Nothing Special   »   [go: up one dir, main page]

Rajasekar et al., 2023 - Google Patents

Blackchain-based Identity Management Systems in Digital Forensics

Rajasekar et al., 2023

Document ID
4034825814293417467
Author
Rajasekar V
Sathya K
Velliangiri S
Karthikeyan P
Publication year
Publication venue
Artificial Intelligence and Blockchain in Digital Forensics

External Links

Snippet

The collection, storage, and analysis of big data has become an enormously crucial solution for addressing cybercrime and establishing legal cases since improvements in information advancing technologies during the last two decades. In our interconnected, digitalized …
Continue reading at api.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Pourvahab et al. Digital forensics architecture for evidence collection and provenance preservation in iaas cloud environment using sdn and blockchain technology
AU2020414467B2 (en) Partially-ordered blockchain
US11323269B2 (en) Preserving privacy of linked cross-network transactions
Alblooshi et al. Blockchain-based ownership management for medical IoT (MIoT) devices
CN110462621A (en) Sensitive data element is managed in block chain network
Rana et al. Decentralized model to protect digital evidence via smart contracts using layer 2 polygon blockchain
DE112021002053T5 (en) Noisy transaction to protect data
Tsai The application of blockchain of custody in criminal investigation process
Tsai et al. Blockchain as a platform for secure cloud computing services
JP2024509666A (en) Blockchain data segregation
Malomo et al. Security through block vault in a blockchain enabled federated cloud framework
Jeong et al. Design and implementation of a digital evidence management model based on hyperledger fabric
Mishra et al. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework
Whyte et al. Use of Blockchain Technology in Data Integrity Assurance
Akbarfam et al. Dlacb: Deep learning based access control using blockchain
Ottakath et al. Enhanced computer vision applications with blockchain: A review of applications and opportunities
Rajasekar et al. Blackchain-based Identity Management Systems in Digital Forensics
Sisodiya et al. A comprehensive study of Blockchain and its various Applications
Shekar et al. Securing personal identity using blockchain
Alromaihi et al. Literature Review of Blockchain-based Cloud Computing: Data Security Issues and Challenges
Lekshmi et al. Data auditing in cloud storage using smart contract
Kumar et al. Blockchain use cases in big data
Shaikh Blockchain Based Cloud Storage of Patients Health Records
Rashid et al. Utilizing Blockchain and Distributed Storage to Enhance Security and Privacy in the IoT Ecosystem
Anitha et al. Experimental Evaluation of Secured Forensic Evidence Handling Scheme using Blockchain Technology