2022
DOI: 10.1007/s13369-022-07555-1
|View full text |Cite
|
Sign up to set email alerts
|

IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 39 publications
0
6
0
1
Order By: Relevance
“…There are various challenges, limitations, and issues associated with the existing SMEs including the registration of startups, financial transactions exchange, and privacy, transparency in intercommunication, ledger maintenance in the centralized server-based preservation 34 . And so, it is relying on third-part data management and optimization tools with security solutions as well.…”
Section: Future Directionmentioning
confidence: 99%
“…There are various challenges, limitations, and issues associated with the existing SMEs including the registration of startups, financial transactions exchange, and privacy, transparency in intercommunication, ledger maintenance in the centralized server-based preservation 34 . And so, it is relying on third-part data management and optimization tools with security solutions as well.…”
Section: Future Directionmentioning
confidence: 99%
“…A state‐of‐art review about power automation and distribution using Artificial intelligence and blockchain is presented in Reference 137. A Digital Forensics Chain‐of‐Custody for surveillance mechanism is proposed in Reference 138. The process establishes a Blockchain network to facilitate the exchange of investigation information among involved stakeholders.…”
Section: Recent Research Trendsmentioning
confidence: 99%
“…However, as blockchain technology advances and various industries accumulate vast amounts of data, the traditional single chain blockchain system proves inadequate for increasingly complex application scenarios. Consequently, master–slave blockchains (MSBC) structures such as Spark Chain have garnered attention from experts and scholars alike, finding extensive applications in security 5 , 6 , fog computing 7 , industrial internet of things 8 . Master–slave blockchains typically consist of a master chain comprising master blocks connected to slave chains composed of slave blocks.…”
Section: Introductionmentioning
confidence: 99%