Advertisement

Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes

  • William Thomas WeilbachEmail author
  • Yusuf Moosa MotaraEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 973)

Abstract

This paper examines the way in which blockchain technology can be used to improve the integrity of the chain of evidence in digital forensics. A particular scalable method of verifying point-in-time existence of a piece of digital evidence, using the OpenTimestamps (OTS) service, is described, and tests are carried out to independently validate the claims made by the service. The results demonstrate that the OTS service is highly reliable, but not suitable for time-sensitive digital timestamping.

Keywords

Digital forensics Blockchain Evidence integrity 

References

  1. 1.
    Araoz, M., Ordano, E.: Proof of Existence (2013). http://proofofexistence.com/
  2. 2.
    Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Invest. 9, 90–98 (2012).  https://doi.org/10.1016/j.diin.2012.05.001CrossRefGoogle Scholar
  3. 3.
    Dykstra, J., Sherman, A.T.: Design and implementation of frost: digital forensic tools for the openstack cloud computing platform. Digit. Invest. 10, S87–S95 (2013).  https://doi.org/10.1016/j.diin.2013.06.010CrossRefGoogle Scholar
  4. 4.
    Ethereum Foundation: Ethereum (2016). https://www.ethereum.org/
  5. 5.
    Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin. In: iConference 2015, pp. 1–6 (2015)Google Scholar
  6. 6.
    InfoSec Institute: 22 Popular Computer Forensics Tools (2017). http://resources.infosecinstitute.com/computer-forensics-tools/
  7. 7.
    Kessler, G.C.: Anti-forensics and the digital investigator. In: Proceedings of the 2014 47th Hawaii International Conference on System Sciences, pp. 1–7 (2006).  https://doi.org/10.4225/75/57ad39ee7ff25
  8. 8.
    Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982).  https://doi.org/10.1145/357172.357176CrossRefzbMATHGoogle Scholar
  9. 9.
    Merkle, R.C.: Protocols for public key cryptography. In: Synopsis on Security and Privacy, pp. 122–134 (1980)Google Scholar
  10. 10.
    Motara, Y.M.: Preimages for SHA-1. Ph.D. thesis, Rhodes University (2017)Google Scholar
  11. 11.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Eelectronic Cash System (2008). https://bitcoin.org/bitcoin.pdf
  12. 12.
    Preneel, B.: Cryptographic hash functions. Eur. Trans. Telecommun. 5(4), 431–448 (1994).  https://doi.org/10.1002/ett.4460050406CrossRefGoogle Scholar
  13. 13.
    Redman, J.: Popular Bitcoin Exchanges Reveal Controversial Hard Fork Contingency Plan (2017). https://news.bitcoin.com/popular-bitcoin-exchanges-reveal-controversial-hard-fork-contingency-plan/
  14. 14.
    Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348–358. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-25937-4_22CrossRefzbMATHGoogle Scholar
  15. 15.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York (1993)zbMATHGoogle Scholar
  16. 16.
    Nelson, B., Phillips, A., Steuart, C.: Guide to Computer Forensics and Investigations. Delmar Learning, 5th edn. (2015)Google Scholar
  17. 17.
    Todd, P.: OpenTimestamps: Scalable, Trustless, Distributed Timestamping with Bitcoin (2016). https://petertodd.org/2016/opentimestamps-announcement
  18. 18.
    Valjarevic, A., Venter, H.S.: Implementation guidelines for a harmonised digital forensic investigation readiness process model. In: 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–9, August 2013.  https://doi.org/10.1109/ISSA.2013.6641041
  19. 19.
    Wayne, V., Wilkinson, S., Bukowski, J.: Chainpoint: a scalable protocol for recording data in the blockchain and generating blockchain receipts (2016). https://tierion.com/chainpoint
  20. 20.
    Wilson, C.: Digital evidence discrepancies: Casey Anthony Trial (2011). http://www.digital-detective.net/digital-evidence-discrepancies-casey-anthony-trial/
  21. 21.
    Witte, J.H.: The Blockchain: A Gentle Introduction, pp. 1–5 (2016).  https://doi.org/10.2139/ssrn.2887567
  22. 22.
    Zerocoin Electric Coin Company: About Us (2016). https://z.cash/about.html

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Rhodes UniversityGrahamstownSouth Africa

Personalised recommendations