? Lightweight and Manageable Digital Evidence Preservation System on Bitcoin
Journal of Computer Science and Technology
Quick Search in JCST
 Advanced Search 
      Home | PrePrint | SiteMap | Contact Us | FAQ
 
Indexed by   SCIE, EI ...
Bimonthly    Since 1986
Journal of Computer Science and Technology 2018, Vol. 33 Issue (3) :568-586    DOI: 10.1007/s11390-018-1841-4
Special Section on Blockchain and Cryptocurrency Systems Current Issue | Archive | Adv Search << Previous Articles | Next Articles >>
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin
Mingming Wang1, Qianhong Wu1, Member, CCF, ACM, IEEE, Bo Qin2, Qin Wang1 Jianwei Liu1, Member, CCF, IEEE, Zhenyu Guan1,*, Member, IEEE
1 School of Electronic and Information Engineering, Beihang University, Beijing 100191, China;
2 School of Information, Renmin University of China, Beijing 100872, China

Abstract
Reference
Related Articles
Download: [PDF 2425KB]     Export: BibTeX or EndNote (RIS)  
Abstract An effective and secure system used for evidence preservation is essential to possess the properties of anti-loss, anti-forgery, anti-tamper as well as perfect verifiability. Traditional architecture which relies on centralized cloud storage is depressingly beset by the security problems such as incomplete confidence and unreliable regulation. Moreover, an expensive, inefficient and incompatible design impedes the effort of evidence preservation. In contrast, the decentralized blockchain network is qualified as a perfect replacement for its secure anonymity, irrevocable commitment and transparent traceability. Combined with subliminal channels in blockchain, we have weaved the transaction network with newly designed evidence audit network. In this paper, we have presented and implemented a lightweight digital evidence-preservation architecture which possesses the features of privacy-anonymity, audit-transparency, function-scalability and operation-lightweight. The anonymity is naturally formed from the cryptographic design, since the cipher evidence under encrypted cryptosystem and hash based functions leakages nothing to the public. Covert channels are efficiently excavated to optimize the cost, connectivity and security of the framework, transforming the great computation power of Bitcoin network to the value of credit. The transparency used for audit, which relates to the proof of existence, comes from instant timestamps and irreversible hash functions in mature blockchain network. The scalability is represented by the evidence chain interacted with the original blockchain, and the extended chains on top of mainchain will cover the most of auditors in different institutions. And the lightweight, which is equal to low-cost, is derived from our fine-grained hierarchical services. At last, analyses of efficiency, security, and availability have shown the complete accomplishment of our system.
Articles by authors
KeywordsBlockchain   Covert channel   Data auditing   Digital evidence     
Received 2017-11-20;
Fund:

This work is supported by the National Key Research and Development Program of China under Grant No. 2017YFB0802500, the National Natural Science Foundation of China under Grant Nos. 61772538, 61672083, 61370190, 61532021, 61472429, and 61402029, and the National Cryptography Development Fund of China under Grant No. MMJJ20170106.

Corresponding Authors: Zhenyu Guan     Email: guanzhenyu@buaa.edu.cn
About author: Mingming Wang received his Bachelor of Engineering degree in electrical engineering from Beihang University, Beijing, in 2017. He is now pursuing his Ph.D. degree in information and communication engineering in Beihang University, Beijing. His research interests include blockchain, classic cryptography and game theory.
Cite this article:   
Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang, Jianwei Liu, Zhenyu Guan.Lightweight and Manageable Digital Evidence Preservation System on Bitcoin[J]  Journal of Computer Science and Technology, 2018,V33(3): 568-586
URL:  
http://jcst.ict.ac.cn:8080/jcst/EN/10.1007/s11390-018-1841-4
Copyright 2010 by Journal of Computer Science and Technology