基于比特币网络的轻量级电子证据保存系统
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin
-
摘要: 一个高效且安全的电子证据保存系统需要呈现防丢失,防伪造,防篡改以及可验证的特性,基于第三方云存储的传统方案常常被中心化的安全隐患所困扰,操作透明性与规范性的缺失易引发信任危机,昂贵、低效与不合理的设计更是严重影响了证据保存的公信力。与之相比,去中心化的区块链网络,具备信息防篡改,隐私安全,透明公开,验证方便的特点,是完成电子证据存储的良好环境。再配合潜信道的挖掘与使用,我们可以将数字货币系统中的交易网络转化为证据保存与审计网络。
本文中,我们提出并实现了一个轻量级的电子证据保存框架,其具备匿名安全,审计透明,操作简便与功能可延展的特点。其中,匿名性由密码学方案的设计保证,在数字货币系统上通过哈希函数与潜信道加密方案生成并保存电子证据的密码学证明,避免敏感隐私数据的泄露;系统充分挖掘隐蔽信道,优化了证据保存的成本、互联性以及安全性,将比特币网络充足的算力转化为应用的信用价值;通过成熟区块链不可伪造的时间戳与抗篡改的数据特征生成审计结果的存在性证明以实现审计透明;证据链结构的搭建优化了电子证据的管理效率,使系统具有更强的可拓展性,便于机构间司法合作与监管的进行;细粒度的分层服务设计赋予了系统轻便性与更低的成本。最后,我们给出了完整的系统安全、效率、成本、可行性分析以及具体的软件实现结果,以便于读者尝试并深入理解我们的系统。Abstract: An effective and secure system used for evidence preservation is essential to possess the properties of anti-loss, anti-forgery, anti-tamper as well as perfect verifiability. Traditional architecture which relies on centralized cloud storage is depressingly beset by the security problems such as incomplete confidence and unreliable regulation. Moreover, an expensive, inefficient and incompatible design impedes the effort of evidence preservation. In contrast, the decentralized blockchain network is qualified as a perfect replacement for its secure anonymity, irrevocable commitment and transparent traceability. Combined with subliminal channels in blockchain, we have weaved the transaction network with newly designed evidence audit network. In this paper, we have presented and implemented a lightweight digital evidence-preservation architecture which possesses the features of privacy-anonymity, audit-transparency, function-scalability and operation-lightweight. The anonymity is naturally formed from the cryptographic design, since the cipher evidence under encrypted cryptosystem and hash based functions leakages nothing to the public. Covert channels are efficiently excavated to optimize the cost, connectivity and security of the framework, transforming the great computation power of Bitcoin network to the value of credit. The transparency used for audit, which relates to the proof of existence, comes from instant timestamps and irreversible hash functions in mature blockchain network. The scalability is represented by the evidence chain interacted with the original blockchain, and the extended chains on top of mainchain will cover the most of auditors in different institutions. And the lightweight, which is equal to low-cost, is derived from our fine-grained hierarchical services. At last, analyses of efficiency, security, and availability have shown the complete accomplishment of our system.-
Keywords:
- Blockchain /
- Covert channel /
- Data auditing /
- Digital evidence
-
-
[1] Gipp B, Meuschke N, Gernandt A. Decentralized trusted timestamping using the crypto-currency bitcoin. arXiv:1502.04015, https://arxiv.org/abs/1502.04015, Mar. 2018.
[2] Lampson B W. A note on the confinement problem. Communications of the ACM, 1973, 16(10):613-615.
[3] Snow P, Deery B, Lu J, Johnston D, Kirby P. Factom:Business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, 2014. https://raw.githubusercontent.com/FactomProject/FactomDocs/master/FactomWhitepaper.pdf, Mar. 2018.
[4] Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timon J, Wuille P. Enabling blockchain innovations with pegged sidechains. https://www.blockstream.com/sidechains.pdf, Mar. 2018.
[5] Casey E. Digital Evidence and Computer Crime. Elsevier Academic Press, 2004.
[6] Dinev T, McConnell A R, Smith H J. Research commentary:Informing privacy research through information systems, psychology, and behavioral economics:Thinking outside the "APCO" box. Information Systems Research, 2015, 26(4):639-655.
[7] Adams R. The advanced data acquisition model (ADAM):A process model for digital forensic practice. Journal of Digital Forensics, Security & Law, 2013, 8(4):25-48.
[8] Dan A, Iyengar A K, Kumar M. System and method for providing trusted services via trusted server agents:US Patent 6823456, 2004. http://www.freepatentsonline.com/6823456.html, Mar. 2018.
[9] Stein B. Fuzzy-fingerprints for text-based information retrieval. In Proc. the 5th Int. Conf. Knowledge Management, Oct. 2005, pp.572-579.
[10] Nakamoto S. Bitcoin:A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf, Mar. 2018.
[11] Lemieux V L. Trusting records:Is blockchain technology the answer? Records Management Journal, 2016, 26(2):110-139.
[12] Simmons G J. The prisoners' problem and the subliminal channel. In Advances in Cryptology, Chaum D (ed.), Springer, 1984, pp.51-67.
[13] Chapman M, Davida G. Hiding the hidden:A software system for concealing ciphertext as innocuous text. In Proc. the 1st Int. Conf. Information and Communications Security, November 1997, pp.335-345.
[14] Bellare M, Paterson K G, Rogaway P. Security of symmetric encryption against mass surveillance. In Proc. the 34th Int. Cryptology Conf., August 2014.
[15] Kilroy Jr R J. No place to hide:Edward Snowden, the NSA, and the U.S. surveillance state. Journal of Systems and Software, 2016, 9(3):99-102.
[16] Song H, Dharmapurikar S, Turner J, Lockwood J. Fast hash table lookup using extended bloom filter:An aid to network processing. ACM SIGCOMM Computer Communication Review, 2005, 35(4):181-192.
[17] Biryukov A, Dinu D, Khovratovich D. Argon2:The memory-hard function for password hashing and other applications. 2015. https://password-hashing.net/argon2-specs.pdf, Mar. 2018.
[18] Poon J, Dryja T. The bitcoin lightning network:Scalable off-chain instant payments. Technical Report (DRAFT), Draft Version O.5.9.2, 2015. http://lightning.network/lightning-network-paper.pdf, Mar. 2018.
[19] Haber S, Stornetta W S. How to time-stamp a digital document. In Proc. Conf. Theory and Appl. Cryptography, May 1990, pp.437-455.
[20] Gipp B, Kosti J, Breitinger C. Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain. In Proc. the 10th Mediterranean Conf. Information Systems (MCIS), September 2016.
[21] García-Recuero A, Burdges J, Grothoff C. Privacypreserving abuse detection in future decentralised online social networks. In Proc. the 11th Int. Workshop on Data Privacy Management, September 2016, pp.78-93.
[22] Conoscenti M, Vetro A, de Martin J C. Blockchain for the Internet of Things:A systematic literature review. In Proc. the 13th Int. Conf. Computer Systems and Appl. (AICCSA), November 2016.
[23] Pedro Crespo A S, Garcia L I C. Stampery blockchain timestamping architecture (BTA). 2016. https://s3.amazonaws.com/stampery-cdn/docs/StamperyBTA-v6-whitepaper.pdf, Mar. 2018.
[24] Hegadekatti K. Legal systems and blockchain interactions. 2017. https://papers.ssrn.com/sol3/papers.cfm?abstractid=2893128, Mar. 2018.
-
其他相关附件
-
本文英文pdf
2018-3-14-8217-Highlights 点击下载(461KB)
-
计量
- 文章访问数: 55
- HTML全文浏览量: 0
- PDF下载量: 1224