Digital Investigation Forensic Model with P2P Timestamp Blockchain for Monitoring and Analysis
Main Article Content
Abstract
Forensic analysis of Blockchain data is a new field in police work. It's now one of the largest problems facing law enforcement. The paper discussed the worldwide need for digital forensics in law enforcement and Blockchain forensics to counteract crimes committed using Blockchain technology. It's been said that we've entered a new age of technology that's heavily dependent on the principles of Blockchain. The research produced a set of guidelines for Digital Investigators. on addition, a theoretical framework grounded on the concept of regular activity has been developed, and a legislative framework has been proposed to ensure that its illegal purpose will always be punished severely.
Article Details
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
References
X. Xu, Q. Huang, H. Zhu et al., “Secure service offloading for internet of Vehicles in SDN-enabled mobile edge computing,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3720–3729, 2021.
X. Liang and Y. Kim, “A Survey on Security Attacks and Solutions in the IoT Network,” in Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference, (CCWC), pp. 0853–0859, NV, USA, June 2021.
W. Zhou, “Reviewing IoT security via logic bugs in IoT platforms and systems,” IEEE Internet of 1ings Journal, vol. 8, 2021.
N. Miloslavskaya and A. Tolstoy, “Internet of ,ings: information security challenges and solutions,” Cluster Computing, vol. 22, no. 1, pp. 103–119, 2019.
E. Al-Masri, Y. Bai, and J. Li, “A Fog-Based Digital Forensics Investigation Framework for IoT Systems,” in Proceedings of the 2018 IEEE International Conference on Smart Cloud (SmartCloud), pp. 196–201, New York, NY, USA, September 2018.
V. R. Silvarajoo, S. Yun Lim, and P. Daud, “Digital evidence case management tool for collaborative digital forensics investigation,” in Proceedings of the 2021 Digital Evidence Case Management Tool for Collaborative Digital Forensics Investigation, pp. 1–4, CRC, Langkawi Island, Malaysia, January 2021.
M. Elhoseny, M. M. Selim, and K. Shankar, “Optimal deep learning based convolution neural network for digitaforensics face sketch synthesis in internet of things (IoT),” International Journal of Machine Learning and Cybernetics, vol. 12, no. 11, pp. 3249–3260, 2020.
Z. Su, H. Wang, H. Wang, and X. Shi, “A Financial Data Security Sharing Solution Based on Blockchain Technology and Proxy Re-encryption Technology,” in Proceedings of the 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), pp. 462–465, Chongqing City, China, November 2020.
D. Sathya, S. Nithyaroopa, D. Jagadeesan, and I. J. Jacob, “Block-chain technology for food supply chains,” in Proceedings of the 2021 1ird International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 212–219, Tirunelveli, India, February 2021.
K. O.-B. O. Agyekum, Q. Xia, E. B. Sifah, C. N. A. Cobblah, H. Xia, and J. Gao, “A proxy Re-encryption approach to secure data sharing in the internet of things based on blockchain,” IEEE Systems Journal, vol. 16, no. 1, pp. 1685–1696, 2022.
G. Kumar, R. Saha, C. Lal, and M. Conti, “Internet-of-Forensic (IoF): a blockchain based digital forensics framework for IoT applications,” Future Generation Computer Systems, vol. 120, no. 120, pp. 13–25, 2021.
M. Li, C. Lal, M. Conti, and D. Hu, “LEChain: a blockchainbased lawful evidence management scheme for digital forensics,” Future Generation Computer Systems, vol. 115, no. 6, pp. 406–420, 2021.
X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, 2020.
G. Liang, J. Xin, Q. Wang, X. Ni, and X. Guo, “A BlockchainBased Internet of ,ings Forensics Model,” in Advances in Artificial Intelligence and Security, pp. 687–696, Springer, New York, NY, USA, 2021.
E. Oriwoh, D. Jazani, G. Epiphaniou, and P. Sant, “Internet of things forensics: challenges and approaches,” in Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615, Austin, TX, USA, June 2013.
S. Zawoad and R. Hasan, “FAIoT: towards building a forensics aware eco system for the internet of things,” in Proceedings of the 2015 IEEE International Conference on Services Computing, pp. 279–284, New York City, NY, USA, June 2015.
A. Nieto, R. Roman, and J. Lopez, “Digital witness: safeguarding digital evidence by using secure architectures in personal devices,” IEEE Network, vol. 30, no. 6, pp. 34–41, 2016.
Iso, “Information technology - Security techniques - Privacy framework,” 2020, https://www.iso.org/standard/73722.html.
A. Nieto, R. Rios, and J. Lopez, “A methodology for privacyawareIoT-forensics,” in Proceedings of the 16th IEEE International Conference on Trust, Security And Privacy in Computing and Communications, pp. 626–633, Sydney, NSW, Australia, October, 2017.
M. Banday, “Enhancing the security of IOT in forensics,” in Proceedings of the International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, October 2017.
T. Zia, P. Liu, and W. Han, “Application-specific digital forensics investigative model in internet of things (IoT),” in Proceedings of the 12th International Conference on Availability, Reliability and Security, New York; NY, USA, September 2017.
C. Meffert, D. Clark, I. Baggili, and F. Breitinger, “Forensic state acquisition from internet of things (FSAIoT),” in Proceedings of the 12th International Conference on Availability, Reliability and Security, ACM ,Calabria, Italy, August 2017.
M. Chernyshev, S. Zeadally, Z. Baig, and A. Woodward, “Internet of things forensics: the need, process models, and open issues,” IT Professional, vol. 20, no. 3, pp. 40–49, 2018.
M. Hossain, R. Hasan, and S. Zawoad, “Probe-IoT: a public digital ledger based forensic investigation framework for IoT,” in Proceedings of the IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, Paris, France, June 2018.
F. Bouchaud, G. Grimaud, and T. Vantroys, “IoTforensic,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, IEEE, Hamburg, Germany, August 2018.
D. P. Le, H. Meng, L. Su, S. L. Yeo, and V. ,ing, “BIFF: a blockchain-based IoT forensics framework with identity privacy,” in Proceedings of the TENCON 2018 - 2018 IEEE Region 10 Conference, Jeju, Korea, October 2018.
A. Macdermott, T. Baker, and Q. Shi, “Iot forensics: challenges for the ioa era,” in Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), IEEE, Paris- France, February, 2018.
J. Surbiryala and C. Rong, “Secure customer data over cloud forensic reconstruction,” in Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, January 2018.
F. Servida and E. Casey, “IoT forensic challenges and opportunities for digital traces,” Digital Investigation, vol. 28, pp. S22–S29, 2019.
H. Duan, Y. Zheng, C. Wang, and X. Yuan, “Treasure collection on foggy islands: building secure network archives for internet of things,” IEEE Internet of 1ings Journal, vol. 6, no. 2, pp. 2637–2650, 2019.
S. Li, K.-K. R. Choo, Q. Sun, W. J. Buchanan, and J. Cao, “IoT forensics: Amazon Echo as a use case,” IEEE Internet of 1ings Journal, vol. 6, no. 4, pp. 6487–6497, 2019.
X. Zhang, K. K. R. Choo, and N. L. Beebe, “How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform,” IEEE Internet of 1ings Journal, vol. 6, no. 4, pp. 6850–6861, 2019.
J. Hou, Y. Li, J. Yu, and W. Shi, “A survey on digital forensics in internet of things,” IEEE Internet of 1ings Journal, vol. 7, no. 1, pp. 1–15, 2020.
M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, “A Survey on the Internet of ,ings (IoT) Forensics: Challenges, Approaches and Open Issues,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1191–1221, 2020.