Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes

  • William Thomas WeilbachEmail author
  • Yusuf Moosa MotaraEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 973)


This paper examines the way in which blockchain technology can be used to improve the integrity of the chain of evidence in digital forensics. A particular scalable method of verifying point-in-time existence of a piece of digital evidence, using the OpenTimestamps (OTS) service, is described, and tests are carried out to independently validate the claims made by the service. The results demonstrate that the OTS service is highly reliable, but not suitable for time-sensitive digital timestamping.


Digital forensics Blockchain Evidence integrity 


  1. 1.
    Araoz, M., Ordano, E.: Proof of Existence (2013).
  2. 2.
    Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Invest. 9, 90–98 (2012). Scholar
  3. 3.
    Dykstra, J., Sherman, A.T.: Design and implementation of frost: digital forensic tools for the openstack cloud computing platform. Digit. Invest. 10, S87–S95 (2013). Scholar
  4. 4.
    Ethereum Foundation: Ethereum (2016).
  5. 5.
    Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin. In: iConference 2015, pp. 1–6 (2015)Google Scholar
  6. 6.
    InfoSec Institute: 22 Popular Computer Forensics Tools (2017).
  7. 7.
    Kessler, G.C.: Anti-forensics and the digital investigator. In: Proceedings of the 2014 47th Hawaii International Conference on System Sciences, pp. 1–7 (2006).
  8. 8.
    Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982). Scholar
  9. 9.
    Merkle, R.C.: Protocols for public key cryptography. In: Synopsis on Security and Privacy, pp. 122–134 (1980)Google Scholar
  10. 10.
    Motara, Y.M.: Preimages for SHA-1. Ph.D. thesis, Rhodes University (2017)Google Scholar
  11. 11.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Eelectronic Cash System (2008).
  12. 12.
    Preneel, B.: Cryptographic hash functions. Eur. Trans. Telecommun. 5(4), 431–448 (1994). Scholar
  13. 13.
    Redman, J.: Popular Bitcoin Exchanges Reveal Controversial Hard Fork Contingency Plan (2017).
  14. 14.
    Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348–358. Springer, Heidelberg (2004). Scholar
  15. 15.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York (1993)zbMATHGoogle Scholar
  16. 16.
    Nelson, B., Phillips, A., Steuart, C.: Guide to Computer Forensics and Investigations. Delmar Learning, 5th edn. (2015)Google Scholar
  17. 17.
    Todd, P.: OpenTimestamps: Scalable, Trustless, Distributed Timestamping with Bitcoin (2016).
  18. 18.
    Valjarevic, A., Venter, H.S.: Implementation guidelines for a harmonised digital forensic investigation readiness process model. In: 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–9, August 2013.
  19. 19.
    Wayne, V., Wilkinson, S., Bukowski, J.: Chainpoint: a scalable protocol for recording data in the blockchain and generating blockchain receipts (2016).
  20. 20.
    Wilson, C.: Digital evidence discrepancies: Casey Anthony Trial (2011).
  21. 21.
    Witte, J.H.: The Blockchain: A Gentle Introduction, pp. 1–5 (2016).
  22. 22.
    Zerocoin Electric Coin Company: About Us (2016).

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Rhodes UniversityGrahamstownSouth Africa

Personalised recommendations