A systematic review on blockchain-based access control systems in cloud environment

A Punia, P Gulia, NS Gill, E Ibeke, C Iwendi… - Journal of Cloud …, 2024 - Springer
The widespread adoption of cloud computing has dramatically altered how data is stored,
processed, and accessed in an era. The rapid development of digital technologies …

Ensuring accountability in digital forensics with proxy re-encryption based chain of custody

RY Patil, YH Patil, A Bannore, M Ranjanikar - International Journal of …, 2024 - Springer
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence

BI Onyeashie, P Leimich, S McKeown… - … Conference on Big Data …, 2023 - Springer
The effective management of digital evidence is critical to modern forensic investigations.
However, traditional evidence management approaches are often prone to security and …

Proactive cyber defense through a comprehensive forensic layer for cybercrime attribution

RY Patil, YH Patil, H Despande, A Bannore - International Journal of …, 2024 - Springer
The extension of digital competences in the ever-changing world of technology has
transported global organizations new opportunities like never before. But this expansion has …

[PDF][PDF] Anonymity in decentralized apps: Study of implications for cybercrime investigations

A Chetry, U Sharma - … Journal of Experimental Research and Review, 2023 - academia.edu
In the digital age, cybercrime facilitated by anonymous communication apps raises
significant concerns. Criminals exploit the anonymity provided by these apps, creating …

Cybercrime investigation model

A Chechulin, M Gorda - 2024 16th International Conference on …, 2024 - ieeexplore.ieee.org
The rise of cybercrime is a daily challenge for individuals, organizations, and governments,
especially when resources are scarce and cyberattacks are becoming more complex. These …

Performance analysis of extracting object structure from source code

R Wojszczyk, A Hapka, T Królikowski - Procedia Computer Science, 2023 - Elsevier
Tools for programmers are constantly evolving, and with that evolution comes tools that
support their work, such as those that enable testing and analysis of program code. It is …

On the Application of Privacy Computing in the Field of National Cyberspace Security

Y Zhou, J Ye, Z Zhang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Privacy computing technology means the collection of technologies that realize data
analysis and calculation under the premise of protecting the data itself from external …

An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case

BI Onyeashie, P Leimich, S McKeown… - … Conference on Big Data …, 2023 - Springer
This paper presents a decentralised framework for sharing and managing evidence that
uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The …

An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption

M Saradha, B Keerthivasan… - 2024 International …, 2024 - ieeexplore.ieee.org
The development of Internet of Things (IoT) devices has resulted in exponential data
generation, creating substantial problems to guaranteeing the security and privacy of …