Submit Search
Upload
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
•
0 likes
•
10 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i4/IRJET-V7I4113.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
IRJET Journal
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
TELKOMNIKA JOURNAL
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
IJTRET-International Journal of Trendy Research in Engineering and Technology
Recommended
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
IRJET Journal
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
TELKOMNIKA JOURNAL
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
4
4
aniketnimaje
5
5
aniketnimaje
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Domenico Catalano
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
IJTET Journal
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
IRJET Journal
karsof systems biometrics brochure
karsof systems biometrics brochure
Colin Valencia
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
Arpan Pal
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
Paul Hofmann
icuWorkbench - Use cases
icuWorkbench - Use cases
G2 Research Ltd.
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
eSAT Publishing House
Kg3617691773
Kg3617691773
IJERA Editor
a novel approach for data uploading
a novel approach for data uploading
IJAEMSJORNAL
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
Rezgar Mohammad
i2 Contact Tracing One Pager
i2 Contact Tracing One Pager
Sydney Wolff
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET Journal
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
faisalcp
Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET Journal
Enhancements in the world of digital forensics
Enhancements in the world of digital forensics
IAESIJAI
More Related Content
What's hot
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
4
4
aniketnimaje
5
5
aniketnimaje
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Domenico Catalano
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
IJTET Journal
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
IRJET Journal
karsof systems biometrics brochure
karsof systems biometrics brochure
Colin Valencia
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
Arpan Pal
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
Paul Hofmann
icuWorkbench - Use cases
icuWorkbench - Use cases
G2 Research Ltd.
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
eSAT Publishing House
Kg3617691773
Kg3617691773
IJERA Editor
a novel approach for data uploading
a novel approach for data uploading
IJAEMSJORNAL
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
Rezgar Mohammad
i2 Contact Tracing One Pager
i2 Contact Tracing One Pager
Sydney Wolff
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET Journal
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
faisalcp
Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
What's hot
(20)
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
4
4
5
5
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
karsof systems biometrics brochure
karsof systems biometrics brochure
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
icuWorkbench - Use cases
icuWorkbench - Use cases
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
Kg3617691773
Kg3617691773
a novel approach for data uploading
a novel approach for data uploading
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
i2 Contact Tracing One Pager
i2 Contact Tracing One Pager
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
Ijcet 06 06_004
Ijcet 06 06_004
Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET Journal
Enhancements in the world of digital forensics
Enhancements in the world of digital forensics
IAESIJAI
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET Journal
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
IRJET Journal
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET Journal
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
Editor IJCATR
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
IRJET Journal
MEDBLOCK
MEDBLOCK
IRJET Journal
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET Journal
H2020 project WITDOM overview
H2020 project WITDOM overview
Elsa Prieto
Product Serialization using Blockchain
Product Serialization using Blockchain
IRJET Journal
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
IRJET Journal
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
IRJET Journal
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
MalikPinckney86
Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
(20)
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
Enhancements in the world of digital forensics
Enhancements in the world of digital forensics
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
MEDBLOCK
MEDBLOCK
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
H2020 project WITDOM overview
H2020 project WITDOM overview
Product Serialization using Blockchain
Product Serialization using Blockchain
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 544 Analyzing Need of Secure Forensic Report System using Blockchain Sonali M Patil1,Rahul Agarwal2, Saburi Ashtekar 3, Muskan Dolwani4, Snehal Nagare5 1-5Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -Online data plays an important role in the captive of online crime as it is used to associate people with criminal activity. Therefore, maintainingtheoriginality, authenticity, of digital proof is of extreme importance as it travels through various levels of hierarchy in the custody chain during online crime investigation. The potential of blockchaintechnologyto allow a massive view of transactions (events/actions)backto original source gives the forensic community tremendous hope. In this paper, need of secure forensic report is discussed. The study shows use of block chain can be made available for forensic applications, particularly bringing integrity and resistance to digital custody forensics. Key Words: Authentication, Block chain, SHA-256 Tamper proof. 1.INTRODUCTION The block chain technology is a distributed system which uses ledger based transactions, which could store linked records within the range of a decentralized database within the P2P network, the data is stored in blocks that are having time stamp, which are linked in an unbreakable chain, creating immutable, publicly transparent, and validated audit system by a consensus-based proof of work. Block chain has its security, immutable nature of the cryptograph hash links between blocks and instances meanwhile, it can provide immutability, ability to trace, transparent nature, auditing ability, and accountability.[1] The advantage of using block chain system in Digital Forensic is that the administrator can provide validation upon which he can access digital evidences, which make use of hash functions to effectively establish verifiable evidence chain. The block chain makes use of cryptographytoconfirm the immutable nature, visible, and public trust within the case examination. One of the major issues indigital forensics is that the management of evidences. From the time when evidence is collected until the time they are exploited in a legal court, evidences maybe accessed by many parties involved within the investigation that take temporary ownership of the evidence. The Forensic Report is the process of validating how any reasonable evidence hasbeen gathered, tracked and guarded on its thanks to a court of law. Forensic Report may be a mandatory step in forensic analysis. However, it's extensively used as evidence to be accepted in a court or in legal matters, it must beprovedthat is not tampered during investigations. Thus, a decent process should be used for regular dealing and handling evidences (digital or not), no matter whether the evidence are utilized in a court or not. The main requirements of a regular process are: Integrity: the evidence should not be altered or tampered during the transferring. Tracing Ability: the evidence must be traced from the time of its collection until it's destroyed. Authentication: all the entities interacting with the report must provide validation as a recognizable proof of their identity. Verification Ability: the entire process must be verifiable from every entity involved within the process. Tampering proof: Changeovers of an evidence can't be alteredorcorrupted.[1] Fig 1:- Blockchain Nework Working 1.1 Problem Statement It is observed that forensic reports are changed most of the times during theinvestigationprocess.Unrecognizedsources may change data of forensic reports. In most of thecases,due to this the judgement may not be fair and justice may not be provided to the needy. Hence,thereisdireneedofdeveloping a system which ensures the security of forensics report,right from the time they’re generated to the time they’re used in legal practices. 1.2 SYSTEM OVERVIEW Our system is fully designed and idealized by us afteraiming to develop a system that will help in improving forensic report security to provide seamless and tamper proof experience. System will take input from the pathology lab in the form of a forensic report which will then interact with other entities of the proposed system. Output will be in the form of a tamper proof forensic report which can be used in legal practices and which can be relied upon.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 545 2. LITERATURE SURVEY Sr. No PAPER TITLE AUTHOR REVIEW 1. Forensic Automatic Speaker Recognition Andrzej Drygajlo The existence of highlydevelopedand fully automated telephone networks in industrialized countries and pervasiveness of speech. 2. Speaker Identification Using Gaussian Mixture Models Pavan Kumar, Mahesh Chandra Speech processing is a diverse field with many applications but here speaker recognition will be discussed. Speaker recognition can be divided into two classes, text dependent and text independentspeaker recognition. 3. FORENSIC IDENTIFICATION REPORTING USING AUTOMATIC SPEAKER RECOGNITION SYSTEMS J. Gonzalez- Rodriguez, J. Fierrez- Aguilar and J. Ortega- Garcia This work deals with the issue of how forensic scientists must report to the judge/jury their conclusions when Speaker recognition techniques are used. In this sense, they firstly note the difference from system characterization, that is the identification abilities of the technique in use, to the characterization of the forensic system that will provide objective results to the Court. 4. Analytical Tools for Block chain: Review, Taxonomy and Open Challenges Anastasios Balaskas, Virginia N. L. Franqueira Blockchain analysis is an entirely new field of research and development, which started to emerge in 2014 as a trend within the cryptocurrency ecosystem. This trend was mainly pushed by its transparent and decentralizednature. 5. BIOMETRIC SOLUTIONS FOR AUTHENTICATIO Nalini K. Ratha, Jonathan H. This chapter briefly provides a tutorial that introduces bio N Connell and Ruud M Bolle metrics technologies And systems. Various existing and potential applications in an e- world are reviewed, includinguseraccess control, smart card, mobile security, Internet/Web-based security, forensics, and so on. Also, all chapters are Outlined to explain the organization of this book. 3. PROPOSED SYSTEM Block chain-based Digital Forensics Investigation The block chain technology offers a fresh and new approach to how forensic applications with many benefits for the procedure of investigations can be used, including the collection of data, enhancement of data, validation of data, data analysis, preservingofevidencesandthepresentationof the finding. Block chain based digital forensics investigation system has great potential to bringhugebenefitstoforensicapplications, by providing high level integrity, transparentnature,secured authenticity, security and ability to audit digital evidences to achieve the desired end.[2] These are the 4 Nodes, that we intend to include in our system:- 1. Pathology Lab-Pathology lab willcreateforensicreportof the victim and send it to the doctor or hospital. In current system reports are sent by email or hard copies are sent which can be easily modified by the doctor or any other sources. But in the proposed system we will upload the forensic report on block chain network which is immutable and a distributed network. Block chain is a highly secure network which can never be hacked or tampered. Also, if node fails then we can recover the data very easily because data is stored in a distributed manner. 2. Hospital- It is the second node of the proposed system. Hospital receives the forensic report from pathology lab. Hospital then assigns a particular doctor who will verify the report and attach with it his digital signatureandthensendit to the police officer for further investigation. Doctor cannot modify the report because when the pathology lab officials upload the report on the network, a 16-digit hash code is generated, which is static in nature. If someone tries to modify the report, the hash code changes. As the hash code should be constant through out the investigation process, whenever it gets updated we can find out through which node it got updated, and find out the culprit. Hospital node can store the report in it’s ledger.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 546 3. Police Department- It is the third node of the proposed system. Police department will get the input from the doctor that is a digitally signed forensic report. Police department will then assign a police officer who begins his investigation on the basis of the forensic report. As the report which was generated by a pathology lab and successfully verified by a doctor, police officer gets detail of the victim which are already verified and validated. Hence, it becomeseasyforthe police officer as he just has to concentrate on the investigation part. If the police officer tries to modify the report the hash code again will be changed and the police officer will be highlighted as the hash is updated from the third node. 4. Final Report- It is the final node of the proposed system. An administrator who handles the block chain network can see through the actual transaction history and the journey of the forensic report. If the hash code that wasgeneratedwhen the pathology lab uploads the report on the network is static through out the network, it means the report is tamper proof and no one tried to modify the report. And if the hash code has changed through the course of the network, it means the report is tampered. As, the system is divided in nodes, he can easily trace through which node the hash code was updated and find out the culprit. Fig 2:- Proposed System Fig 3:- Use Case Diagram for the proposed system 4. MATHEMATICAL MODELING F=Pathology Lab creates report D=Hospital gets report from pathology lab PD=Police department investigates and verifies report FR=Final report is verified by an authorized person Input: Pathology lab generates forensic report Output: Final report is verified and is tamper proof Set Theory: 1) Let SS be as system which trace the pathologylabreport to final report.. SS = {In, PL, H, } 2) Identify Input In as In = {PL} Where, PL = input data 3) Identify Process FR as P = {H, PD, PL} Where, PL= Pathology lab creates report PD= Police department investigates report
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 547 H= Hospital collects report from pathology lab 4) Identify Output Op as Op = {FR} Where, FR= Final report can be checked by an authorized person After processing this request final report can be submitted to the victim’s family. = Failures and Success conditions.[5] 5. SCOPE This System can be used in every state of the country. This system has huge potential as block chain is the most secure technology as of now. 6. CONCLUSION Blockchain by nature enforces authenticity, accountability, authenticity, protection and auditability, making it the best choice for the management and traceability of the forensic custody chain. By that confidence, Blockchain helps to reduce friction and thus brings the real promise to forensic culture. This project work aims at developing complete Java based smart digital forensic chain. 7. ACKNOWLEDGEMENT We wish to express my profound thanks to all whohelped us directly or indirectly in making this paper. Finally, we wish to thank to all our friends and well-wishers who supported us in completing this paper successfully. We are especially grateful to our guide HOD Dr.S.M.PATIL for her time to time, very much needed, and valuable guidance. Without the full support and cheerful encouragement of my guide, the paper would not have been completed on time. REFERENCES 1. G. Giova, “Improving chain of custody in forensic investigation of electronic digital systems,” International Journal of Computer Science and Network Security, vol. 11, no. 1, pp. 1–9, 2011. 2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. 3. V. Buterin et al., “Ethereum white paper,” 2013. 4. C. Liu, “How the blockchain could transformthe processof documenting electronic chain of custody.” 5. K. Zatyko, “Improving cyber forensics cybersecurity through block chain technology with truth based systems,” International Symposium on Forensic Science Error Management, July-23-2015.
Download now