A blockchain based private framework for facilitating digital forensics using IoT

Bhawna Suri, Shweta Taneja, Siddharth Sharma, Vishwajeet Verma, Divyanshi Parashar, Parth Sikka, Monika Arora, Sayed Sayeed Ahmad
{"title":"A blockchain based private framework for facilitating digital forensics using IoT","authors":"Bhawna Suri, Shweta Taneja, Siddharth Sharma, Vishwajeet Verma, Divyanshi Parashar, Parth Sikka, Monika Arora, Sayed Sayeed Ahmad","doi":"10.47974/jdmsc-1733","DOIUrl":null,"url":null,"abstract":"Introduction: Images play an essential role as evidence in any forensic analysis of a police investigation. They are a crucial part of the analysis and store important and nuanced information required to guide the analysis in the right direction and then finally lead the investigation to a just conclusion. However, these images are often subject to tampering. Malicious elements of society external or internal entities involved in conducting the investigation, try to tamper with, mend, and destroy pieces of evidence. This change can mislead the direction of the evidence and can benefit the accused. Research Problem: Through the scope of this paper, we will try to tackle this problem and find a solution for it. Methods: The approach proposed to tackle this problem is to implement a blockchain-based, distributed virtual private network (VPN) system. The network consists of devices spread across the internet, connected via a VPN. Only authorized devices are a part of the network and each device has a particular role and key. The image is captured from the IoT device at the crime scene, it is then encrypted using a Mixed Alphabet Cipher substitution algorithm that converts the RGB values to a string at the camera node and then transferred to the main server. It is further decrypted and again encrypted using the key of the main server. Upon encryption, the string is converted to a hash key which is then added to the blockchain. Results: The performance of the proposed network is tested on two different parameters- operating system and image size. It was found that the encryption time of images varies linearly with image size, operating system and image size. The different operating systems are Ubuntu and two variants of MAC OS. The images being tested vary from 200x200 px to 3840x2160px. The encryption and decryption time of different images is recorded, and it was found that the encryption time of images varies linearly with image size. Conclusion: The proposed solution was successfully developed and tested on different sets of images and operating systems. As our solution uses an in-house developed blockchain network, it has a better working cost than using an Ethereum-based blockchain.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Discrete Mathematical Sciences and Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Introduction: Images play an essential role as evidence in any forensic analysis of a police investigation. They are a crucial part of the analysis and store important and nuanced information required to guide the analysis in the right direction and then finally lead the investigation to a just conclusion. However, these images are often subject to tampering. Malicious elements of society external or internal entities involved in conducting the investigation, try to tamper with, mend, and destroy pieces of evidence. This change can mislead the direction of the evidence and can benefit the accused. Research Problem: Through the scope of this paper, we will try to tackle this problem and find a solution for it. Methods: The approach proposed to tackle this problem is to implement a blockchain-based, distributed virtual private network (VPN) system. The network consists of devices spread across the internet, connected via a VPN. Only authorized devices are a part of the network and each device has a particular role and key. The image is captured from the IoT device at the crime scene, it is then encrypted using a Mixed Alphabet Cipher substitution algorithm that converts the RGB values to a string at the camera node and then transferred to the main server. It is further decrypted and again encrypted using the key of the main server. Upon encryption, the string is converted to a hash key which is then added to the blockchain. Results: The performance of the proposed network is tested on two different parameters- operating system and image size. It was found that the encryption time of images varies linearly with image size, operating system and image size. The different operating systems are Ubuntu and two variants of MAC OS. The images being tested vary from 200x200 px to 3840x2160px. The encryption and decryption time of different images is recorded, and it was found that the encryption time of images varies linearly with image size. Conclusion: The proposed solution was successfully developed and tested on different sets of images and operating systems. As our solution uses an in-house developed blockchain network, it has a better working cost than using an Ethereum-based blockchain.
一个基于区块链的私有框架,用于使用物联网促进数字取证
图像作为证据在警方调查的任何法医分析中起着至关重要的作用。它们是分析的关键部分,并存储重要而微妙的信息,这些信息需要指导分析朝着正确的方向进行,然后最终导致调查得出公正的结论。然而,这些图像经常受到篡改。社会外部或者内部恶意分子参与调查,企图篡改、修补、销毁证据的。这种变化可能会误导证据的方向,对被告有利。研究问题:通过本文的研究范围,我们将尝试解决这一问题并找到解决方案。方法:提出的解决这一问题的方法是实现基于区块链的分布式虚拟专用网(VPN)系统。该网络由遍布互联网的设备组成,通过VPN连接。只有授权的设备才是网络的一部分,每个设备都有特定的角色和密钥。图像从犯罪现场的物联网设备捕获,然后使用混合字母表密码替换算法进行加密,该算法将RGB值转换为相机节点的字符串,然后传输到主服务器。它被进一步解密,并使用主服务器的密钥再次加密。加密后,字符串被转换为哈希密钥,然后添加到区块链中。结果:在两个不同的参数-操作系统和图像大小上测试了所提出的网络的性能。发现图像的加密时间与图像大小、操作系统和图像大小呈线性关系。不同的操作系统是Ubuntu和MAC OS的两个变体。被测试的图像范围从200x200像素到3840x2160px。记录不同图像的加解密时间,发现图像的加密时间随图像大小呈线性变化。结论:所提出的解决方案已成功开发并在不同的映像集和操作系统上进行了测试。由于我们的解决方案使用内部开发的区块链网络,因此它比使用基于以太坊的区块链具有更好的工作成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信