{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T10:26:33Z","timestamp":1777285593018,"version":"3.51.4"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:00:00Z","timestamp":1618876800000},"content-version":"vor","delay-in-days":109,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper presents a data preservation model based on blockchain and multidimensional hash. With the decentralization and smart contract characteristics of blockchain, data can be automatically preserved without human participation to form a branch chain of custody in the unit of case, and blockchain has good antiattack performance, which is the so\u2010called 51% attack. Meanwhile, in order to solve the problem of data confusion and hard to query caused by the excessive number of cases, hash, cryptography, and timestamps are used to form a serialized main chain of custody. Because of the confliction problem of hash and judicial trial needs to absolutely guarantee the authenticity and validity of data, multidimensional hash is used to replace regular hash. In this way, the data preservation becomes an automatic, nonhuman\u2010interventional process. Experiments have been carried out to show the security and effectiveness of the proposed model.<\/jats:p>","DOI":"10.1155\/2021\/5536326","type":"journal-article","created":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T02:17:06Z","timestamp":1618971426000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4324-6233","authenticated-orcid":false,"given":"Gongzheng","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8122-8052","authenticated-orcid":false,"given":"Jingsha","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0700-7718","authenticated-orcid":false,"given":"Xinggang","family":"Xuan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,20]]},"reference":[{"key":"e_1_2_10_1_2","article-title":"Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices","volume":"74","author":"Kim D.","year":"2017","journal-title":"The Journal of Supercomputing"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03028-7"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.040"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-9204-6"},{"key":"e_1_2_10_5_2","article-title":"Digital forensic investigation, collection and preservation of digital evidence","volume":"16","author":"\u0110altur","year":"2014","journal-title":"International Burch University"},{"key":"e_1_2_10_6_2","first-page":"85","article-title":"Ensuring the authenticity and non-misuse of data evidence in digital forensics","volume":"22","author":"He J.","year":"2015","journal-title":"Journal of Harbin Institute of Technology"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"KishigamiJ. FujimuraS. andWatanabeH. Etc. The blockchain-based digital content distribution system Proceedings of the 2015 IEEE fifth international conference on BigData and cloud computing August 2015 Dalian China IEEE Computer Society 187\u2013190.","DOI":"10.1109\/BDCloud.2015.60"},{"key":"e_1_2_10_8_2","first-page":"131","article-title":"Rep on the block: a next generation reputation system based on the blockchain","volume":"10","author":"Dennis R.","year":"2016","journal-title":"Internet Technology and Secured Transactions"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973178"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11289-9_7"},{"key":"e_1_2_10_11_2","first-page":"199","article-title":"The design of an anti-counterfeiting system based on blockchain","volume":"4","author":"An R.","year":"2017","journal-title":"Journal of Cryptologic Research"},{"key":"e_1_2_10_12_2","article-title":"BBDS: blockchain-based data sharing for electronic medical records in cloud environments","volume":"8","author":"Qi X.","year":"2017","journal-title":"Information"},{"key":"e_1_2_10_13_2","doi-asserted-by":"crossref","unstructured":"XuR. Z. ZhangL. ZhaoH.et al. Design of network media\u2019s digital rights management scheme based on blockchain technology Proceedings of the 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS) March 2017 Bangkok Thailand.","DOI":"10.1109\/ISADS.2017.21"},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"LiangX. P. ShettyS. ToshD.et al. ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability Proceedings of the 2017 17th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID) May 2017 Madrid Spain IEEE 468\u2013477.","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_10_15_2","first-page":"63","article-title":"Research on application of electronic evidence based on blockchain","volume":"38","author":"Li Z.","year":"2017","journal-title":"Computer Engineering & Software"},{"key":"e_1_2_10_16_2","volume-title":"Research and Implementation of Cloud Forensic System Based on Blockchain Technology","author":"Xu L.","year":"2017"},{"key":"e_1_2_10_17_2","volume-title":"Design and Implementation of Distributed General Ledger Consensus Mechanism","author":"Bo D.","year":"2016"},{"key":"e_1_2_10_18_2","first-page":"1","article-title":"Ethereum: a aecure decentralized generalized transaction ledger","volume":"10","author":"Gavin W.","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_2_10_19_2","first-page":"1","volume-title":"The Ripple Protocol Consensus Algorithm","author":"Schwartz D.","year":"2014"},{"key":"e_1_2_10_20_2","unstructured":"Hyperledger Fabric [OL]."},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2685328.2685334"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5536326.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5536326.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5536326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:44:29Z","timestamp":1723243469000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5536326"}},"subtitle":[],"editor":[{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5536326"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5536326","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-02-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5536326"}}