2019
DOI: 10.1016/j.diin.2019.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 106 publications
(45 citation statements)
references
References 3 publications
0
44
0
1
Order By: Relevance
“…Then, there are two types of Business Network Archive deployments. It can be deployed in Hyperledger Fabric or via Web Browser [16,18]. Hyperledger Composer's framework also provides a flexible development platform, an object-oriented programming language to define Assets, and a JavaScript engine to create Smart Contracts [19].…”
Section: Hyperledger Composer and Hyperledger Fabricmentioning
confidence: 99%
“…Then, there are two types of Business Network Archive deployments. It can be deployed in Hyperledger Fabric or via Web Browser [16,18]. Hyperledger Composer's framework also provides a flexible development platform, an object-oriented programming language to define Assets, and a JavaScript engine to create Smart Contracts [19].…”
Section: Hyperledger Composer and Hyperledger Fabricmentioning
confidence: 99%
“…it introduces a membership service that establishes rules and regulations by which different stakeholders are governed, authenticated, validated, and verified to be part of the blockchain network and allowed to access the ledger for ensuring secrecy, privacy, and confidentiality. The membership service is a new comprehensive novel design that revamps the whole process of nondeterminism, resource exhaustion, and performance attacks in the participating stakeholders [76]. Access control lists can be used to provide additional layers of permission.…”
Section: Hyperledger Fabric Blockchainmentioning
confidence: 99%
“…Some advantages of using an XML approach are it's robust, strong, easy to manipulate, data independence and free for anyone, also easy for store , transfer and identify of information [9] . Then extract digital evidence metadata information [10] , [12] to check if the image has been modified using any editor software application like photoshop. Finally allocate geolocation for the collected DE.…”
Section: Iraqi Journal Of Information and Communications Technology(imentioning
confidence: 99%