CustodyBlock: A Distributed Chain of Custody Evidence Framework
Abstract
:1. Introduction
2. Problem Analysis and Motivation
- Easily duplicated or reproduced;
- Integrity of the evidence—altered and modified with new data or the removal of important information to the case;
- Accessibility to evidence—how and by whom is the evidence treated/managed, and what level of access control to be granted;
- Secure storage of evidence;
- Transmitted to someone else or to a different country;
- In some cases, the digital evidence is time-sensitive to the case and pre-arrest situations.
3. Existing Research
4. Research Methodology
- The way things are, i.e., ontological;
- How things interact/work, i.e., epistemological;
- The process in building the conceptual model that fits/understands the real world, i.e., methodological.
- Location of the data when generated;
- Type and format;
- Time elapsed since stored;
- Current control and security measures;
- Last accessibility and by who;
- Last review;
- The owner of data, who is responsible for the data;
- Transfer procedure, etc.
5. CustodyBlock (CB) Framework
- CB Participants—The CB model ensures proper CoC documentation in order to allow the admissibility and validity of the digital evidence. This section of the model involves roles and responsibilities for those entities involved within the system. The following are major participating actors in the CB model;
- Law Enforcement (LE)—This is the major player in the CB model. The LE is a trusted third-party or government entity that is tasked with ensuring proper evidence handling procedures, e.g., collection, preservation, analysis, archiving, etc. The LE entity sets the roles for CB transactions read/write controls and ledger read/write controls. It details the rules needed to be written/coded in smart contracts to automate entity registration and onboarding, e.g., registering DW and DC;
- Digital Witness (DW)—This is the interconnected network of devices, such as laptops, smartphones, and IoTs, such as home appliances and connected vehicles, etc. DW provides collaboration on providing incident-based/sensor-based evidence within their capabilities. The captured evidence puts DC and LE forward for further investigation.
6. Digital Evidence Custody (DEC)
- Secure Transaction—This carries the evidence track records, e.g., submission, archiving, transfer, fetching, etc. Each transaction entails necessary information and a unique identifier. Information details are set as per forensic investigation standards to include data type, timestamp, submitter and receiver IDs, geographical locations, etc. The transaction is then hashed, and once verified by the consensus algorithm, will be stored in the CB DLT and distributed among all active network nodes;
- Smart Contract—Each transaction can be automated using a smart contract. A smart contract is a set of predetermined executable instructions based on the nature of a certain transaction or input. An output can also trigger another smart contract. For example, a case is created, the smart contract logs the submitter ID and associated evidence provided by the analysis phase. Based on the analysis output, the smart contract initiates another instance to request more evidence from the submitter or witnesses. If the submitted evidence is sufficient for the case, then the smart contract proceeds to the analysis and investigation procedures. Additional steps in the investigation process, e.g., evidence transfer and archival, are not presented in this paper;
- Consensus Node—This is a function with a set of rules that is responsible for maintaining, verifying and approving BF records/transactions and updating the ledger. It also ensures trustworthiness when reliability, availability, accuracy, and authenticity are built in by design. The on-chain governance of the CB blockchain is achieved by consensus nodes in not only restricting access to the CB ledger, but also who can perform different actions, e.g., validation of transactions. There are different implementations of consensus algorithms, such as proof of work (PoW), proof of stake (PoS), delegated proof of stake (DPoS), practical byzantine fault tolerance (pBFT), proof of authority (PoA), etc. A private (permissioned) implementation of the CB model is suggested with the use of practical byzantine fault tolerance (pBFT) as a consensus algorithm. The pBFT is considered for the CB model with the assumption that some of the consensus nodes may act faultily or maliciously in the network, hence our taking proactive measures to ensure consistent and valid voting/validation, which is shown in Figure 4. The pBFT does not scale to accommodate other blockchains or larger volume, but to maintain evidence handling, the author believes it should suffice.
- A “request” for evidence handling procedure is received;
- A “pre-prepare” phase to include this shared request in a proposal;
- A “prepare” phase is set for voting/validating and coming to an agreement;
- A “commit” phase allows each consensus node to communicate to each other their results, and the majority agreed-upon value will be committed into the ledger and updated in the whole CB network.
7. Algorithm for the Proposed Methodology
Algorithm 1. Custody Block. |
# (parent_hash, transactions, hash_evidence, smart_contract) def get_parent_hash (block): return block [0] def get_transactions (block): return block [1] def get_hash_evidence (block): return block [15] # function to create a block in a blockchain “ver”:1, “vin_sz”:1, “vout_sz”:2, “lock_time”:”Unavailable”, hash_evidence=hash ((transactions, parent_hash)) return (parent_hash, transactions, hash_evidence) # function to create the genesis block def create_genesis_block (transactions): return create_block (transactions, 0) Smart_Contract = create_genesis_block (“Create Evidence”) # function to create the smart contract block block1 = create_block (“Smart Contract”, genesis_block_hash) # function to create the smart contract genesis_block_hash = get_hash_evidence (smart_contract) print “smart contract hash:”, smart_contract_hash |
8. Discussion
- Completeness— knowing a spectator and the authenticity of a statement, the prover can convince the verifier;
- Soundness—a malicious prover cannot persuade the verifier in the situation that the assertion is bogus;
- Zero-information—the verifier asserts nothing aside from that the assertion is valid.
9. Conclusions and Future Work
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Adam, I.Y.; Varol, C. Intelligence in Digital Forensics Process. In Proceedings of the 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, 1–2 June 2020; pp. 1–6. [Google Scholar]
- Giova, G. Improving chain of custody in forensic investigation of electronic digital systems. Int. J. Comput. Sci. Netw. Secur. 2011, 11, 1. Available online: https://b2n.ir/368575 (accessed on 18 February 2021).
- Bali, J.; Garg, R.; Bali, R.T. Artificial intelligence (AI) in healthcare and biomedical research: Why a strong computational/AI bioethics framework is required? Indian J. Ophthalmol. 2019, 67, 3–6. [Google Scholar] [CrossRef]
- Sabir, B.E.; Youssfi, M.; Bouattane, O.; Allali, H. Towards a new model to secure IoT-based smart home mobile agents using blockchain technology. Engineering. Technol. Appl. Sci. Res. 2020, 10, 5441–5447. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Zhang, Y.; Wen, J. The IoT electric business model: Using blockchain technology for the internet of things. Peer Peer Netw. Appl. 2017, 10, 983–994. [Google Scholar] [CrossRef]
- Ramezan, G.; Leung, C. A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel. Commun. Mob. Comput. 2018, 2018, 4029591. [Google Scholar] [CrossRef]
- Bozic, N.; Pujolle, G.; Secci, S. A tutorial on blockchain and applications to secure network control-planes. In Proceedings of the 2016 3rd Smart Cloud Networks & Systems (SCNS), Dubai, UAE, 19–21 December 2016; pp. 1–8. [Google Scholar]
- Pavithran, D.; Shaalan, K.; Al-Karaki, J.N.; Gawanmeh, A. Towards building a blockchain framework for IoT. Clust. Comput. 2020, 23, 2089–2103. [Google Scholar] [CrossRef]
- Yang, W.; Aghasian, E.; Garg, S.; Herbert, D.; Disiuta, L.; Kang, B. A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future. IEEE Access 2019, 7, 75845–75872. [Google Scholar] [CrossRef]
- Mamdouh, M.; Awad, A.I.; Hamed, H.F.; Khalaf, A.A. Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision. In Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020), Cairo, Egypt, 8–9 April 2020; Springer: Cham, Switzerland, 2020; pp. 721–730. [Google Scholar]
- Ernest, B.; Shiguang, J. Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment. IEEE Access 2020, 8, 25863–25876. [Google Scholar] [CrossRef]
- Kim, H.; Kim, S.H.; Hwang, J.Y.; Seo, C. Efficient privacy-preserving machine learning for blockchain network. IEEE Access 2019, 7, 136481–136495. [Google Scholar] [CrossRef]
- Liu, W.; Wang, X.; Peng, W. Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things. IEEE Access 2019, 8, 8754–8767. [Google Scholar] [CrossRef]
- Alfandi, O.; Otoum, S.; Jararweh, Y. Blockchain solution for iot-based critical infrastructures: Byzantine fault tolerance. In Proceedings of the NOMS 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–4. [Google Scholar]
- Khan, Z.F.; Alotaibi, S.R. Applications of artificial intelligence and big data analytics in m-health: A healthcare system perspective. J. Healthc. Eng. 2020, 2020, 8894694. [Google Scholar] [CrossRef] [PubMed]
- Jabareen, Y. Building a conceptual framework: Philosophy, definitions, and procedure. Int. J. Qual. Methods 2009, 8, 49–62. [Google Scholar] [CrossRef]
- Singh, K.S.; Irfan, A.; Dayal, N. Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), GLA University, Mathura, India, 21–22 November 2019; pp. 584–590. [Google Scholar]
- Sun, X.; Zou, J.; Li, L.; Luo, M. A blockchain-based online language learning system. Telecommun. Syst. 2020, 1–12. [Google Scholar] [CrossRef]
- Tiwari, V.; Keskar, A.; Shivaprakash, N.C. Design of an IoT enabled local network based home monitoring system with a priority scheme. Engineering Technol. Appl. Sci. Res. 2016, 7, 1464–1472. [Google Scholar] [CrossRef]
- Reedy, P. Interpol review of digital evidence 2016-2019. Forensic Sci. Int. Synerg. 2020, 2, 489–520. [Google Scholar] [CrossRef] [PubMed]
- Aziz, B.; Blackwell, C.; Islam, S. A framework for digital forensics and investigations: The goal-driven approach. Int. J. Digit. Crime Forensics 2013, 5, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Mante, R.V.; Khan, R. A Survey on Video-based Evidence Analysis and Digital Forensic. In Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), Surya Engineering College, Kathirampatti, India, 11–13 March 2020; pp. 118–121. [Google Scholar]
- Carrier, B.; Spafford, E.H. An event-based digital forensic investigation framework. In Proceedings of the Digital Forensic Research Conference, Baltimore, MD, USA, 11–13 August 2004; pp. 1–12. [Google Scholar]
- Zhang, N.; Zhong, S.; Tian, L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. J. Comput. Commun. Control 2017, 12, 886–902. [Google Scholar] [CrossRef] [Green Version]
- Hossain, M.M.; Hasan, R.; Zawoad, S. Trust-IoV: A trustworthy forensic investigation framework for the internet of vehicles (IoV). In Proceedings of the IEEE International Congress on Internet of Things, Honolulu, HI, USA, 25–30 June 2017; pp. 25–32. [Google Scholar]
- Hossain, M.M.; Hasan, R.; Zawoad, S. Probe-IoT: A public digital ledger based forensic investigation framework for IoT. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018; pp. 1–2. [Google Scholar]
- Li, W.; Guo, H.; Nejad, M.; Shen, C.C. Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach. IEEE Access 2020, 8, 181733–181743. [Google Scholar] [CrossRef]
- Perdana, A.; Robb, A.; Balachandran, V.; Rohde, F. Distributed ledger technology: Its evolutionary path and the road ahead. Inf. Manag. 2020, 103316. [Google Scholar] [CrossRef]
- Shah, M.S.M.B.; Saleem, S.; Zulqarnain, R. Protecting digital evidence integrity and preserving chain of custody. J. Digit. Forensics Secur. Law 2017, 12, 120–130. [Google Scholar] [CrossRef] [Green Version]
- Cebe, M.; Erdin, E.; Akkaya, K.; Aksu, H.; Uluagac, S. Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 2018, 56, 50–57. [Google Scholar] [CrossRef] [Green Version]
- Horst, L.; Choo, K.K.R.; Le-Khac, N.A. Process memory investigation of the bitcoin client’s electrum and bitcoin core. IEEE Access 2017, 5, 22385–22398. [Google Scholar] [CrossRef]
- Liu, Z.; Seo, H. IoT-NUMS: Evaluating NUMS elliptic curve cryptography for IoT platforms. IEEE Trans. Inf. Forensics Secur. 2018, 14, 720–729. [Google Scholar] [CrossRef]
- Ritzdorf, H.; Soriente, C.; Karame, G.O.; Marinovic, S.; Gruber, D.; Capkun, S. Toward shared ownership in the cloud. IEEE Trans. Inf. Forensics Secur. 2018, 13, 3019–3034. [Google Scholar] [CrossRef]
- Tziakouris, G. Cryptocurrencies—A forensic challenge or opportunity for law enforcement? An interpol perspective. IEEE Secur. Priv. 2018, 16, 92–94. [Google Scholar] [CrossRef]
- Wu, S.; Chen, Y.; Wang, Q.; Li, M.; Wang, C.; Luo, X. CReam: A smart contract enabled collusion-resistant e-auction. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1687–1701. [Google Scholar] [CrossRef]
- Zhang, Y.; Wu, S.; Jin, B.; Du, J. A blockchain-based process provenance for cloud forensics. In Proceedings of the 3rd IEEE International Conference on Computer and Communications, Chengdu, China, 13–16 December 2017; pp. 2470–2473. [Google Scholar]
- Al-Nemrat, A. Identity theft on e-government/e-governance and digital forensics. In Proceedings of the International Symposium on Programming and Systems, Algiers, Algeria, 24–26 April 2018. [Google Scholar]
- Ulybyshev, D.; Villarreal-Vasquez, M.; Bhargava, B.; Mani, G.; Seaberg, S.; Conoval, P.; Kobes, J. (WIP) Blockhub: Blockchain-based software development system for untrusted environments. In Proceedings of the IEEE 11th International Conference on Cloud Computing, San Francisco, CA, USA, 2–7 July 2018; pp. 582–585. [Google Scholar]
- Hossain, M.; Karim, Y.; Hasan, R. FIF-IoT: A forensic investigation framework for IoT using a public digital ledger. In Proceedings of the IEEE International Congress on Internet of Things, San Francisco, CA, USA, 2–7 July 2018; pp. 33–40. [Google Scholar]
- Lone, A.H.; Mir, R.N. Forensic-chain: Ethereum blockchain-based digital forensics chain of custody. Sci. Pract. Cyber Secur. J. 2018, 1, 21–27. [Google Scholar]
- Caviglione, L.; Wendzel, S.; Mazurczyk, W. The future of digital forensics: Challenges and the road ahead. IEEE Secur. Priv. 2017, 15, 12–17. [Google Scholar] [CrossRef]
- Cosic, J.; Baca, M. A Framework to (Im) Prove “Chain of Custody” in Digital Investigation Process. In Proceedings of the 21st Central European Conference on Information and Intelligent Systems, Varaždin, Croatia, 22–24 September 2010; pp. 435–438. [Google Scholar]
- Zhang, X.; Choo, K.K.R.; Beebe, N.L. How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform. IEEE Internet Things J. 2019, 6, 6850–6861. [Google Scholar] [CrossRef]
- Tang, H.; Sun, Y.; Ouyang, J. Excellent Practical Byzantine Fault Tolerance. J. Cybersecur. 2020, 2, 167. [Google Scholar]
- Wang, D.; Zhao, J.; Wang, Y. A Survey on Privacy Protection of Blockchain: The Technology and Application. IEEE Access 2020, 8, 108766–108781. [Google Scholar] [CrossRef]
- Raikwar, M.; Gligoroski, D.; Kralevska, K. SoK of used cryptography in blockchain. IEEE Access 2019, 7, 148550–148575. [Google Scholar] [CrossRef]
- Partala, J.; Nguyen, T.H.; Pirttikangas, S. Non-Interactive Zero-Knowledge for Blockchain: A Survey. IEEE Access 2020, 8, 227945–227961. [Google Scholar] [CrossRef]
- Nieto, A.; Roman, R.; Lopez, J. Digital witness: Safeguarding digital evidence by using secure architectures in personal devices. IEEE Netw. 2016, 30, 34–41. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alruwaili, F.F. CustodyBlock: A Distributed Chain of Custody Evidence Framework. Information 2021, 12, 88. https://doi.org/10.3390/info12020088
Alruwaili FF. CustodyBlock: A Distributed Chain of Custody Evidence Framework. Information. 2021; 12(2):88. https://doi.org/10.3390/info12020088
Chicago/Turabian StyleAlruwaili, Fahad F. 2021. "CustodyBlock: A Distributed Chain of Custody Evidence Framework" Information 12, no. 2: 88. https://doi.org/10.3390/info12020088
APA StyleAlruwaili, F. F. (2021). CustodyBlock: A Distributed Chain of Custody Evidence Framework. Information, 12(2), 88. https://doi.org/10.3390/info12020088