Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 348-351.

• Information Security • Previous Articles     Next Articles

Block Chain Based Architecture Model of Electronic Evidence System

HOU Yi-bin,LIANG Xun,ZHAN Xiao-yu   

  1. School of Software Engineering,Beijing University of Technology,Beijing 100024,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: This paper proposed an electronic evidence system architecture based on block chain technology.The absolutely-credible characteristic of block chain data is used to guarantee the authenticity of electronic evidence and promote its development.The framework also describes a methodology to package a large quantity of data,which can reduce the cost and improve the efficiency when saving data into block chain.

Key words: Batch packing, Block chain, Electronic evidence

CLC Number: 

  • TP311
[1]SWAN M.Blockchain:Blueprint for a new economy[M]. O’Reilly Media,Inc.,2015.
[2]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[OL].http://bitcoin.org/bitcoin.pdf.
[3]CROSBY M,PATTANAYAK P,VERMA S,et al.Blockchain technology:Beyond bitcoin[J].Applied Innovation,2016(2):6-10.
[4]MORI T.Financial technology:blockchain and securities settlement[J].Journal of Securities Operations & Custody,2016,8(3):208-227.
[5]TAPSCOTT D,TAPSCOTT A.Blockchain Revolution:How the technology behind Bitcoin is changing money,business,and the world[M].Penguin,2016.
[6]WATANABE H,FUJIMURA S,NAKADAIRA A,et al.Blockchain contract:Securing a blockchain applied to smart contracts[C]∥2016 IEEE International Conference on Consumer Electronics (ICCE).IEEE,2016:467-468.
[7]COHEN L R,SAMUELSON L,KATZ H.How Securitization Can Benefit from Blockchain Technology[J].The Journal of Structured Finance,2017,23(2):51-54.
[8]汪闽燕.电子证据的形成与真实性认定[J].法学,2017(6):183-192.
[9]陈金明.电子证据保全公证的保全措施及公证书效力研究[J].法制与经济,2016(10):77.
[10]何月.电子证据的归属及证明力研究[J].信息网络安全,2010(11):85-86.
[11]Damg?rd I B.A design principle for hash functions[C]∥Conference on the Theory and Application of Cryptology.Springer,New York,NY,1989:416-427.
[12]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[13]SRINIVASAN R.RPC:Remote Procedure Call Protocol Specification:Verison 2.RFC,1995,11(3):5531.
[14]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments:Technical Report (draft)[R].2015.
[1] ZHOU Yi-hua, JIA Yu-xin, JIA Li-yuan, FANG Jia-bo, SHI Wei-min. Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree [J]. Computer Science, 2021, 48(9): 330-336.
[2] KE Yu-Jing, JING Mao-hua and ZHENG Han-yin. Application Research of Blockchain Technology in Trust Industry [J]. Computer Science, 2020, 47(6A): 591-595.
[3] REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638.
[4] HONG Xiao-ling, WAN Hu, XIAO Xiao and SUN Hao-xiang. Manufacturing Alliance System Based on Block Chain [J]. Computer Science, 2020, 47(6A): 369-374.
[5] XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286.
[6] LIANG He-jun, HAN Jing-ti. Research on Decentralized Transaction Consensus Mechanism of Cloud Computing Resources Based on Block Chain [J]. Computer Science, 2019, 46(11A): 548-552.
[7] LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368.
[8] . Research of Key Technologies of Electronic Evidence Forensics Based on Cloud Computing Environment [J]. Computer Science, 2012, 39(Z11): 139-142.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!