AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
Article Link
Collect
Submit Manuscript
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Regular Paper

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin

School of Electronic and Information Engineering, Beihang University, Beijing 100191, China
School of Information, Renmin University of China, Beijing 100872, China
Show Author Information

Abstract

An effective and secure system used for evidence preservation is essential to possess the properties of anti-loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on centralized cloud storage is depressingly beset by the security problems such as incomplete confidence and unreliable regulation. Moreover, an expensive, inefficient and incompatible design impedes the effort of evidence preservation. In contrast, the decentralized blockchain network is qualified as a perfect replacement for its secure anonymity, irrevocable commitment, and transparent traceability. Combining with subliminal channels in blockchain, we have weaved the transaction network with newly designed evidence audit network. In this paper, we have presented and implemented a lightweight digital evidence-preservation architecture which possesses the features of privacy-anonymity, audit-transparency, function-scalability and operation-lightweight. The anonymity is naturally formed from the cryptographic design, since the cipher evidence under encrypted cryptosystem and hash-based functions leakages nothing to the public. Covert channels are efficiently excavated to optimize the cost, connectivity and security of the framework, transforming the great computation power of Bitcoin network to the value of credit. The transparency used for audit, which relates to the proof of existence, comes from instant timestamps and irreversible hash functions in mature blockchain network. The scalability is represented by the evidence chain interacted with the original blockchain, and the extended chains on top of mainchain will cover the most of auditors in different institutions. And the lightweight, which is equal to low-cost, is derived from our fine-grained hierarchical services. At last, analyses of efficiency, security, and availability have shown the complete accomplishment of our system.

Electronic Supplementary Material

Download File(s)
jcst-33-3-568-Highlights.pdf (461.8 KB)

References

[1]
Gipp B, Meuschke N, Gernandt A. Decentralized trusted timestamping using the crypto-currency bitcoin. arXiv: 1502.04015, https://arxiv.org/abs/1502.04015, Mar. 2018.
[2]

Lampson B W. A note on the confinement problem. Communications of the ACM, 1973, 16(10): 613-615.

[3]
Snow P, Deery B, Lu J, Johnston D, Kirby P. Factom: Business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, 2014. https://raw.githubusercontent.com/FactomProject/FactomDocs/master/Factom_Whitepaper.pdf, Mar. 2018.
[4]
Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timon J, Wuille P. Enabling blockchain innovations with pegged sidechains. https://www.blockstream.com/sidechains.pdf, Mar. 2018.
[5]

Casey E. Digital Evidence and Computer Crime. Elsevier Academic Press, 2004.

[6]

Dinev T, McConnell A R, Smith H J. Research commentary: Informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the “APCO” box. Information Systems Research, 2015, 26(4): 639-655.

[7]

Adams R. The advanced data acquisition model (ADAM): A process model for digital forensic practice. Journal of Digital Forensics, Security & Law, 2013, 8(4): 25-48.

[8]
Dan A, Iyengar A K, Kumar M. System and method for providing trusted services via trusted server agents: US Patent 6823456, 2004. http://www.freepatentsonline.com/6823456.html, Mar. 2018.
[9]
Stein B. Fuzzy-fingerprints for text-based information retrieval. In Proc. the 5th Int. Conf. Knowledge Management, Oct. 2005, pp.572-579.
[10]
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf, Mar. 2018.
[11]
Lemieux V L. Trusting records: Is blockchain technology the answer? Records Management Journal, 2016, 26(2): 110-139.
[12]
Simmons G J. The prisoners’ problem and the subliminal channel. In Advances in Cryptology, Chaum D (ed.), Springer, 1984, pp.51-67.
[13]
Chapman M, Davida G. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Proc. the 1st Int. Conf. Information and Communications Security, November 1997, pp.335-345.
[14]
Bellare M, Paterson K G, Rogaway P. Security of symmetric encryption against mass surveillance. In Proc. the 34th Int. Cryptology Conf., August 2014.
[15]

Kilroy Jr R J. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Journal of Systems and Software, 2016, 9(3): 99-102.

[16]

Song H, Dharmapurikar S, Turner J, Lockwood J. Fast hash table lookup using extended bloom filter: An aid to network processing. ACM SIGCOMM Computer Communication Review, 2005, 35(4): 181-192.

[17]
Biryukov A, Dinu D, Khovratovich D. Argon2: The memory-hard function for password hashing and other applications. 2015. https://password-hashing.net/argon2-specs.pdf, Mar. 2018.
[18]
Poon J, Dryja T. The bitcoin lightning network: Scalable off-chain instant payments. Technical Report (DRAFT), Draft Version O.5.9.2, 2015. http://lightning.network/lightning-network-paper.pdf, Mar. 2018.
[19]
Haber S, Stornetta W S. How to time-stamp a digital document. In Proc. Conf. Theory and Appl. Cryptography, May 1990, pp.437-455.
[20]
Gipp B, Kosti J, Breitinger C. Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain. In Proc. the 10th Mediterranean Conf. Information Systems (MCIS), September 2016.
[21]
García-Recuero A, Burdges J, Grothoff C. Privacy-preserving abuse detection in future decentralised online social networks. In Proc. the 11th Int. Workshop on Data Privacy Management, September 2016, pp.78-93.
[22]
Conoscenti M, Vetro A, de Martin J C. Blockchain for the Internet of Things: A systematic literature review. In Proc. the 13th Int. Conf. Computer Systems and Appl. (AICCSA), November 2016.
[23]
Pedro Crespo A S, Garcia L I C. Stampery blockchain timestamping architecture (BTA). 2016. https://s3.amazonaws.com/stampery-cdn/docs/Stampery-BTA-v6-whitepaper.pdf, Mar. 2018.
[24]
Hegadekatti K. Legal systems and blockchain interactions. 2017. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2893128, Mar. 2018.
Journal of Computer Science and Technology
Pages 568-586
Cite this article:
Wang M, Wu Q, Qin B, et al. Lightweight and Manageable Digital Evidence Preservation System on Bitcoin. Journal of Computer Science and Technology, 2018, 33(3): 568-586. https://doi.org/10.1007/s11390-018-1841-4

420

Views

14

Crossref

N/A

Web of Science

16

Scopus

2

CSCD

Altmetrics

Received: 20 November 2017
Revised: 26 March 2018
Published: 11 May 2018
©2018 LLC & Science Press, China
Return