Research Article
Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment
@ARTICLE{10.4108/eai.3-6-2022.174089, author={Muhammad Shoaib Akhtar and Tao Feng}, title={Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment}, journal={EAI Endorsed Transactions on Creative Technologies}, volume={9}, number={31}, publisher={EAI}, journal_a={CT}, year={2022}, month={6}, keywords={Blockchain, IoT Forensics, DDOS, Machine Learning}, doi={10.4108/eai.3-6-2022.174089} }
- Muhammad Shoaib Akhtar
Tao Feng
Year: 2022
Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment
CT
EAI
DOI: 10.4108/eai.3-6-2022.174089
Abstract
Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations. With digital forensics, you can find out what data was taken and how it was copied or spread. Some hackers purposefully destroy data to harm their targets. In other cases, malicious software or hacker involvement can accidentally corrupt vital data. Digital forensics faces challenges of security and integrity. IoT devices can collect digital forensic evidence in an IoT setting, putting cybercrime agencies at danger owing to security and integrity. Many studies have been done recently to improve IoT based digital forensics integrity and security, but researchers face the risk of confidentiality. Recent research shows that digital forensics still faces manipulation and security issues. So a clever and effective approach is needed that not only protects security and integrity but also anticipates threats. So we propose an intelligent and effective solution based on Blockchain and Hashing algorithms. We will store the data collected from IoT devices into Blockchain. Anomalies in the evidence and transactions will be predicted using Machine Learning boosted models. So the proposed model works well because it can predict attacks early on.
Copyright © 2022 Muhammad Shoaib Akhtar et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.