Li et al., 2023 - Google Patents
Anonymous, secure, traceable, and efficient decentralized digital forensicsLi et al., 2023
- Document ID
- 11015288293317039849
- Author
- Li M
- Shen Y
- Ye G
- He J
- Zheng X
- Zhang Z
- Zhu L
- Conti M
- Publication year
- Publication venue
- IEEE Transactions on Knowledge and Data Engineering
External Links
Snippet
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | LEChain: A blockchain-based lawful evidence management scheme for digital forensics | |
Zhang et al. | An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things | |
Wang et al. | Blockchain-based personal health records sharing scheme with data integrity verifiable | |
Li et al. | Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage | |
Li et al. | Eunomia: Anonymous and secure vehicular digital forensics based on blockchain | |
Shao et al. | Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment | |
Xie et al. | Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
Li et al. | Anonymous, secure, traceable, and efficient decentralized digital forensics | |
Accorsi | Log data as digital evidence: What secure logging protocols have to offer? | |
Zhao et al. | Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism | |
Li et al. | A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data | |
CN112134864A (en) | Evidence chain platform based on double-block chain structure and implementation method thereof | |
Xu et al. | Trustworthy and transparent third-party authority | |
CN114021164A (en) | Block chain-based credit investigation system privacy protection method | |
CN112804050A (en) | Multi-source data query system and method | |
He et al. | An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage | |
Zhou et al. | Privacy protection scheme for the Internet of Vehicles based on collaborative services | |
JP2023098847A (en) | Apparatus, method and computer program (selective audit process for privacy-preserving blockchain) | |
Jiang et al. | A Distributed Internet of Vehicles Data Privacy Protection Method Based on Zero-knowledge Proof and Blockchain | |
Arun et al. | Mutual authentication and authorized data access between fog and user based on blockchain technology | |
Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
CN117454442A (en) | Anonymous security and traceable distributed digital evidence obtaining method and system | |
Li et al. | Blockchain‐Based Fine‐Grained Data Sharing for Multiple Groups in Internet of Things | |
Lyu et al. | NSSIA: A New Self‐Sovereign Identity Scheme with Accountability |