Rajasekar et al., 2023 - Google Patents
Blackchain-based Identity Management Systems in Digital ForensicsRajasekar et al., 2023
- Document ID
- 4034825814293417467
- Author
- Rajasekar V
- Sathya K
- Velliangiri S
- Karthikeyan P
- Publication year
- Publication venue
- Artificial Intelligence and Blockchain in Digital Forensics
External Links
Snippet
The collection, storage, and analysis of big data has become an enormously crucial solution for addressing cybercrime and establishing legal cases since improvements in information advancing technologies during the last two decades. In our interconnected, digitalized …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pourvahab et al. | Digital forensics architecture for evidence collection and provenance preservation in iaas cloud environment using sdn and blockchain technology | |
AU2020414467B2 (en) | Partially-ordered blockchain | |
US11323269B2 (en) | Preserving privacy of linked cross-network transactions | |
Alblooshi et al. | Blockchain-based ownership management for medical IoT (MIoT) devices | |
CN110462621A (en) | Sensitive data element is managed in block chain network | |
Rana et al. | Decentralized model to protect digital evidence via smart contracts using layer 2 polygon blockchain | |
DE112021002053T5 (en) | Noisy transaction to protect data | |
Tsai | The application of blockchain of custody in criminal investigation process | |
Tsai et al. | Blockchain as a platform for secure cloud computing services | |
JP2024509666A (en) | Blockchain data segregation | |
Malomo et al. | Security through block vault in a blockchain enabled federated cloud framework | |
Jeong et al. | Design and implementation of a digital evidence management model based on hyperledger fabric | |
Mishra et al. | Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework | |
Whyte et al. | Use of Blockchain Technology in Data Integrity Assurance | |
Akbarfam et al. | Dlacb: Deep learning based access control using blockchain | |
Ottakath et al. | Enhanced computer vision applications with blockchain: A review of applications and opportunities | |
Rajasekar et al. | Blackchain-based Identity Management Systems in Digital Forensics | |
Sisodiya et al. | A comprehensive study of Blockchain and its various Applications | |
Shekar et al. | Securing personal identity using blockchain | |
Alromaihi et al. | Literature Review of Blockchain-based Cloud Computing: Data Security Issues and Challenges | |
Lekshmi et al. | Data auditing in cloud storage using smart contract | |
Kumar et al. | Blockchain use cases in big data | |
Shaikh | Blockchain Based Cloud Storage of Patients Health Records | |
Rashid et al. | Utilizing Blockchain and Distributed Storage to Enhance Security and Privacy in the IoT Ecosystem | |
Anitha et al. | Experimental Evaluation of Secured Forensic Evidence Handling Scheme using Blockchain Technology |