{"id":"https://openalex.org/W4386365665","doi":"https://doi.org/10.18293/seke2023-038","title":"Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S)","display_name":"Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S)","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4386365665","doi":"https://doi.org/10.18293/seke2023-038"},"language":"en","primary_location":{"id":"doi:10.18293/seke2023-038","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-038","pdf_url":"https://doi.org/10.18293/seke2023-038","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2023-038","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092728794","display_name":"Georg Grabner","orcid":null},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Georg Grabner","raw_affiliation_strings":["School of Computing, University of Liverpool, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Liverpool, United Kingdom","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011234134","display_name":"Ali Ahmed","orcid":"https://orcid.org/0000-0002-7370-3044"},"institutions":[{"id":"https://openalex.org/I41156924","display_name":"Victoria University of Wellington","ror":"https://ror.org/0040r6f76","country_code":"NZ","type":"education","lineage":["https://openalex.org/I41156924"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Ali Ahmed","raw_affiliation_strings":["School of Engineering and Computer Science, Victoria University of Wellington, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computer Science, Victoria University of Wellington, New Zealand","institution_ids":["https://openalex.org/I41156924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047525857","display_name":"Nilufar Baghaei","orcid":"https://orcid.org/0000-0003-1776-7075"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]},{"id":"https://openalex.org/I165143802","display_name":"University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nilufar Baghaei","raw_affiliation_strings":["School of Information Technology and Electrical Engineering, University of Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Electrical Engineering, University of Queensland, Australia","institution_ids":["https://openalex.org/I160993911","https://openalex.org/I165143802"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092728794"],"corresponding_institution_ids":["https://openalex.org/I146655781"],"apc_list":null,"apc_paid":null,"fwci":1.8356,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88446441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"2023","issue":null,"first_page":"380","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8899954557418823},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8761304616928101},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.7931056022644043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6507171988487244},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6489631533622742},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6033111810684204},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.541937530040741},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.5179926156997681},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.4378584921360016},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.386584997177124},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3217847943305969},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.14131876826286316},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09242397546768188}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8899954557418823},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8761304616928101},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.7931056022644043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6507171988487244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6489631533622742},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6033111810684204},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.541937530040741},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.5179926156997681},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.4378584921360016},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.386584997177124},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3217847943305969},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14131876826286316},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09242397546768188},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2023-038","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-038","pdf_url":"https://doi.org/10.18293/seke2023-038","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2023-038","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-038","pdf_url":"https://doi.org/10.18293/seke2023-038","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Gender equality","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386365665.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2053321886","https://openalex.org/W2552294609","https://openalex.org/W2588671254","https://openalex.org/W2613746461","https://openalex.org/W2754866430","https://openalex.org/W2789355772","https://openalex.org/W2896851637","https://openalex.org/W2909896785","https://openalex.org/W2914820011","https://openalex.org/W2939152845","https://openalex.org/W2955958518","https://openalex.org/W2979928150","https://openalex.org/W3011153801","https://openalex.org/W3023165753","https://openalex.org/W3032602716","https://openalex.org/W3038376610","https://openalex.org/W3092687042","https://openalex.org/W3129689612","https://openalex.org/W3146114005","https://openalex.org/W3172808660","https://openalex.org/W3184551018","https://openalex.org/W4210534238","https://openalex.org/W4313679285","https://openalex.org/W6729784979","https://openalex.org/W6737702511"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4283205458","https://openalex.org/W4240498326","https://openalex.org/W2480188389","https://openalex.org/W3001565613","https://openalex.org/W3018602826","https://openalex.org/W2904082727","https://openalex.org/W2073008201","https://openalex.org/W4391002340"],"abstract_inverted_index":{"In":[0],"the":[1,6,18,23,35,80,105,113,118,121,149,169,175,178,194],"era":[2],"of":[3,8,38,101,107,115,120,144,151,171,180,188,190,204],"cloud":[4,24,39,81,88,123,152],"computing,":[5],"focus":[7],"cyber":[9],"criminals":[10],"has":[11,85],"shifted":[12],"from":[13],"traditional":[14],"IT":[15],"infrastructures":[16],"to":[17,29,43,62,94,128,135,161,167,199],"cloud.Cyber":[19],"forensic":[20,69,102,110],"investigations":[21],"in":[22,79,141,193],"present":[25],"several":[26],"challenges":[27,150],"due":[28],"legal":[30],"obligations,":[31],"technical":[32],"limitations,":[33],"and":[34,71,76,99,112,159,165],"dynamic":[36],"nature":[37],"resources.For":[40],"instance,":[41],"access":[42,61],"digital":[44,109,130],"assets":[45],"is":[46,52,197],"crucial":[47],"for":[48,73,183],"practical":[49],"analysis":[50],"but":[51],"often":[53],"hindered,":[54],"as":[55,201],"investigators":[56],"may":[57],"not":[58,126],"have":[59],"complete":[60],"disk":[63],"images":[64],"or":[65],"log":[66,95,157,191],"files.The":[67],"mainstream":[68],"frameworks":[70,166],"solutions":[72,164],"identifying,":[74],"retrieving,":[75],"preserving":[77],"evidence":[78,103,131,140],"are":[82,104,125],"lacking.Yet,":[83],"NIST":[84],"identified":[86],"65":[87],"forensics":[89,153],"challenges,":[90],"with":[91,132],"13":[92],"related":[93],"files":[96,192],"alone.The":[97],"preservation":[98],"integrity":[100],"backbones":[106],"a":[108,142,185,202],"investigation,":[111,154],"chain":[114,170,187],"custody":[116,189],"proves":[117],"authenticity":[119],"evidence.However,":[122],"environments":[124],"designed":[127],"handle":[129],"integrity,":[133],"leading":[134],"severe":[136],"issues":[137],"when":[138],"presenting":[139],"court":[143],"law.This":[145],"paper":[146],"delves":[147],"into":[148],"focusing":[155],"on":[156],"files,":[158],"aims":[160],"identify":[162],"potential":[163],"support":[168],"custody.For":[172],"that":[173],"purpose,":[174],"authors":[176],"evaluate":[177],"suitability":[179],"blockchain":[181],"technology":[182],"maintaining":[184],"proper":[186],"cloud.A":[195],"prototype":[196],"implemented":[198],"serve":[200],"proof":[203],"concept.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
