The International Arab Journal of Information Technology (IAJIT)


SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS

Blockchain technology is a groundbreaking and highly secure decentralized digital ledger used to record and store transactions across a network of computers. Its primary purpose is to safeguard, monitor, and oversee digital assets, providing robust protection against unauthorized tampering, revisions, or deletions. It serves as an immutable and tamper-resistant ledger ideal for storing digital evidence, enabling the tracking of evidence’s origins while strictly controlling access to authorized individuals. Current evidence management systems lack essential functionalities, such as authenticating intermediate user access and efficiently transferring evidence access between users. These systems also rely on the Base64 algorithm, which presents challenges related to storage capacity, time delays, scalability, and transaction throughput. To address these limitations, this research introduces an innovative solution: The integration of the Base64 scheme with sharding and the Interplanetary File System (IPFS). This integration is designed to bolster transaction performance, scalability, and throughput. The Base64 scheme plays a pivotal role by encrypting image evidence, securely housing it within the blockchain network. Concurrently, IPFS decentralizes the storage of these images, thereby optimizing memory usage and enhancing transaction throughput within the blockchain environment. Experimental results showcase the efficacy of the proposed SHARD-FEMF, demonstrating a 25% improvement in memory utilization, a 21.5% reduction in gas utilization, and a 23% enhancement in transaction scalability compared to the existing Base64 scheme. Through the combined utilization of sharding and IPFS, the SHARD-FEMF framework represents a significant advancement in efficient forensic evidence management leveraging blockchain technology.

[1] Bose R., Phokela K., Kaulgud V., and Podder S., “BLINKER: A Blockchain-Enabled Framework for Software Provenance,” in Proceedings of the 26th Asia-Pacific Software Engineering Conference, Putrajaya, pp. 1-8, 2019. DOI:10.1109/APSEC48747.2019.00010

[2] Dhulavvagol P., Bhajantri V., and Totad S., “Blockchain Ethereum Clients Performance Analysis Considering E-Voting Application,” Procedia Computer Science, vol. 167, pp. 2506- 2515, 2020.

[3] Dhulavvagol P. and Totad S., “Performance Enhancement of Distributed System Using HDFS Federation and Sharding,” Procedia Computer Science, vol. 218, pp. 2830-2841, 2023. SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain ... 189

[4] Dhulavvagol P., Totad S., and Bhandage N., “Topic Based Partitioning for Selective Search Using Sharding Technique,” in Proceedings of the International Conference for Advancement in Technology, Goa, pp. 1-5, 2022. DOI:10.1109/ICONAT53423.2022.9726020

[5] Hyder M., Siddiqui M., and Mukarram M., “TV Ad Detection Using the Base64 Encoding Technique,” Engineering, Technology and Applied Science Research, vol. 11, no. 5, pp. 7605-7609, 2021.

[6] Kethineni S. and Cao Y., “The Rise in Popularity of Cryptocurrency and Associated Criminal Activity,” International Criminal Justice Review, vol. 30, no. 3, pp. 325-344, 2020.

[7] Kumar S., Bharti A., and Amin R., “Decentralized Secure Storage of Medical Records Using Blockchain and IPFS: A Comparative Analysis with Future Directions,” Security and Privacy, vol. 4, no. 5, pp. 1-16, 2021.

[8] Li M., Lal C., Conti M., and Hu D., “LEChain: A Blockchain-Based Lawful Evidence Management Scheme for Digital Forensics,” Future Generation Computer Systems, vol. 115, pp. 406- 420, 2021.

[9] Li S., Qin T., and Min G., “Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems,” IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1433-1441, 2019. DOI:10.1109/TCSS.2019.2927431

[10] Liu H., Luo X., Liu H., and Xia X., “Merkle Tree: A Fundamental Component of Blockchains,” in Proceedings of the International Conference on Electronic Information Engineering and Computer Science, Changchun, pp. 556-561, 2021. DOI:10.1109/EIECS53707.2021.9588047

[11] Lone A. and Mir R., “Forensic-Chain: Blockchain Based Digital Forensics Chain of Custody with PoC in Hyperledger Composer,” Digital Investigation, vol. 28, pp. 44-55, 2019.

[12] Longo F., Nicoletti L., Padovano A., d’Atri G., and Forte M., “Blockchain-Enabled Supply Chain: An Experimental Study,” Computers and Industrial Engineering, vol. 136, pp. 57-69, 2019.

[13] Malik G., Parasrampuria K., Reddy S., and Shah S., “Blockchain Based Identity Verification Model,” in Proceedings of the International Conference on Vision Towards Emerging Trends in Communication and Networking, Vellore, pp. 1-6, 2019. DOI:10.1109/ViTECoN.2019.8899569

[14] Nieto A., Rios R., and Lopez J., “Digital Witness and Privacy in IoT: Anonymous Witnessing Approach,” in Proceedings of the IEEE Trustcom/BigDataSE/ICESS, Sydney, pp. 642- 649, 2017. DOI:10.1109/Trustcom/BigDataSE/ICESS.2017. 295

[15] Pasdar A., Lee Y., Ryan P., and Dong Z., “A Blockchain Oracle-Based API Service for Verifying Livestock DNA Fingerprinting,” International Conference on Service-Oriented Computing Workshops, Sevilla, pp. 80-91, 2022.

[16] Sammeta N. and Parthiban L., “Blockchain- Based Scalable and Secure EHR Data Sharing Using Proxy Re-Encryption,” The International Arab Journal of Information Technology, vol. 20, no. 5, pp. 702-710, 2023.

[17] Saini H., Dash S., Pani S., Sousa M., and Rocha A., “Blockchain-based Raw Material Shipping with PoC in Hyperledger Composer,” Computer Science and Information Systems, vol. 19, no. 3, pp. 1075-1092, 2022.

[18] Song J., Zhang P., Alkubati M., Bao Y., and Yu G., “Research Advances on Blockchain-as-a- Service: Architectures, Applications and Challenges,” Digital Communications and Networks, vol. 8, no. 4, pp. 466-475, 2022.

[19] Su P. and Su T., “Secure Blockchain-Based Electronic Voting Mechanism,” The International Arab Journal of Information Technology, vol. 20, no. 2, pp. 253-261, 2023. 94.pdf

[20] Tang Y., Xiong J., Becerril-Arreola R., and Iyer L., “Ethics of Blockchain: A Framework of Technology, Applications, Impacts, and Research Directions,” Information Technology and People, vol. 33, no. 2, pp. 602-632, 2020. DOI:10.1108/ITP-10-2018-0491

[21] Tian Z., Li M., Qiu M., Sun Y., and Su S., “Block-DEF: A Secure Digital Evidence Framework Using Blockchain,” Information Sciences, vol. 491, pp. 151-165, 2019.

[22] Yli-Huumo J., Ko D., Choi S., Park S., and Smolander K., “Where is Current Research on Blockchain Technology?-A Systematic Review,” PloS One, vol. 11, no. 10, pp. 1-27, 2016.

[23] Zhang L., Xie Y., Zheng Y., Xue W., Zheng X., and Xu X., “The Challenges and Countermeasures of Blockchain in Finance and Economics,” Systems Research and Behavioral 190 The International Arab Journal of Information Technology, Vol. 21, No. 2, March 2024 Science, vol. 37, no. 4, pp. 691-698, 2020.

[24] Zhang Y., Wu S., Jin B., and Du J., “A Blockchain-Based Process Provenance for Cloud Forensics,” in Proceedings of the 3rd International Conference on Computer and Communications, Chengdu, pp. 2470-2473, 2017. DOI:10.1109/CompComm.2017.8322979