgpt during its conference on trust, preparation. The author(s) security and privacy assumed full responsibility in computing and for the publication's content communications/12t after utilizing this h IEEE international tool/service and reviewed conference on big and edited the content as data science and necessary. engineering (TrustCom/ BigDataSE) (pp. [1] Verma, A., 1303-1308). IEEE. Bhattacharya, P., Saraswat, D., & [5] Malomo, O., Rawat, Tanwar, S. (2021). D., & Garuba, M. NyaYa: Blockchain- (2020). Security based electronic law through block vault record management in a blockchain scheme for judicial enabled federated investigations. cloud framework. Journal of Applied Network Information Security Science, 5(1), 1-18. and Applications, [6] Storer, M. W., 63, 103025. Greenan, K., Long, [2] Lemieux, V. L. D. D., & Miller, E. (2021). Blockchain L. (2008, October). and Recordkeeping. Secure data Computers, 10(11), deduplication. In 135. Proceedings of the 4th ACM [3] Tasnim, M. A., international Omar, A. A., workshop on Rahman, M. S., & Storage security and Bhuiyan, M. Z. A. survivability (pp. (2018). Crab: 110). Blockchain based criminal record [7] Batista, D., management system. Mangeth, A. L., In Security, Privacy, Frajhof, I., Alves, P. H., Nasser, R., Robichez, G., ... & Miranda, F. P. D. (2023). Exploring Blockchain Technology for Chain of Custody Control in Physical Evidence: A Systematic Literature Review. Journal of Risk and Financial Management, 16(8), 360. [8] Mohsin, K. (2021). Blockchain Law: A New Beginning. Available at SSRN 3840220. [9] Lemieux, V., Hofman, D., Batista, D., & Joo, A. (2019). Blockchain technology & recordkeeping. ARMA International Educational Foundation.
Cryptocurrency: A Beginner’s Guide to Cryptocurrency and Blockchain (A Beginner's Guide to Investing and Profiting From Digital Assets in the New Economy)