Have a personal or library account? Click to login
Multiparty trust levels in evidence management: Ensuring tamper-proof chain of custody in blockchain. Cover

Multiparty trust levels in evidence management: Ensuring tamper-proof chain of custody in blockchain.

Open Access
|Feb 2025

References

  1. Mosweu, O. and Mosweu, T. (2023). ‘The influence of archives in conflict resolution: A case study of Botswana and Namibia’. Afr. J. Libr. Arch. Inf. Sci., 33: 1, 23–36.
  2. Houge, A.B. (2023).’ Imageries of self: Guilty plea statements in sexual violence cases at the ICTY’. Int. Crim. Justice Rev., 33: 2, 179–196. 10.1177/1057567720982656.
  3. Cogan, J.K. (2000). ‘The problem of obtaining evidence for International Criminal Courts’. Hum. Rights Q., 22: 2, 404–427. 10.1353/hrq.2000.0021.
  4. (2011). Rome Statute of the International Criminal Court, The Netherlands: International Criminal Court. https://www.icccpi.int/sites/default/files/RSEng.pdf [Accessed 9 June 2023].
  5. (2013). Rules of Procedure and Evidence, Second. The Netherlands: International Criminal Court. https://www.icccpi.int/sites/default/files/RulesProcedureEvidenceEng.pdf [Accessed 9 June 2023].
  6. International Criminal Court. About the Court. https://www.icccpi.int/about/the-court [Accessed 10 September 2023].
  7. ‘Understanding the ICC’, in Public Information and Outreach Section. The Netherlands: The Hague. https://www.icc-cpi.int/sites/default/files/Publications/understanding-the-icc.pdf [Accessed 10 September 2023].
  8. Ulbricht, B.R, Moxley, C., Austin, M.D. and Norburg, M.D. (2022). ‘Digital eyewitnesses: Using new technologies to authenticate evidence in human rights litigation’. Stanford Law Review, vol. 74, pp. 851889, 2022. [Online]. Available: https://review.law.stanford.edu/wpcontent/uploads/sites/3/2022/04/Ulbricht-et-al.-74-Stan.-L.-Rev.-851.pdf
  9. Bernstein, P.A. and Goodman, N. (1981). ‘Concurrency control in distributed database systems’, ACM Comput. Surv. CSUR, 13: 2, 185–221. 10.1145/356842.356846.
  10. Nakamoto, S. ‘Bitcoin: A peertopeer electronic cash system’. https://bitcoin.org/bitcoin.pdf [Accessed 9 June 2023].
  11. Ali, V., Norman, A.A., and Azzuhri, S.R.B. (2023). ‘Characteristics of blockchain and its relationship with trust’. IEEE Access, 11, 15364–15374. 10.1109/ACCESS.2023.3243700.
  12. Meunier, S. (2018). ‘Blockchain 101: What is blockchain and how does this revolutionary technology work?. What is blockchain and how does this revolutionary technology work?’, in Transforming Climate Finance and Green Investment with Blockchains, pp. 23–34. 10.1016/B978-0-12-814447-3.00003-3.
  13. Peffers, K., Tuunanen, T., Rothenberger, M.A., and Chatterjee, S. (2007). ‘A design science research methodology for information systems research’. J. Manag. Inf. Syst., 24: 3, 45–77. 10.2753/MIS0742-1222240302.
  14. Hevner, A.R., March, S.T., Park, J. and Ram, S. (2004). ‘Design science in information systems research’. MIS Q., 28: 1, 75–105. 10.2307/25148625.
  15. Prat, N., ComynWattiau, I. and Akoka, J. (2014). ‘Artifact evaluation in information systems designscience research - A holistic view’. PACIS 2014 Proc. https://aisel.aisnet.org/pacis2014/23
  16. Joshi, A., Kale, S., Chandel, S., and Pal, D. (2015). ‘Likert scale: Explored and explained’. Br. J. Appl. Sci. Technol., 7, 396–403, 10.9734/BJAST/2015/14975.
  17. Page, M.J. et al. (2021). ‘The PRISMA 2020 statement: An updated guideline for reporting systematic reviews’, BMJ, n71. 10.1136/bmj.n71.
  18. Kim, W.C. and Mauborgne, R. (2004) ‘Blue Ocean Strategy’. Harvard Business Review. https://hbr. org/2004/10/blueoceanstrategy [Accessed 15 June 2023].
  19. Awladthani, F.S., Porkodi, S., Saranya, R. and Pandurengan, V. (2023). ‘A systemic literature review of the adoption of Blue Ocean Strategy by small and medium enterprises for sustainable growth’. J. Sustain. Sci. Manag., 18: 2, 197–230. 10.46754/jssm.2023.02.014.
  20. Jindal, P. and Chavan, L. (2023). ‘Role of blockchain technology in creating blue ocean strategy for banking products and services’, in Contemporary Studies of Risks in Emerging Technology: Part B, pp. 169–182. 10.1108/978-1-80455-566-820231008.
  21. Nasereddin, A.Y. (2023). ‘Impact of the Blue Ocean Strategy dimensions in achieving competitive advantage from the perspective of faculty members’. Inf. Sci. Lett., 12: 6, 2685–2698. 10.18576/isl/120639.
  22. Kim, C., Yang, K.H. and Kim, J. (2008). ‘A strategy for thirdparty logistics systems: A case analysis using the blue ocean strategy’. Omega, 36: 4, 522–534. 10.1016/j.omega.2006.11.011.
  23. Ehrenberg, A.J. and King, J.L. (2020). ‘Blockchain in context’. Inf. Syst. Front., 22: 1, 29–35. 10.1007/s10796-019-09946-6.
  24. Olukoya, O. (2021). ‘Distilling blockchain requirements for digital investigation platforms’. J. Inf. Secur. Appl., 62. 10.1016/j.jisa.2021.102969.
  25. Khan, A.A., Uddin,M., Shaikh, A.A., Laghari, A.A. and Rajput, A.E. (2021). ‘MFLedger: Blockchain hyperledger sawtoothenabled novel and secure multimedia chain of custody forensic investigation architecture’. IEEE Access, 9, 103637–103650. 10.1109/ACCESS.2021.3099037.
  26. JaquetChiffelle, D., Casey, E., and Bourquenoud, J. (2020). ‘Tamperproof timestamped provenance ledger using blockchain technology’. FORENSIC Sci. Int.-Digit. Investig., 33. 10.1016/j.fsidi.2020.300977.
  27. Liu, G., He. J and Xuan. X (2021). ‘A data preservation method based on Blockchain and multidimensional hash for digital forensics’. Complexity, 2021. 10.1155/2021/5536326.
  28. Ali, M., Ismail, A., Elgohary, H., Darwish, S. and Mesbah, S. (2022). ‘A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain’. Symmetry, 14: 2. 10.3390/sym14020334.
  29. Sathyaprakasan, R., Govindan, P., Alvi, S., Sadath, L., Philip, S. and Singh, N. (2021). ‘An implementation of blockchain technology in forensic evidence management’, in V. Naranje, B. Singh and S. Velan (eds), Proc. IEEE Int. Conf. Comput. Intell. Knowl. Econ., ICCIKE, Institute of Electrical and Electronics Engineers Inc., pp. 208–212. 10.1109/ICCIKE51210.2021.9410791.
  30. Burri, X., Casey, E., Bollé, T. and Jaquet-Chiffelle, D.O. (2020). ‘Chronological independently verifiable electronic chain of custody ledger using blockchain technology’. Forensic Sci. Int. Digit. Investig., 33. 10.1016/j.fsidi.2020.300976.
  31. Alruwaili, F.E. (2021). ‘CustodyBlock: A distributed chain of custody evidence framework’. Information, 12: 2, 88. 10.3390/info12020088.
  32. Kusuma, R.S. (2023). ‘Digital evidence security system design using blockchain technology’. Int. J. Saf. Secur. Eng., 13: 1, 159–165. 10.18280/ijsse.130118.
  33. Gopalan, S.H., Suba, S.A., Ashmithashree, C., Gayathri, A. and Jebin Andrews, V. (2019). ‘Digital forensics using blockchain’. Int. J. Recent Technol. Eng., 8: 2 Special Issue 11, 182–184.10.35940/ijrte. B1030.0982S1119.
  34. Zhang, Y. Wu, S., Jin, B. and Du, J. (2018) ‘A blockchainbased process provenance for cloud forensics’, in IEEE Int. Conf. Comput. Commun., ICCC, Institute of Electrical and Electronics Engineers Inc., pp. 2470– 2473. 10.1109/CompComm.2017.8322979.
  35. Manjre, B.M. and Goyal, K.K. (2023). ‘A novel and custom blockchain approach for the integrity assurance of the digital evidences extracted during the extraction and decoding of mobile artifacts from the mobile forensic tools’, in AIP Conf. Proc., American Institute of Physics Inc. 10.1063/5.0127910.
  36. Bonomi, S., Casini, M., and Ciccotelli, C. (2020). ‘BCoC: A blockchain-based chain of custody for evidences management in digital forensics’, in V. Danos., M. Herlihy, M. PotopButucaru, J. Prat, and S. Tucci-Piergiovanni (eds), OpenAccess Ser. Informatics, Schloss Dagstuhl-LeibnizZentrum fur Informatik GmbH, Dagstuhl Publishing. 10.4230/OASIcs.Tokenomics.2019.12.
  37. Yan, W., Shen, J., Cao, Z. and Dong, X. (2020). ‘Blockchain based digital evidence chain of custody’, in Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, in ICBCT’20, New York, NY, USA: Association for Computing Machinery, pp. 19–23. 10.1145/3390566.3391690.
  38. Ahmad, L., Khanji, S., Iqbal, F. and Kamoun, F. (2020). ‘Blockchainbased chain of custody: Towards real-time tamper-proof evidence management’, in ACM Int. Conf. Proc. Ser., Association for Computing Machinery. doi: 10.1145/3407023.3409199.
  39. Chopade, M., Khan, S., Shaikh, U. and Pawar, R. (2019). ‘Digital forensics: Maintaining chain of custody using blockchain’, in Proc. Int. Conf. ISMAC IoT Soc., Mob., Anal. Cloud, ISMAC, Institute of Electrical and Electronics Engineers Inc., pp. 744–747. 10.1109/ISMAC47947.2019.9032693.
  40. Lone, A.H. and Mir, R.N. (2019). ‘Forensicchain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer’. Digit. Investig., 28, 44–55. 10.1016/j.diin.2019.01.002.
  41. Santamaria, P., Tobarra, L., Pastor-Vargas, R. and Robles-Gomez, A. ‘Smart contracts for managing the chain-of-custody of digital evidence: A practical case of study’. SMART CITIES, 6: 2, 709–727. 10.3390/smartcities6020034.
  42. AwusonDavid, K., AlHadhrami, T., Alazab, M., Shah, N. and Shalaginov, A. (2021). ‘BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem’. Future Gener. Comput. Syst., 122, 1–13. 10.1016/j.future.2021.03.001.
  43. AlKhateeb, H., Epiphaniou, G. and Daly, H. (2019). ‘Blockchain for modern digital forensics: The chain-of-custody as a distributed ledger’ in Adv. Sci. Tech. Sec. Appl., Springer, pp. 149–168. doi: 10.1007/9783030112899_7.
  44. Li, M., Lal, C., Conti, M. and Hu, D. (2022). ‘LEChain: A blockchainbased lawful evidence management scheme for digital forensic’, Future Gener. Comput. Syst.-Int. J. Escience, 115, 406–420.10.1016/j.future.2020.09.038.
  45. Shahaab, A., Hewage, C. and Khan, I. (2021). ‘Preventing spoliation of evidence with blockchain: A Perspective from South Asia’, in 2021 The 3rd International Conference on Blockchain Technology, in ICBCT ‘21, New York, NY, USA: Association for Computing Machinery, pp. 45–52. 10.1145/3460537.3460550.
  46. Tsai, F.-C.-(2021). ‘The application of blockchain of custody in criminal investigation process’, in J. Watrobski, W. Salabun, C. Toro, C. Zanni-Merk, R.J. Howlett and L.C. Jain, (eds), Knowledge-Based and Intelligent Information & Engineering Systems (kse 2021), Amsterdam, The Netherlands: Elsevier Science Bv, pp. 2779–2788. 10.1016/j.procs.2021.09.048.
  47. Sanda, P., Pawar, D. and Radha, V. (2022). ‘Blockchain-based tamper-proof and transparent investigation model for cloud VMs’. J. Supercomput., 78: 16, 17891–17919. 10.1007/s11227-022-04567-4.
  48. Akello, P., Vemprala, N., Lang Beebe, N. and Raymond Choo, K.K. (2023). ‘Blockchain use case in ballistics and crime gun tracing and intelligence: Toward overcoming gun violence’. ACM Trans. Manag. Inf. Syst., 14: 1, 7:1–7:26. 10.1145/3571290.
  49. Martin, T. and Hammoudeh, M. (2022).’“Data preservation system using BoCA: Block-chain-of-custody application’, in The 5th International Conference on Future Networks & Distributed Systems, in ICFNDS 2021, New York, NY, USA: Association for Computing Machinery, pp. 70–77. 10.1145/3508072.3508084.
DOI: https://doi.org/10.2478/ias-2024-0007 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 80 - 103
Published on: Feb 20, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Nuno Santos, Joel Curado, Joao C. Ferreira, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.