scholarly journals A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Gongzheng Liu ◽  
Jingsha He ◽  
Xinggang Xuan

Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper presents a data preservation model based on blockchain and multidimensional hash. With the decentralization and smart contract characteristics of blockchain, data can be automatically preserved without human participation to form a branch chain of custody in the unit of case, and blockchain has good antiattack performance, which is the so-called 51% attack. Meanwhile, in order to solve the problem of data confusion and hard to query caused by the excessive number of cases, hash, cryptography, and timestamps are used to form a serialized main chain of custody. Because of the confliction problem of hash and judicial trial needs to absolutely guarantee the authenticity and validity of data, multidimensional hash is used to replace regular hash. In this way, the data preservation becomes an automatic, nonhuman-interventional process. Experiments have been carried out to show the security and effectiveness of the proposed model.

2020 ◽  
Vol 26 (3) ◽  
pp. 266-274
Author(s):  
Uttam Kumar Khedlekar ◽  
Priyanka Singh ◽  
Neelesh Gupta

This paper aims to develop a dynamic pricing policy for deteriorating items with price and stock dependent demand. In declining market demand of items decreases with respect to time and also after a duration items get outdated. In this situation it needs a pricing policy to sale the items before end season. The proposed dynamic pricing policy is applicable for a limited period to clease the stock. Policy decision regarding the selling price could aggressively attracts the costumers. Objectives are to maximize the prot/revenue, pricing strategy and economic order level for such a stock dependent and price sensitive items. We are giving numerical example and simulation to illustrate the proposed model.


2019 ◽  
Vol 27 (2) ◽  
pp. 273-291 ◽  
Author(s):  
Nikolaos Serketzis ◽  
Vasilios Katos ◽  
Christos Ilioudis ◽  
Dimitrios Baltatzis ◽  
George J. Pangalos

PurposeThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.Design/methodology/approachThis paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.FindingsWhile threat intelligence exchange steadily becomes a common practice for the prevention or detection of security incidents, the proposed approach highlights its usefulness for the digital forensics (DF) domain.Originality/valueThe proposed model can help organizations to improve their DFR posture, and thus minimize the time and cost of cybercrime incidents.


Author(s):  
Jacobus Gerhardus Nortje ◽  
Daniel Christoffel Myburgh

The discipline of digital forensics requires a combination of skills, qualifications and knowledge in the area of forensic investigation, legal aspects and information technology. The uniqueness of digital evidence makes the adoption of traditional legal approaches problematic. Information technology terminology is currently used interchangeably without any regard to being unambiguous and consistent in relation to legal texts. Many of the information technology terms or concepts have not yet achieved legal recognition. The recognition and standardisation of terminology within a legal context are of the utmost importance to ensure that miscommunication does not occur. To provide clarity or guidance on some of the terms and concepts applicable to digital forensics and for the search and seizure of digital evidence, some of the concepts and terms are reviewed and discussed, using the Criminal Procedure Act 51 of 1977 as a point of departure. Digital evidence is often collected incorrectly and analysed ineffectively or simply overlooked due to the complexities that digital evidence poses to forensic investigators. As with any forensic science, specific regulations, guidelines, principles or procedures should be followed to meet the objectives of investigations and to ensure the accuracy and acceptance of findings. These regulations, guidelines, principles or procedures are discussed within the context of digital forensics: what processes should be followed and how these processes ensure the acceptability of digital evidence. These processes include international principles and standards such as those of the Association of Chiefs of Police Officers and the International Organisation of Standardisation. A summary is also provided of the most influential or best-recognised international (IOS) standards on digital forensics. It is concluded that the originality, reliability, integrity and admissibility of digital evidence should be maintained as follows: Data should not be changed or altered. Original evidence should not be directly examined. Forensically sound duplicates should be created. Digital forensic analyses should be performed by competent persons. Digital forensic analyses should adhere to relevant local legal requirements. Audit trails should exist consisting of all required documents and actions. The chain of custody should be protected. Processes and procedures should be proper, while recognised and accepted by the industry. If the ACPO (1997) principles and ISO/IEC 27043 and 27037 Standards are followed as a forensic framework, then digital forensic investigators should follow these standards as a legal framework.  


2018 ◽  
Vol 7 (4.19) ◽  
pp. 788
Author(s):  
Eman S. Al-Shamery ◽  
Hussein A. Al – Gashamy

The control of inflation rate is at the core of monetary policy making. Therefore, there is very great interest in reliable inflation forecasts by central bankers to help them achieve this aim. The aim of this investigation has been to forecast inflation in case of the United States as accurately as possible. This paper proposes a new forecasting model called Sequential Minimal Organization (SMOreg-3passes) for regression predictions. SMOreg-3passes consists of four steps, they are technical indicators generation, feature selection, normalization regression and regression forecaster. The proposed model evaluated using two regression measurements (Mean Absolute Error (MAE) and Root Mean Square Error (RMSE)). Our evidence from the SMOreg-3passes model suggests that the chronology of time series has great influence on future forecasting and the error in forecasting the past has an exponential impact on the current data. The results showed that the proposed model outperformed the traditional SMO and Multiple Layer Perception (MLP) methods. 


2020 ◽  
Vol 143 (1) ◽  
Author(s):  
Mete Nacar ◽  
Emre Özer ◽  
Aysel Ersoy Yılmaz

Abstract The modeling of photovoltaic (PV) systems is substantial for the estimation of energy production and efficiency analysis in the PV systems under the changing environmental conditions. A PV model mathematically expresses the electrical characteristic of the PV modules according to temperature and irradiance. The most popular electrical circuit models are the single-diode model (SDM) and the double-diode model (DDM). Considering accuracy and complexity, SDM was used in this paper. In the equivalent circuit model used to estimate the electrical behavior of the PV modules, the parameter estimating has become an optimization problem. In recent studies, it is seen that metaheuristic algorithms are often employed in solving this optimization problem. In this paper, a new six-parameter PV model is proposed to improve the accuracy of the five-parameter SDM, taking into account the temperature dependence of the series resistance. Particle swarm optimization (PSO) and a couple of metaheuristic algorithms have been executed to estimate six unknown parameters of the proposed model under standard test conditions (STC: 25 °C, 1000 W/m2, AM1.5) using current–voltage (I–V) data of PV module. In order to evaluate the performance of the proposed method under the changing environmental conditions, it was compared with the three methods commonly used in the literature. Accuracy of the proposed model has been indicated by the root mean square error (RMSE) within the range of current data and the model current values. Simulation results demonstrate that the proposed model can predict the I–V curve for the PV modules with high accuracy.


This chapter evaluates the most relevant methodologies and best practices for conducting digital investigations, preserving digital forensic evidence and following chain of custody (CoC) of cybercrimes. Cybercriminals are assuming new strategies to launch their sophisticated cyberattacks within the ever-changing digital ecosystems. The authors recommend that digital investigations must continually shift to tackle cybercrimes and prosecute cybercriminals to increase international collaboration networks, to share prevention knowledge, and to analyze lessons learned. They also establish a cyber forensics model for miscellaneous ecosystems called cyber forensics model in digital ecosystems (CFMDE). This chapter also reviews the most important categories of tools to conduct digital investigations. Nevertheless, as the cybercrime sophistication keeps improving, it is also necessary to harden technologies, techniques, methodologies, and tools to acquire digital evidence in order to support and make cyber investigation cases stronger.


1987 ◽  
Vol 109 (3) ◽  
pp. 722-730 ◽  
Author(s):  
J. G. Reed ◽  
C. L. Tien

A comprehensive model is developed to predict the steady-state and transient performance of the two-phase closed thermosyphon. One-dimensional governing equations for the liquid and vapor phases are developed using available correlations to specify the shear stress and heat transfer coefficients. Steady-state solutions agree well with thermosyphon flooding data from several sources and with film thickness data obtained in the present investigation. While no data are available with which to compare the transient analysis, the results indicate that, for most systems, the governing time scale for system transients is the film residence time, which is typically much longer than the times required for viscous and thermal diffusion through the film. The proposed model offers a versatile and comprehensive analysis tool which is relatively simple.


2013 ◽  
Vol 333-335 ◽  
pp. 2327-2332
Author(s):  
Xuan Zhang ◽  
Zhi Ming Li ◽  
Xu Ling Li

The safety performance of Electric Vehicle (EV) charging equipments during the charging process will be the critical factor to the development of EVs Industry. Because of the high investment costs and the low accuracy of temperature-rise test system for EV charging coupler, a new remote test system including virtual instrument LabVIEW technology and communication transformation technology is applied to practical work. One temperature-rise test system designed for EV charging coupler is shown in this paper. With the advantages of LabVIEW as graphic programming and multithreading, real-time data acquisition, on-line monitoring and dynamic data preservation can be achieved by this temperature-rise test system. This test system simulates the change status of current data and makes a comprehensive research and evaluation temperature-rise characteristics of the charging coupler by analyzing the collected parameters and historical data when charging for EV.


2021 ◽  
Author(s):  
Hong Su

<div>Cross-chain exchange swaps assets among different blockchains, which facilitates cooperation among blockchains. A cross-chain exchange contains several transactions from different blockchains. It requires to synchronize asset transfers in those associated blockchains to avoid partial transfers. Current cross-chain methods are divided into two main types. One locks the assets first and transfers the frozen asset to receivers later. The second one is the two-phase or three-phase transaction commit protocol. Those methods require at least two steps, which makes those blockchains coherent to synchronize at different time(steps). Serialization is required as the second step has to wait for the completion of the first step, and even some steps in the same stage are required to be serialized. Meanwhile, their implements are either by smart contracts or special blockchain structures/roles. Smart contract based methods require to pre-deploy a smart contract and cannot change dynamically. Special structure or role-based methods force associated blockchains to have those special requirements. In this paper, we propose a new cross-chain exchange model based on the dependence of associated transactions, which is expressed inside a transaction and can change when sending transactions. It saves the step to lock the asset or perform a pre-commit and has no special requirements for blockchains or pre-deployment of smart contracts. The simulation results show the proposed model exchanges asset effectively among different blockchains.</div>


Sign in / Sign up

Export Citation Format

Share Document