{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:30Z","timestamp":1750309590161,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723270","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:20:33Z","timestamp":1749194433000},"page":"699-704","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evi-Block: A secure evidence management system built with Hyperledger Fabric"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1630-5354","authenticated-orcid":false,"given":"Md Ashfaqur Rahman","family":"Rahat","sequence":"first","affiliation":[{"name":"American International University Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0630-0175","authenticated-orcid":false,"given":"Mahir Labib","family":"Utso","sequence":"additional","affiliation":[{"name":"American International University - Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3438-4030","authenticated-orcid":false,"given":"Md. Hasibul","family":"Hasan","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Fahad\u00a0F Alruwaili. 2021. CustodyBlock: A Distributed Chain of Custody Evidence Framework. Information 12 2 (2021) 88.","DOI":"10.3390\/info12020088"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Nitish Andola Manas Gogoi S Venkatesan Shekhar Verma et\u00a0al. 2019. Vulnerabilities on hyperledger fabric. Pervasive and Mobile Computing 59 (2019) 101050.","DOI":"10.1016\/j.pmcj.2019.101050"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Emanuele Bellini. 2019. A blockchain based trusted persistent identifier system for big data in science. Foundations of Computing and Decision Sciences 44 4 (2019) 351\u2013377.","DOI":"10.2478\/fcds-2019-0018"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Emanuele Bellini Youssef Iraqi and Ernesto Damiani. 2020. Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey. IEEE Access 8 (2020) 21127\u201321151. 10.1109\/ACCESS.2020.2969820","DOI":"10.1109\/ACCESS.2020.2969820"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00049"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Robert Campbell. 2019. Transitioning to a hyperledger fabric quantum-resistant classical hybrid public key infrastructure. The Journal of The British Blockchain Association (2019) 9902.","DOI":"10.31585\/jbba-2-2-(4)2019"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Miguel Castro and Barbara Liskov. 2002. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20 4 (nov 2002) 398\u2013461. 10.1145\/571637.571640","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656983"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Huru Hasanova Ui\u2010jun Baek Mu\u2010gon Shin Kyunghee Cho and Myung\u2010Sup Kim. 2019. A Survey on Blockchain Cybersecurity Vulnerabilities and Possible Countermeasures. Int. J. Netw. Manag. 29 2 (mar 2019) 36. 10.1002\/nem.2060","DOI":"10.1002\/nem.2060"},{"key":"e_1_3_3_1_12_2","unstructured":"Junho Jeong Donghyo Kim Byungdo Lee and Yunsik Son. 2020. Design and implementation of a digital evidence management model based on Hyperledger Fabric. Journal of Information Processing Systems 16 4 (2020) 760\u2013773."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Abdullah\u00a0Ayub Khan Mueen Uddin Aftab\u00a0Ahmed Shaikh Asif\u00a0Ali Laghari and Adil\u00a0E. Rajput. 2021. MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access 9 (2021) 103637\u2013103650. 10.1109\/ACCESS.2021.3099037","DOI":"10.1109\/ACCESS.2021.3099037"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN50884.2021.9333932"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Meng Li Chhagan Lal Mauro Conti and Donghui Hu. 2021. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Generation Computer Systems 115 (2021) 406\u2013420. 10.1016\/j.future.2020.09.038","DOI":"10.1016\/j.future.2020.09.038"},{"key":"e_1_3_3_1_16_2","first-page":"304","volume-title":"International Conference on Information and Communications Security","author":"Liang Xueping","year":"2017","unstructured":"Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik, and Lingchen Zhang. 2017. Towards a trusted and privacy preserving membership service in distributed ledger using intel software guard extensions. In International Conference on Information and Communications Security. Springer, 304\u2013310."},{"key":"e_1_3_3_1_17_2","unstructured":"Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19 5 (2017) 653\u2013659."},{"key":"e_1_3_3_1_18_2","unstructured":"Auqib\u00a0Hamid Lone and Roohie\u00a0Naaz Mir. 2019. Forensic-chain: Blockchain based digital forensics chain of custody with Poc in Hyperledger Composer. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S174228761830344X"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Subhra Mazumdar and Sushmita Ruj. 2019. Design of anonymous endorsement system in hyperledger fabric. IEEE Transactions on Emerging Topics in Computing 9 4 (2019) 1780\u20131791.","DOI":"10.1109\/TETC.2019.2920719"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00012"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Xiandong Zheng and Wenlong Feng. 2021. Research on Practical Byzantine Fault Tolerant Consensus Algorithm Based on Blockchain. Journal of Physics: Conference Series 1802 3 (mar 2021) 032022. 10.1088\/1742-6596\/1802\/3\/032022","DOI":"10.1088\/1742-6596\/1802\/3\/032022"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:47Z","timestamp":1750298207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":20,"alternative-id":["10.1145\/3723178.3723270","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723270","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}