[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2023 - Google Patents

Anonymous, secure, traceable, and efficient decentralized digital forensics

Li et al., 2023

Document ID
11015288293317039849
Author
Li M
Shen Y
Ye G
He J
Zheng X
Zhang Z
Zhu L
Conti M
Publication year
Publication venue
IEEE Transactions on Knowledge and Data Engineering

External Links

Snippet

Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Li et al. LEChain: A blockchain-based lawful evidence management scheme for digital forensics
Zhang et al. An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things
Wang et al. Blockchain-based personal health records sharing scheme with data integrity verifiable
Li et al. Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage
Li et al. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
Shao et al. Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment
Xie et al. Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency
Yan et al. Integrity audit of shared cloud data with identity tracking
Li et al. Anonymous, secure, traceable, and efficient decentralized digital forensics
Accorsi Log data as digital evidence: What secure logging protocols have to offer?
Zhao et al. Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism
Li et al. A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data
CN112134864A (en) Evidence chain platform based on double-block chain structure and implementation method thereof
Xu et al. Trustworthy and transparent third-party authority
CN114021164A (en) Block chain-based credit investigation system privacy protection method
CN112804050A (en) Multi-source data query system and method
He et al. An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage
Zhou et al. Privacy protection scheme for the Internet of Vehicles based on collaborative services
JP2023098847A (en) Apparatus, method and computer program (selective audit process for privacy-preserving blockchain)
Jiang et al. A Distributed Internet of Vehicles Data Privacy Protection Method Based on Zero-knowledge Proof and Blockchain
Arun et al. Mutual authentication and authorized data access between fog and user based on blockchain technology
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
Li et al. Blockchain‐Based Fine‐Grained Data Sharing for Multiple Groups in Internet of Things
Lyu et al. NSSIA: A New Self‐Sovereign Identity Scheme with Accountability