Decentralized Model To Protect Digital Evidence VI
Decentralized Model To Protect Digital Evidence VI
Decentralized Model To Protect Digital Evidence VI
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2022.Doi Number
ABSTRACT Modern legal proceedings heavily rely on digital evidence as a basis for decisions in a variety
of contexts, including criminal investigations and civil lawsuits. However, factors like data alteration,
unauthorised access, or flaws in centralised storage can threaten the security and integrity of digital evidence.
We suggest a decentralised methodology for using smart contracts to safeguard digital evidence in order to
overcome these issues. The decentralised model makes use of smart contracts and blockchain technology to
guarantee the integrity, transparency, and immutability of digital evidence. The approach does not require a
centralised authority because it makes use of a distributed ledger, which lowers the possibility of data loss or
manipulation. Multiple parties participating in the evidence lifecycle can build confidence and accountability
thanks to smart contracts' programmable rules and automated enforcement mechanisms. In our study, we
show the decentralised model's architecture and describe its essential elements, such as the blockchain
network, smart contracts, and decentralised storage. We go over the advantages of employing this
architecture, including enhanced auditability, decreased dependency on centralised institutions, and increased
data security. Additionally, we discuss potential difficulties and constraints, like scalability and
interoperability. We run a few simulations and experiments to test the suggested model's viability and
effectiveness while comparing it to conventional centralised methods. The outcomes show that our
decentralised paradigm offers improved security for digital evidence, guaranteeing its reliability, usability,
and tamper-proofness. We also go through how the model is used in actual legal systems, law enforcement
organisations, and digital forensics investigations.
INDEX TERMS Blockchain technology, Digital forensic, Distributed ledger technology, IPFS.
research goals. We look at how smart contracts, which offer • Discovery of several problems in the judicial domain and
programmable rules and automatic enforcement mechanisms, discussion of the advantages of integrating distributed ledger
facilitate the safeguarding of digital evidence. Our technology in this domain.
methodology provides improved security and dependability • Proposal and implementation of a blockchain-supported
for digital evidence management by integrating smart decentralized access control solution, which can be adapted
contracts with the Polygon blockchain [4-6]. for use with other blockchain frameworks.
We consider the advantages of using our decentralised • Use of proof of stake at the blockchain level and proof of
paradigm in contrast to conventional centralised methods. Our authority at the application level. Only a few pre-selected
model lowers the danger of data modification and nodes have the authority to approve or reject transactions,
unauthorised access by eliminating the reliance on a single, reducing the time required to create blocks compared to the
centralised authority. The integrity of digital evidence is previous approach.
guaranteed by the blockchain's transparency and immutability, The structure of the paper is as follows: Section 2 reviews
making it tamper-proof and verifiable [7]. Additionally, our related work by different authors to gain insights into the
model's decentralised storage infrastructure improves judicial domain. Section 3 elaborates on the problems with the
accessibility and lowers the risk of data loss. traditional judicial approach. Section 4 describes the role of
We outline the benefits of our decentralised model while also blockchain technology. The proposed model and its workflow
acknowledging its drawbacks [8]. In blockchain-based are presented in Section 5, while Section 6 showcases the
systems, scalability and interoperability are crucial factors. implementation of the proposed model. The advantages of the
We explore these issues and suggest solutions to effectively proposed model are discussed in Section 7. Section 8 explores
overcome them, assuring the applicability and usability of our the research implications, and finally, the article concludes in
model in actual situations. To evaluate the feasibility and Section 9.
effectiveness of our proposed decentralized model, we
conduct experiments and simulations, focusing on the II. RELATED STUDY
integration of smart contracts with the Polygon blockchain [9-
10]. We compare the performance and security of our model Digital data analysis for forensics and digital investigations is
with traditional centralized approaches, analysing metrics in high demand as society becomes increasingly dependent on
such as data integrity, accessibility, and system robustness. digital technologies. The rapid adoption and widespread use
The results of our experiments demonstrate the superiority of of digital technologies have led to an increase in cybercrimes.
our decentralized model in protecting digital evidence and Consequently, the utilization of digital forensics systems has
validate its potential applicability in legal systems, law become necessary to collect, analyse, and present evidence
enforcement agencies, and digital forensics investigations. while ensuring its admissibility in court. The ability of
Fig. 1 shows the conventional evidence collection and distributed ledger technology to prevent tampering has led to
management process. its application in other fields where data integrity must be
preserved.
FIGURE 1. Conventional evidence collection and management process This article presents a paradigm that enables the assessment of
A. Problem Statement the credibility of digital evidence based on information. The
All the traditional approaches were centralized in nature, digital evidence is stored on a blockchain, which is accessible
which typically encounter issues such as single points of to authorized individuals. The reliability and applicability of
failure and lack of confidence. Centralized methods are not the digital evidence are evaluated by the relevant parties
suitable for collaborative settings as trust issues often emerge. involved. Additionally, a data structure called the Global
Therefore, a decentralized strategy is required to operate in a Digital Timeline has been developed to record the
collaborative environment. The absence of a mediator in this chronological sequence of activities throughout the lifecycle
decentralized approach resolves the trust problem and reduces of the evidence. The model primarily focuses on ensuring the
costs. Consequently, a decentralized model is proposed to traceability and non-repudiation of the evidence [11].
ensure security and trust in the judicial process. This article describes a novel framework that integrates
B. Motivation and Contributions Software-Defined Networking (SDN) and the Internet of
This paper discusses how blockchain technology can improve Things (IoT) to support the forensic domain. The proposed
privacy and security in the judicial domain. In this domain, framework was evaluated using a network simulator. In this
distributed ledger technology can help maintain the security, framework, the gateway forwards packets from each IoT
integrity, and authenticity of evidence, which plays a crucial device to switches. Once the device signatures are verified, the
role in judicial proceedings. Therefore, handling evidence packets reaching the control plane are classified. The SDN
with extra care is essential. This article investigates the controller utilizes blockchain to validate data packet
potential applications of distributed ledger technology in the signatures prior to classification. These packets contain
judicial domain and presents the following contributions: information such as the user's name, source and destination IP
addresses, local time of the evidence occurrence, location of
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
occurrence, and the corresponding action taken. Forensics Researchers have developed a method for IoT forensics that
investigators with proper authorization can access the data aims to protect the confidentiality of personal information
stored in the SDN controllers. The hexadecimal hash value of provided by individuals. The discussed strategy has been
the evidence is stored to maintain a high level of dependability implemented using the PRoFIT methodology. The research
in the chain of custody (CoC) and to preserve the confidence focused on a paradigm for collecting digital evidence in IoT
and integrity of the evidence [12]. environments. This strategy has been tested in multiple
Author proposed the utilization of LedgerDB on Alibaba settings with varying privacy requirements, and the
Cloud as an alternative to decentralized architectures, where assessment has demonstrated that the proposed methodology
they were not strictly necessary. In such cases, system successfully balances the ideals of IoT-based research and
performance can be limited, leading to low throughput, high secrecy [17].
latency, and significant storage overhead. LedgerDB is a This paper introduces a novel approach for secure and tamper-
centralized ledger database designed to provide features proof storage of Electronic Health Records (EHRs) in a cloud
similar to blockchain, such as tamper-evidence and non- environment using blockchain technology. The proposed
repudiation, while offering enhanced performance. It ensured strategy ensures the infeasibility of tampering with outsourced
strong auditability through the implementation of a TSA two- EHRs within distributed IPFS nodes. Additionally, it
way peg protocol, which effectively prevents malicious guarantees the computational unforgeability of the stored
behavior from both users and service providers. Additionally, EHRs. The model addresses the risk of collusion between
LedgerDB supports the removal of verifiable data, which was malicious doctors and the Cloud Service Provider (CSP) to
often required in real-world applications to eliminate outdated manipulate the outsourced EHRs. Implementation of the
records for storage efficiency or to hide certain records for model leverages the Ethereum blockchain, integrating the
regulatory compliance, all while maintaining its verifiability. generated EHRs into transactions for enhanced integrity. By
Through experimental evaluation, they have found that following the computational intractability of Ethereum, the
LedgerDB exhibits a throughput that is 80 times higher than model preserves the timeliness of the outsourced EHRs,
state-of-the-art permissioned blockchains like Hyperledger allowing for efficient extraction of their generation time.
Fabric. As a result, many customers utilizing blockchain Security analysis demonstrates the model's resilience against
applications, such as IP protection and supply chain, on various attacks on distributed IPFS nodes at the CSP. A
Alibaba Cloud have transitioned to LedgerDB due to its comprehensive numerical evaluation and comparison of
advantages in terms of high throughput, low latency, strong experimental results validate the practicality and effectiveness
auditability, and user-friendly interface [13]. of the proposed model, particularly in terms of computation
Different methods and techniques are required to maintain the and communication overhead [18].
integrity of evidence during the investigation process. To The researchers examined various information formats, types
acquire digital evidence and address security concerns in the of forensic evidence, and other complexities in the IoT
context of smart homes, a management system was designed. ecosystem. Their primary goal was to gather data and artifacts
This system offered intelligence, automated discovery, and from different IoT network-connected devices. After
innovative information recording capabilities [14]. collecting the artifacts and data, the researchers analysed the
The authors examined the importance of video evidence in interrelation of the evidence before entering it into a
investigations. However, tampering with video evidence blockchain-based forensic model [19].
posed a significant challenge. The authors suggested a The problems that can occur while using a centralised network
blockchain-based integrity verification mechanism. In this for transferring or storing patient medical data have been
paradigm, a video integrity code was generated using a hash- studied by researchers. They have noted a number of issues,
based mechanism. If any of the video segments are tampered such as a lack of historical data, erroneous access, and
with, this integrity code would be altered. By comparing the confidentiality issues. The authors have created a paradigm
two video integrity codes, manipulation can be quickly that blends blockchain technology with encryption to address
identified. Comparative investigations have demonstrated that these problems. According to this paradigm, all data is
the proposed model performs better for the security of video accessible only with the consent of the parties concerned and
evidence [15]. all information is provided with their consent [20].
The authors proposed a model for gathering evidence from a The needs of numerous parties engaged in gathering digital
cloud environment. This concept utilizes distributed ledger evidence have also been investigated by the researchers. They
technology and Software-Defined Networking (SDN) to understand the value of a system that can guarantee the
preserve the evidence. Additionally, a new algorithm was reliability of the proof offered in court. As a result, they have
developed to secure the collected data. Java and NS3 were developed a system that collects, stores, and shares evidence
used to simulate the entire system. The evaluation analysis of with stakeholders using blockchain technology and smart
the proposed model demonstrated its effectiveness compared contracts. In this paper, the usefulness of the suggested system
to a centralized approach [16]. has also been explored [21].
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
The writers have looked at how blockchain technology is Following information can be recorded as and when the
being used in the legal industry. They have acknowledged that evidence moves with the investigation process:
the integrity and confidence in the process of acquiring and • Date and place of origin of the evidence.
sharing evidence may be preserved by blockchain's • Physical description of the evidence.
fundamental properties, such as provenance, transparency, • When, how long and who handled the evidence with
and decentralisation. The authors have suggested a all the details.
blockchain-based system for producing electronic evidence, • Unique identification for each person involved in the
allowing judicial institutions to confirm the validity of investigation
evidence used in court cases. System analysis shows that the • Process by which evidence was transferred from one
suggested system gives the application area provenance, trust, person to another person.
and efficiency [22]. The following discussion focuses on a few factors that can
The researchers have shown that simply hashing data does not prevent crucial evidence from being admitted into court,
provide sufficient data security because it does not record the rendering it legally useless.
time the hash was generated. Consequently, a technique for Plaintiffs may use an advocate to submit a complaint under the
timestamped hashing is required. To avoid data alteration and present judicial system. Legal procedures result in high costs
improve data transparency, the researchers have devised a for the average person since they are not well understood by
blockchain-based approach that makes use of public him. He must therefore completely rely on the advocates [27].
blockchains. This enables diverse court participants to keep This irrational faith could have a variety of negative effects,
track of and evaluate the evidence whenever they choose. This like cheating on him, making unnecessary purchases, etc.
model can serve as a cornerstone for new researchers in the Accountability: Because they will claim work stress as an
same field [23]. excuse, no court official will accept responsibility for the delay
The authors have examined the utilization of blockchain in court procedures. But in the end, it will be the average
technology for the medical research community. They have person who suffers [28].
presented a paradigm for storing and querying Provenance: Evidence is susceptible to manipulation. We are
pharmacogenomics data, which was implemented using the unable to go back and look at the evidence using the existing
Ethereum blockchain and a solidity-based smart contract. system [29].
According to algorithm analysis, the proposed model was Transparency: Because there is a lack of openness in the
efficient and reduced query time, even with a query pool of current system, court officials may abuse information without
10,000 queries. The algorithm was designed considering other stakeholders' knowledge [30].
solidity constraints, such as variable quantity and gas Data Integration: The court system keeps track of the records
requirements. The method used in this model has shown for each zone. Therefore, it is challenging to integrate records
success in the medical industry, and the authors express when a case covers many zones [31].
optimism about its potential application in other fields for Scalability: Scalability will be a problem to handle the legal
future research [24]. procedure if the case spans numerous states or nations [32].
This paper examines the relationship between the right to a fair A solution is required that can address the aforementioned
trial as defined in Article 6 of the European Convention on problems and aid in the management and submission of
Human Rights (ECHR), its interpretation in case law, and its evidence. The technology that can assist in reaching this goal
relevance to evidence law, particularly during the investigative is blockchain.
phase of criminal proceedings. The analysis aims to shed light
on how this principle implicitly establishes a foundation for IV. ROLE OF BLOCKCHAIN TECHNOLOGY
the establishment of universal rules pertaining to evidence. As demonstrated in Fig. 2, a blockchain is a chain of blocks
Within this framework, two distinct groups of evidence rules that are linked together using the hashing algorithm. A
are identified: those based on the principle of equality of arms distributed ledger supported by blockchain technology is
and those based on the presumption of innocence. The paper notable for being unchangeable, impenetrable, and
outlines and discusses specific challenges that arise in the decentralized.
context of digital investigations for each of these groups.
Furthermore, it explores the implications within a new
governance model for digital evidence [25].
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
In the proposed model we have different entities like creator Algorithm: Creation and Approval of New Evidence Record
Admin, Super Admin, Admin, User. Work flow of the process
is shown in Fig. 3 1. If (msg.sender = user)
2. Then “evidence can’t be created and operation
declined”
3. Elseif ((msg.sender = Admincreator)or( msg.sender =
Adminverified-super) or( msg.sender = Adminverified))
4. Then “Evidence can be created but not yet approved”
5. For approval of evidence, If (msg.sender = Evidence
owner)
6. Then “operation declined”
7. Elseif ((msg.sender = Admincreator)or( msg.sender =
Adminverified-super) or( msg.sender = Adminverified))
8. Then “Evidence can be approved”
9. Else “operation declined”
All related documents are stored on IPFS. When a
document is stored on IPFS, CID of the document will be
returned. This CID is stored on the distributed ledger in form
of a transaction. Algorithms for the processes are given below.
Algorithm: Add New Admin
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
by anybody then its CID will also change. For two identical testnet with chain id 80001 and RPC URL as https://rpc-
file same CID is generated. mumbai.maticvigil.com/. After adding, we can find this testnet
in our wallet. Then we create few accounts which are used
during the implementation. Then to deploy our smart contract
To implement the proposed model, first we add Mumbai test on polygon test network we require test token MATIC. We
network in our Metamask wallet. Network name is Mumbai add these test tokens in our account from the polygon faucet.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
After adding some test token in our accounts, we deploy our getEvidenceDetails function to know the details about the
smart contract with the help of Remix IDE. This contract evidence. Now we can see the owner of the evidence has been
deployment transaction is passed to Metamask for changed as shown in Fig. 7.
confirmation. After the confirmation and contract is deployed Transaction consumes some gas for its execution. This gas
on polygon Mumbai testnet. The view after deployment of
contract is shown in Fig. 4. The functions in our contract are
shown in two colours. Functions with an orange colour are
those that can change the value of some data. The functions
with a blue colour can only read the data and cannot modify it.
Then, we try to add a new admin by passing the hexadecimal
address of the account to the addNewAdmin function. Only
the creator admin and approved super admin have the power
to add admin. Transaction details are shown in Fig. 5. We can
check the user details by passing the hexadecimal address to FIGURE 7. Output of getEvidenceDetails Function After Approval of
the users function, and the status level is 2 as indicated in the Ownership change
decoded output. Before attaining the power of an associated consumption can be converted into number of Matic token
role, a user must be approved. The hexadecimal address of the required for the execution. Then number of Matic token
newly added admin is passed to the verifiedUsers function, required is multiplied with the Matic token Price in Indian
and the received response shows that the approval status is currency. Cost of transaction execution on polygon network
false. Then, this newly created admin is approved by the for standard execution and rapid execution is shown in Table
approved super admin using the approveUsers function. If the 1 and 2. Graphical representation of cost analysis for standard
hexadecimal address of the newly created admin is passed to execution is shown in Fig. 8
the verifiedUsers function, the approval status is true. If a user
who is not approved tries to create evidence, the transaction is Table 1. Cost of Transaction Execution on Polygon Network
declined. Then, this user is approved by the approved super with Standard Execution
admin using the approveUsers function. After approval, if the
same user tries to create evidence, the transaction is executed Gas Price in Matic= .000000138 gwei, Matic Price (INR)= 125
successfully. Only the creator admin, approved super admin, Cost for Cost for
Sr. Gas Standard Standard
and approved admin have the power to create new evidence. Function
No. Consumed Execution Execution
Normal users cannot create evidence. The details of this newly (Matic) (INR)
created evidence can be checked using the getEvidenceDetails 1 addNewAdmin 50814 0.0070 0.87
function. You can see the evidence ID, data related to the
2 approveUsers 50708 0.0069 0.86
evidence, and the address of the evidence owner. The status of
the evidence is 1, which means it is not yet approved. Only the 3 createEvidence 116762 0.0161 2.01
approved super admin has the power to approve any evidence. 4 changeOwnership 49223 0.0067 0.83
If the owner of the evidence tries to approve their own 5 approveChangeOwnership 32028 0.0044 0.55
evidence, the transaction is declined At the time of execution, gas price for rapid execution was
After approval of created evidence status value changed to 2 0.000000169 gwei and price of Matic token in INR was 125.
as shown in Fig. 6. These values are considered for the calculation of the function
wise cost.
Now if any non-owner user wants to change the ownership of FIGURE 8. Cost Analysis for Standard Execution
the evidence, then transaction is declined. Only owner of the
evidence has the power to change the ownership of the
evidence. Then this ownership needs the approval from Table 2. Cost of Transaction Execution on Polygon Network
approved super admin. Now we can use the with Rapid Execution
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
Approach
Proposed
0.00858 1.07344 Property 1 2 3 4 7 10 14
1 addNewAdmin 50814 8 6
1.07120
2 approveUsers 50708 0.00857 7
0.01973 2.46659
3 createEvidence 116762 3 7
0.00831 1.03983 Witness ✓ ✓ ✓ ✓ ✓
4 changeOwnership 49223 9 6 privacy
approveChangeOwne 0.00541 0.67659
5 rship 32028 3 2
Juror privacy ✓
Graphical representation of cost analysis for rapid execution is
shown in Fig. 9.
Authentication ✓ ✓ ✓ ✓ ✓ ✓ ✓
Access control ✓ ✓
Integrity ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Auditability ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Traceability ✓ ✓
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
transactions such who accessed and when etc. from its important evidence. Some possible approaches that
provenance time to current instance of time. can help are redundant storage, backups, trusted node
• Reduction of fraud by increasing transparency: All operators, data encryption and authentication.
the accesses to any evidence will be allowed only by the
consensus of involved parties and access transactions will be VIII. RESEARCH IMPLICATIONS
updated in ledgers of all the parties. So, this level of In this paper, blockchain technology is used to improve
transparency will reduce the chances of fraud or manipulation interoperability between the court system and different parties.
with the evidences. Our findings can be useful to academicians, researchers, and
• Multi country investigation: There might be some others in a number of ways. The main use of the findings is to
cases where multiple countries need to cooperate to carry out enhance the creation of laws or policies. Second, this research
the investigation of any case. In those cases, evidence sharing might serve as a starting point for investigations into
and maintenance could create problems. With the proposed additional potential applications of blockchain technology in
model, evidence sharing can be easily performed in cross the legal sector. The conclusions offer a thorough
border investigation. understanding of the blockchain-enabled legal system.
Following are the few threats that can harm the proposed Researchers will be better able to understand the development
model: and state of blockchain today, which will help them choose
• Smart Contract Vulnerabilities: Smart contracts are worthwhile research topics that demand more devotion from
an integral part of many DApps, and they can be the academic community. More blockchain-based
vulnerable to coding errors and security flaws. These applications may be created for affordable and secure data
vulnerabilities can be exploited to manipulate or steal sharing.
funds, execute unauthorized transactions, or cause
other unintended consequences. IX. CONCLUSION AND FUTURE WORK
• 51% Attack: In a blockchain network, a 51% attack In this paper, we presented a decentralized model for
occurs when a single entity or group of entities gains protecting digital evidence using smart contracts on the Layer
control of more than 50% of the network's mining 2 Polygon blockchain. Our strategy takes advantage of the
power. This allows them to manipulate transactions, immutability, transparency, and decentralisation features of
block confirmations, and potentially double-spend blockchain technology to guarantee the security and integrity
coins. of digital evidence. We create a trustless, automated system
• Sybil Attack: A Sybil attack involves creating using smart contracts that does away with the need for
multiple identities or nodes to gain control over a middlemen and lowers the possibility of tampering or
significant portion of a blockchain network. This manipulation. We showed that our decentralised model is
allows the attacker to influence the consensus effective and efficient through our experimental evaluation.
mechanism, disrupt the network, or execute Real-world applications can benefit from the deployment of
malicious activities. the Layer 2 Polygon blockchain because it enables scalable
• Front-End Exploits: DApps often have front-end and affordable storage and verification of digital evidence. We
interfaces, which can be susceptible to traditional make sure the evidence is intact and verifiable throughout its
web-based attacks such as cross-site scripting (XSS), lifecycle by utilising the security characteristics of smart
cross-site request forgery (CSRF), or phishing contracts. There are still a few areas, though, that need
attacks. These attacks can trick users into revealing improvement and more research. The scalability of blockchain
their private keys, passwords, or other sensitive technology is one of the major issues since the amount of
information. storage needed for digital proof can soon rise to a significant
• Consensus Protocol Attacks: Blockchain networks level. For vast volumes of evidence to be handled effectively
rely on consensus mechanisms to validate and agree in the future, storage and retrieval procedures should be
upon transactions. Depending on the consensus optimised. The incorporation of cutting-edge cryptographic
algorithm used (e.g., Proof of Work, Proof of Stake), methods to improve the confidentiality and privacy of digital
attacks such as selfish mining, long-range attacks, or evidence represents another area for future study.
stake grinding may be possible, compromising the . Techniques such as zero-knowledge proofs or homomorphic
integrity of the blockchain. encryption can be explored to enable secure computations on
• While IPFS offers decentralized and distributed file encrypted evidence without revealing sensitive information.
storage capabilities, it does have certain Furthermore, the usability and accessibility of the system
considerations related to data availability, reliability, should be improved to encourage widespread adoption. User-
and the potential disappearance of data owners. To friendly interfaces and seamless integration with existing
address these concerns, it is essential to implement digital forensic tools can help bridge the gap between
appropriate mitigation strategies and consider traditional forensic workflows and decentralized systems.
additional measures when utilizing IPFS for storing Lastly, the legal and regulatory aspects surrounding the use of
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
decentralized systems for handling digital evidence need to be systems." IEEE Transactions on Computational Social Systems 6, no.
6 (2019): 1433-1441.
addressed. Collaboration with legal experts and policymakers [16] Lusetti, Monia, Luca Salsi, and Andrea Dallatana. "A blockchain
is crucial to ensure compliance with existing laws and based solution for the custody of digital files in forensic medicine."
regulations and to establish a legal framework that Forensic Science International: Digital Investigation 35 (2020):
301017.
accommodates the unique features and challenges of
[17] Petroni, Benedito Cristiano Aparecido, Rodrigo Franco Gonçalves,
decentralized systems. Paulo Sérgio de Arruda Ignácio, Jacqueline Zonichenn Reis, and
Geraldo Jose Dolce Uzum Martins. "Smart contracts applied to a
CONFLICT OF INTEREST: No Conflict of Interest functional architecture for storage and maintenance of digital chain of
custody using blockchain." Forensic Science International: Digital
ACKNOWLEDGMENT: This work has been partially Investigation 34 (2020): 300985.
supported by the Department for drug policies of the [18] Ramesh, D., Mishra, R., Atrey, P. K., Edla, D. R., Misra, S., & Qi, L.
Presidency of the Council of Ministers (Italian Government) (2023). Blockchain based efficient tamper-proof EHR storage for
through the project InstradaME (CUP F49I20000100001); the decentralized cloud-assisted storage. Alexandria Engineering
Journal, 68 (2023): 205-226.
National Operational Programme Metropolitan Cities 2014- [19] Burri, Xavier, Eoghan Casey, Timothy Bolle, and David-Olivier
2020(PON METRO) through the projects Agor`a (CUP Jaquet-Chiffelle. "Chronological independently verifiable electronic
F41I17000170006), Cloud@ME (CUP F49E17000040006), chain of custody ledger using blockchain technology." Forensic
ImpleME (CUP F41I17000180006), MeSm@rt (CUP Science International: Digital Investigation 33 (2020): 300976.
[20] Gürsoy, Gamze, Charlotte M. Brannon, and Mark Gerstein. "Using
F41I18000230006) and Urbamid+ (CUP Ethereum blockchain to store and query pharmacogenomics data via
F41H18000030006)''. smart contracts." BMC medical genomics 13, no. 1 (2020): 1-11.
[21] Li, Meng, Chhagan Lal, Mauro Conti, and Donghui Hu. "LEChain: A
REFERENCES blockchain-based lawful evidence management scheme for digital
[1] Nieto, Ana, Rodrigo Roman, and Javier Lopez. "Digital witness: forensics." Future Generation Computer Systems 115 (2021): 406-
Safeguarding digital evidence by using secure architectures in 420.
personal devices." IEEE Network 30, no. 6 (2016): 34-41. [22] Kosba, Ahmed, Andrew Miller, Elaine Shi, Zikai Wen, and
[2] Cebe, Mumin, Enes Erdin, Kemal Akkaya, Hidayet Aksu, and Selcuk Charalampos Papamanthou. "Hawk: The blockchain model of
Uluagac. "Block4forensic: An integrated lightweight blockchain cryptography and privacy-preserving smart contracts." In 2016 IEEE
framework for forensics applications of connected vehicles." IEEE symposium on security and privacy (SP), pp. 839-858. IEEE, 2016.
communications magazine 56, no. 10 (2018): 50-57. [23] Buterin, Vitalik. "A next-generation smart contract and decentralized
[3] Tian, Zhihong, Mohan Li, Meikang Qiu, Yanbin Sun, and Shen Su. application platform." white paper 3, no. 37 (2014): 2-1.
"Block-DEF: A secure digital evidence framework using blockchain." [24] Xia, Q. I., Emmanuel Boateng Sifah, Kwame Omono Asamoah,
Information Sciences 491 (2019): 151-165. Jianbin Gao, Xiaojiang Du, and Mohsen Guizani. "MeDShare: Trust-
[4] Lin, Xiaodong, Ting Chen, Tong Zhu, Kun Yang, and Fengguo Wei. less medical data sharing among cloud service providers via
"Automated forensic analysis of mobile applications on Android blockchain." IEEE access 5 (2017): 14757-14767.
devices." Digital Investigation 26 (2018): S59-S66. [25] Stoykova, R. “The right to a fair trial as a conceptual framework for
[5] Shafarenko, Alex. "A PLS blockchain for IoT applications: protocols digital evidence rules in criminal investigations”, Computer Law &
and architecture." Cybersecurity 4, no. 1 (2021): 1-17. Security Review, 49 (2023): 105801.
[6] Shahnaz, Ayesha, Usman Qamar, and Ayesha Khalid. "Using [26] Pereira, Rui Soares. "Evidence models and proof of causation." Law,
blockchain for electronic health records." IEEE access 7 (2019): Probability and Risk 12, no. 3-4 (2013): 229-257.
147782-147795. [27] Rana, Sumit Kumar, Sanjeev Kumar Rana, Arun Kumar Rana, Kashif
[7] Jin, Hao, Yan Luo, Peilong Li, and Jomol Mathew. "A review of Nisar, Tariq Rahim Soomro, and Sana Nisar. "A Survey on Blockchain
secure and privacy-preserving medical data sharing." IEEE Access 7 Technology Supported Approaches for Healthcare System, Open
(2019): 61656-61669. Issues and Challenges." In 2022 14th International Conference on
[8] Pourvahab, Mehran, and Gholamhossein Ekbatanifard. "An efficient Mathematics, Actuarial Science, Computer Science and Statistics
forensics architecture in software-defined networking-IoT using (MACS), pp. 1-7. IEEE, 2022.
blockchain technology." Ieee Access 7 (2019): 99573-99588. [28] Rana, Sumit Kumar, Sanjeev Kumar Rana, Arun Kumar Rana, and
[9] Jin, H., Luo, Y., Li, P., & Mathew, J. (2019). A review of secure and Sardar MN Islam. "A Blockchain Supported Model for Secure
privacy-preserving medical data sharing. IEEE Access, 7, 61656- Exchange of Land Ownership: An Innovative Approach." In 2022
61669. International Conference on Computing, Communication, and
[10] Pourvahab, Mehran, and Gholamhossein Ekbatanifard. "An efficient Intelligent Systems (ICCCIS), pp. 484-489. IEEE, 2022.
forensics architecture in software-defined networking-IoT using [29] Rana, Sumit Kumar, and Sanjeev Kumar Rana. "Blockchain based
blockchain technology." Ieee Access 7 (2019): 99573-99588. business model for digital assets management in trust less
[11] Ghimire, Sarala, Jae Young Choi, and Bumshik Lee. "Using collaborative environment." International Journal of Computing and
blockchain for improved video integrity verification." IEEE Digital Systems 9 (2020): 1-11.
Transactions on Multimedia 22, no. 1 (2019): 108-121. [30] Khan, Shafaq Naheed, Faiza Loukil, Chirine Ghedira-Guegan, Elhadj
[12] Pourvahab, Mehran, and Gholamhossein Ekbatanifard. "Digital Benkhelifa, and Anoud Bani-Hani. "Blockchain smart contracts:
forensics architecture for evidence collection and provenance Applications, challenges, and future trends." Peer-to-peer Networking
preservation in iaas cloud environment using sdn and blockchain and Applications 14 (2021): 2901-2925.
technology." IEEE Access 7 (2019): 153349-153364. [31] Dias, D., and J. Benet. "Distributed Web Applications with IPFS in
[13] Yang, Xinying, Yuan Zhang, Sheng Wang, Benquan Yu, Feifei Li, ICWE." (2016): 616-619.
Yize Li, and Wenyuan Yan. "LedgerDB: a centralized ledger database [32] Santamaría, P., Tobarra, L., Pastor-Vargas, R., & Robles-Gómez, A.
for universal audit and verification." Proceedings of the VLDB “Smart Contracts for Managing the Chain-of-Custody of Digital
Endowment 13, no. 12 (2020): 3138-3151. Evidence: A Practical Case of Study”, Smart Cities, 6(2),2023: 709-
[14] Sun, Jin, Xiaomin Yao, Shangping Wang, and Ying Wu. "Non- 727.
repudiation storage and access control scheme of insurance data based [33] Khan, Muhammad Naeem Ahmed, and ShahWali Ullah. "A log
on blockchain in IPFS." IEEE Access 8 (2020): 155145-155155. aggregation forensic analysis framework for cloud computing
[15] Li, Shancang, Tao Qin, and Geyong Min. "Blockchain-based digital environments." Computer Fraud & Security 2017, no. 7 (2017): 11-
forensics investigation framework in the internet of things and social 16.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
[34] Trenwith, Philip M., and H. S. Venter. "FReadyPass: a digital forensic books with a national and international publisher like Taylor and Francis,
ready passport to control access to data across jurisdictional USA, and many times members of SCI, Scopus indexed international
boundaries." Australian Journal of Forensic Sciences 51, no. 5 (2019): conference/symposium. He has guided 6 M.Tech candidates. He serves as a
583-595. Reviewer for several journals and international conferences. He is also a
[35] Alqahtany, Saad, Nathan Clarke, Steven Furnell, and Christoph Reich. member of the Asia Society of Research. He also published/Granted 10
"A forensic acquisition and analysis system for IaaS." Cluster national and international patents. He is an Editor and Reviewer of many
Computing 19 (2016): 439-453. international journals around the world. Many time Keynote Speaker in
[36] Rana, S. K., & Rana, S. K. (2021). Intelligent Amalgamation of international conference. He has conducted many workshops on IoT and its
Blockchain Technology with Industry 4.0 to Improve Security. In applications in engineering, Wireless Networks, Simulators, etc. Many
Internet of Things (pp. 165-175). CRC Press. times, received international awards from the various international
[37] Irfan, Muhammad, Haider Abbas, Yunchuan Sun, Anam Sajid, and organization. Listed in the world scientist Ranking 2021 and 2022. Guest
Maruf Pasha. "A framework for cloud forensics evidence collection editor for Special Issue "Routing and Protocols for Energy Efficient
and analysis using security information and event management." Communication" energy, MDPI, SCI, IF-3.004 (Q2), Guest Editor: special
Security and Communication Networks 9, no. 16 (2016): 3790-3807. issue in Blockchain in industry, Frontier Publication (ESCI Indexed,
[38] Spiekermann, Daniel, Jörg Keller, and Tobias Eggendorfer. "Network IF:2.252). Q2 Cat. Journal, Guest Editor: special issue in Journal of
forensic investigation in OpenFlow networks with ForCon." Digital Autonomous, Frontier Publication (Scopus Indexed, IF:3.252). Q2 Cat.
Investigation 20 (2017): S66-S74. Journal. Member of SIRG (Scientific Innovation Research Group), Egypt.
[39] Santra, Palash, Prasanna Roy, Debojyoti Hazra, and Puspa Mahata.
"Fuzzy data mining-based framework for forensic analysis and DR. SANJEEV KUMAR received his
evidence generation in cloud environment." In Ambient BTech degree in computer engineering from
Communications and Computer Systems: RACCCS 2017, pp. 119- Kurukshetra University, Kurukshetra, India in
129. Springer Singapore, 2018. 1999 and MTech degree in information
[40] Pasquale, Liliana, Sorren Hanvey, Mark Mcgloin, and Bashar technology from GGSIP university in 2007.
Nuseibeh. "Adaptive evidence collection in the cloud using attack He received his PhD degree from department
scenarios." Computers & Security 59 (2016): 236-254. of computer science and engineering,
[41] Norvill, Robert, Beltran Borja Fiz Pontiveros, Radu State, and Andrea Maharishi Markandeshwar (deemed to be
Cullen. "IPFS for reduction of chain size in Ethereum." In 2018 IEEE university), Mullana, India in 2012. His areas
International Conference on Internet of Things (iThings) and IEEE of interest are wireless networks, big data and
Green Computing and Communications (GreenCom) and IEEE blockchain technology.
Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), pp. 1121-1128. IEEE, 2018.
DR. VISHNU SHARMA is working as a
Professor and Head in CSE Deptt., at
Galgotia’s College of Engineering and
Technology, Greater Noida (U.P.) Dr. Vishnu
Sharma has completed his B.Tech, M.Tech,
and Ph.D. (CSE) in 2012 from Gov.
Autonomous Institute, Madhav Institute of
Dr. Sumit Kumar Rana has completed his Technology & Science (M.I.T.S.) Gwalior
B.Tech degree from Kurukshetra University, (M.P.) in Computer Science & Engineering
M.Tech. and Ph.D. Degree from Maharishi and Affiliated to Rajiv Gandhi Technical
Markandeshwar (Deemed to be University), University, Bhopal, He has published 60+ papers in MANETs, AI, Machine
Mullana, India. His area of interest includes Learning, IoT, Cryptography and Network Security, Computer Networks,
Blockchain technology, cryptography, and Mobile Computing in International Conferences and International
cryptocurrency, artificial intelligence etc. Prof. Journals/SCI/Scopus. He has published three books on Mobile Computing,
Sumit Kumar Rana is currently working as Fundamental of Cyber Security and Law, and Advanced Mobile
Assistant Professor at Panipat institute of Computing. He is having around 21 years of teaching experience in various
engineering and technology, Panipat, India with more than 12 years of reputed Engineering Institutes and universities such as Jaypee University,
experience. Prof. Rana is a collaborative researcher. He has published Galgotias University, KIET, Galgotias College, etc. and he has also
multiple SCI/SCOPUS papers, book chapters and papers in National and organized many IEEE International conferences in the IEEE UP section.
International IEEE conferences. Also, he has attended various workshops Guest Editor: special issue in Blockchain in industry, Frontier Publication
and faculty development programs. He has guided 4 M.Tech. candidates. (ESCI Indexed, IF:2.252). Q2 Cat. Journal.
He serves as a Reviewer for several journals and international conferences.
He is also a member of the Computer Science Teachers Association (CSTA)
and International Association of Engineers (IAENG). He also published UMESH KUMAR LILHORE is a Professor
national patent. He has a keen interest in teaching and implementing the in the Department of CSE, Chandigarh
latest techniques related to blockchain technology. University, Punjab, India. He has more than 17
years of experience in teaching, research, and
industry. He has received his post-doctoral and
Dr. ARUN KUMAR RANA has completed his doctoral in CSE. He has research publications
B.Tech degree from Kurukshetra University, in SCI-Indexed International journals of high
M.Tech. and Ph.D. Degree from Maharishi repute. His research includes AI, Machine
Markandeshwar (Deemed to be University), learning, Computer Security, Computational
Mullana, India. His area of interest includes Image Intelligence, and Information Science.
Processing, Wireless Sensor Network, Internet of
Things, AI, and Machine Learning and Embedded OSAMAH IBRAHIM KHALAF is Senior Engineering and
systems. Prof. Rana is currently working as Telecommunications Lecturer in Al-Nahrain University/. He has hold 15
Assistant Professor-3 in Galgotias college of years of university-level teaching experience in computer science and
engineering and technology Gr Noida India with network technology and has a strong CV about research activities in
more than 16 years of experience. Prof. Rana is a collaborative researcher computer science and information technology projects. He has had many
He has published more than 120 SCI/ESCI/Scopus/others papers in National published articles indexed in (ISI/Thomson Reuters) and has also
and International Journals and also in conferences. He has also published 10
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2023.3302771
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4