Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3508072.3508084acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Data Preservation System using BoCA: Blockchain-of-Custody Application

Published: 13 April 2022 Publication History

Abstract

The recent growth in popularity of blockchains has been primarily fueled by their support of cryptocurrencies and smart contracts. However, a blockchain is primarily a distributed, trustworthy ledger and one of its greatest features is its ability to preserve data in a robust and verifiable manner. In this paper we present a general Blockchain-of-Custody Application proof-of-concept. BoCA allows data to be preserved on the blockchain in a transparent and verifiable way. We present our application and discuss the advantages this approach has over the state-of-the-art, as well as discuss different scenarios in which it could be used.

References

[1]
Christopher Adams. 2017. Proof of Existence. Retrieved November 17, 2021 from https://proofofexistence.com/ [online] https://proofofexistence.com/.
[2]
Juan Benet. 2017. Filecoin: A Decentralized Storage Network. Retrieved November 17, 2021 from https://filecoin.io/filecoin.pdf [online] https://filecoin.io/filecoin.pdf.
[3]
BitInfoCharts. 2021. Cryptocurrency Statistics. Retrieved November 17, 2021 from https://bitinfocharts.com/ [online] https://bitinfocharts.com/.
[4]
Chainpoint. 2020. A scalable protocol for anchoring data in the blockchain and generating blockchain receipts. Retrieved November 17, 2021 from https://www.chainpoint.com/ [online] https://www.chainpoint.com/.
[5]
Jason Chavannes. 2018. Introducing Memo. Retrieved November 17, 2021 from https://memo.cash/blog/introducing-memo [online] https://memo.cash/blog/introducing-memo.
[6]
M. Chopade, S. Khan, U. Shaikh, and R. Pawar. 2019. Digital Forensics: Maintaining Chain of Custody Using Blockchain. In 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). 744–747.
[7]
Morris J Dworkin. 2007. Sp 800-38d. recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac. National Institute of Standards & Technology.
[8]
Gregory Epiphaniou, Prashant Pillai, Mirko Bottarelli, Haider Al-Khateeb, Mohammad Hammoudesh, and Carsten Maple. 2020. Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management 67, 4 (2020), 1059–1073. https://doi.org/10.1109/TEM.2020.2965991
[9]
FTX. 2021. Blockchain Deposits and Withdrawals. Retrieved November 17, 2021 from https://help.ftx.com/hc/en-us/articles/360034865571-Blockchain-Deposits-and-Withdrawals [online], https://help.ftx.com/hc/en-us/articles/360034865571-Blockchain-Deposits-and-Withdrawals.
[10]
Acronis International GmbH. 2021. Acronis Notary. Retrieved November 17, 2021 from https://kb.acronis.com/content/64943 [online] https://kb.acronis.com/content/64943.
[11]
Martin Herman 2020. NIST Cloud Computing Forensic Science Challenges. Retrieved November 17, 2021 from https://www.nist.gov/publications/nist-cloud-computing-forensic-science-challenges [online] https://www.nist.gov/publications/nist-cloud-computing-forensic-science-challenges.
[12]
Huobi. 2021. Announcement on the Adjustment of BTC and ETH Network Confirmation Times. Retrieved November 17, 2021 from https://www.huobi.com/support/en-us/detail/360000334722 [online], https://www.huobi.com/support/en-us/detail/360000334722.
[13]
Kraken. 2021. Cryptocurrency deposit processing times. Retrieved November 17, 2021 from https://support.kraken.com/hc/en-us/articles/203325283-Cryptocurrency-deposit-processing-times [online], https://support.kraken.com/hc/en-us/articles/203325283-Cryptocurrency-deposit-processing-times.
[14]
Hongyu Li, Liehuang Zhu, Meng Shen, Feng Gao, Xiaoling Tao, and Sheng Liu. 2018. Blockchain-based data preservation system for medical data. Journal of medical systems 42, 8 (2018), 1–13.
[15]
Kathleen Moriarty, Burt Kaliski, and Andreas Rusch. 2017. Pkcs# 5: Password-based cryptography specification version 2.1. Internet Eng. Task Force (IETF) 8018 (2017), 1–40.
[16]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved November 17, 2021 from https://bitcoin.org/bitcoin.pdf [online] https://bitcoin.org/bitcoin.pdf.
[17]
Minghua Qu. 1999. Sec 2: Recommended elliptic curve domain parameters. Certicom Res., Mississauga, ON, Canada, Tech. Rep. SEC2-Ver-0.6 (1999).
[18]
C Schwarz. 2019. Ethereum 2.0: A Complete Guide. Medium (2019). Retrieved November 17, 2021 from https://medium.com/chainsafe-systems/ethereum-2-0-a-complete-guide-d46d8ac914ce [online] https://medium.com/chainsafe-systems/ethereum-2-0-a-complete-guide-d46d8ac914ce.
[19]
Storj Labs. 2018. Storj: A Decentralized Cloud Storage Network Framework. Retrieved November 17, 2021 from https://www.storj.io/storjv3.pdf [online], https://www.storj.io/storjv3.pdf.
[20]
Cybrosys Technologies. 2021. Blocktick: Issue and Verify Records using Blockchain. Retrieved November 17, 2021 from https://www.cybrosys.com/blocktick/ [online] https://www.cybrosys.com/blocktick/.
[21]
Kevin Ting. 2017. Cryptocurrency security and safety best practices. Retrieved November 17, 2021 from https://www.bitcoinforbeginners.io/cryptocurrency-guide/cryptocurrency-security/ [online] https://www.bitcoinforbeginners.io/cryptocurrency-guide/cryptocurrency-security/.
[22]
David Vorick and Luke Champine. 2014. Sia: Simple Decentralized Storage. Retrieved November 17, 2021 from https://academy.bit2me.com/wp-content/uploads/2021/05/SIA-WHITEPAPER.pdf [online] https://academy.bit2me.com/wp-content/uploads/2021/05/SIA-WHITEPAPER.pdf.
[23]
Y. Zhang, S. Wu, B. Jin, and J. Du. 2017. A blockchain-based process provenance for cloud forensics. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC). 2470–2473.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '21: Proceedings of the 5th International Conference on Future Networks and Distributed Systems
December 2021
847 pages
ISBN:9781450387347
DOI:10.1145/3508072
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blockchain
  2. chain of custody
  3. data integrity
  4. data preservation
  5. digital forensics

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICFNDS 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 57
    Total Downloads
  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)2
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media