{"id":"https://openalex.org/W2979928150","doi":"https://doi.org/10.1109/access.2019.2946978","title":"Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology","display_name":"Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2979928150","doi":"https://doi.org/10.1109/access.2019.2946978","mag":"2979928150"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2946978","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946978","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08865056.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08865056.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009683602","display_name":"Mehran Pourvahab","orcid":"https://orcid.org/0000-0002-0034-5506"},"institutions":[{"id":"https://openalex.org/I4210098966","display_name":"Islamic Azad University Rasht Branch","ror":"https://ror.org/0151gh112","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210098966"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mehran Pourvahab","raw_affiliation_strings":["Department of Computer Engineering, Islamic Azad University, Rasht Branch, Rasht, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Islamic Azad University, Rasht Branch, Rasht, Iran","institution_ids":["https://openalex.org/I4210098966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102933327","display_name":"Gholamhossein Ekbatanifard","orcid":"https://orcid.org/0000-0003-3216-0511"},"institutions":[{"id":"https://openalex.org/I33162209","display_name":"Islamic Azad University, Lahijan Branch","ror":"https://ror.org/03dhqyc75","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I33162209"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Gholamhossein Ekbatanifard","raw_affiliation_strings":["Department of Computer Engineering, Islamic Azad University, Lahijan Branch, Lahijan, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Islamic Azad University, Lahijan Branch, Lahijan, Iran","institution_ids":["https://openalex.org/I33162209"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009683602"],"corresponding_institution_ids":["https://openalex.org/I4210098966"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":11.6116,"has_fulltext":true,"cited_by_count":98,"citation_normalized_percentile":{"value":0.98447832,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"153349","last_page":"153364"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8423197269439697},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7307698726654053},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.5585572123527527},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5037025809288025},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44440653920173645},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42768171429634094},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.42580854892730713},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.41334858536720276},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4046694040298462},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.38421177864074707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3528694212436676},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2645828425884247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8423197269439697},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7307698726654053},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.5585572123527527},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5037025809288025},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44440653920173645},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42768171429634094},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.42580854892730713},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.41334858536720276},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4046694040298462},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.38421177864074707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3528694212436676},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2645828425884247}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2946978","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946978","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08865056.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:27286d9c3893461097d08ca67a16ee1c","is_oa":true,"landing_page_url":"https://doaj.org/article/27286d9c3893461097d08ca67a16ee1c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 153349-153364 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2946978","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946978","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08865056.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321389","display_name":"Islamic Azad University","ror":"https://ror.org/01kzn7k21"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2979928150.pdf","grobid_xml":"https://content.openalex.org/works/W2979928150.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1757283378","https://openalex.org/W2295582926","https://openalex.org/W2303474472","https://openalex.org/W2312132523","https://openalex.org/W2320673198","https://openalex.org/W2334526175","https://openalex.org/W2392113277","https://openalex.org/W2464746074","https://openalex.org/W2471983163","https://openalex.org/W2509722768","https://openalex.org/W2560435225","https://openalex.org/W2566300182","https://openalex.org/W2588671254","https://openalex.org/W2603921131","https://openalex.org/W2606002995","https://openalex.org/W2730380569","https://openalex.org/W2736904962","https://openalex.org/W2737090316","https://openalex.org/W2751455334","https://openalex.org/W2757817063","https://openalex.org/W2767611235","https://openalex.org/W2772334662","https://openalex.org/W2786393483","https://openalex.org/W2791289577","https://openalex.org/W2792263947","https://openalex.org/W2794111571","https://openalex.org/W2796107629","https://openalex.org/W2800372734","https://openalex.org/W2800834006","https://openalex.org/W2803007868","https://openalex.org/W2808656692","https://openalex.org/W2854620367","https://openalex.org/W2886455101","https://openalex.org/W2888919782","https://openalex.org/W2889226801","https://openalex.org/W2898512357","https://openalex.org/W2913510281","https://openalex.org/W2917351259","https://openalex.org/W2921088707","https://openalex.org/W2931728404","https://openalex.org/W2932294007","https://openalex.org/W2944939010","https://openalex.org/W2945437340","https://openalex.org/W2946701076","https://openalex.org/W2963129815","https://openalex.org/W2964142276","https://openalex.org/W2964308808","https://openalex.org/W6750411715"],"related_works":["https://openalex.org/W2157568185","https://openalex.org/W4387259453","https://openalex.org/W1674074891","https://openalex.org/W2952942094","https://openalex.org/W2982222368","https://openalex.org/W53898159","https://openalex.org/W2145932317","https://openalex.org/W4387713327","https://openalex.org/W2293640807","https://openalex.org/W4210289650"],"abstract_inverted_index":{"Cloud":[0],"forensics":[1,8],"is":[2,57,65,84,128,139,150,161,187],"an":[3,204],"intelligent":[4],"evolution":[5],"of":[6,22,148,193,207],"digital":[7,23,35],"that":[9,64,222],"defends":[10],"against":[11],"cyber-crimes.":[12],"However,":[13],"centralized":[14],"evidence":[15,56,185],"collection":[16],"and":[17,43,59,112,145,211,213,250],"preservation":[18],"minimizes":[19],"the":[20,55,62,72,88,109,115,135,142,146,157,198],"reliability":[21],"evidence.":[24],"To":[25,70,86],"resolve":[26],"this":[27,30,51],"severe":[28],"problem,":[29],"paper":[31],"proposes":[32],"a":[33,137],"novel":[34],"forensic":[36,53,224],"architecture":[37,225],"using":[38,97,164],"fast-growing":[39],"Software-Defined":[40],"Networking":[41],"(SDN)":[42],"Blockchain":[44],"technology":[45],"for":[46],"Infrastructure-as-a-Service":[47],"(IaaS)":[48],"cloud.":[49],"In":[50,154],"proposed":[52,223],"architecture,":[54],"collected":[58,196],"preserved":[60],"in":[61,114,134,141,203,229],"blockchain":[63],"distributed":[66],"among":[67],"multiple":[68],"peers.":[69],"protect":[71],"system":[73,170],"from":[74,197],"unauthorized":[75],"users,":[76],"Secure":[77,165],"Ring":[78],"Verification":[79],"based":[80,107,180],"Authentication":[81],"(SRVA)":[82],"scheme":[83],"proposed.":[85],"strengthen":[87],"cloud":[89,116,210],"environment,":[90],"secret":[91],"keys":[92],"are":[93,105,201],"generated":[94],"optimally":[95],"by":[96,163,177,189],"Harmony":[98],"Search":[99],"Optimization":[100],"(HSO)":[101],"algorithm.":[102],"All":[103],"data":[104,132,149,176],"encrypted":[106],"on":[108],"sensitivity":[110],"level":[111],"stored":[113,133],"server.":[117],"For":[118,130],"encryption,":[119],"Sensitivity":[120],"Aware":[121],"Deep":[122],"Elliptic":[123],"Curve":[124],"Cryptography":[125],"(SA-DECC)":[126],"algorithm":[127],"presented.":[129],"every":[131],"cloud,":[136],"block":[138],"created":[140],"SDN":[143],"controller":[144],"history":[147],"recorded":[151],"as":[152],"metadata.":[153],"each":[155],"block,":[156],"Merkle":[158],"hash":[159],"tree":[160],"built":[162],"Hashing":[166],"Algorithm-3":[167],"(SHA-3).":[168],"Our":[169],"allows":[171],"users":[172],"to":[173],"trace":[174],"their":[175],"deploying":[178],"Fuzzy":[179],"Smart":[181],"Contracts":[182],"(FCS).":[183],"Finally,":[184],"analysis":[186,220],"enabled":[188],"constructing":[190],"Logical":[191],"Graph":[192],"Evidence":[194,232,235],"(LGoE)":[195],"blockchain.":[199],"Experiments":[200],"conducted":[202],"integrated":[205],"environment":[206],"java":[208],"(for":[209,216],"blockchain)":[212],"network":[214],"simulator-3.26":[215],"SDN).":[217],"The":[218],"extensive":[219],"shows":[221,226],"promising":[227],"results":[228],"Response":[230],"time,":[231,234,237,242,245,247],"insertion":[233],"verification":[236],"Communication":[238],"overhead,":[239],"Hash":[240],"computation":[241],"Key":[243],"generation":[244],"Encryption":[246],"Decryption":[248],"time":[249],"total":[251],"change":[252],"rate.":[253]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
