A Blockchain-Based Chain of Custody for Digital Evidence: Design and Evaluation

Authors

  • Truong Xuan Hung Academy of Cryptography Techniques
  • Luong The Dung
  • Tran Anh Tu

DOI:

https://doi.org/10.54654/isj.v3i26.1167

Keywords:

digital evidence, chain of custody, blockchain, permissioned ledger, smart contracts, auditability, forensic readiness, private data collections

Tóm tắt

Maintaining a trustworthy chain of custody is essential to ensure the integrity, provenance, and admissibility of digital evidence. However, traditional evidence-management systems often suffer from opacity, limited auditability, and susceptibility to insider abuse or procedural errors. To address these gaps, we propose a blockchain-based chain-of-custody framework built on Hyperledger Fabric. In this design, the full lifecycle of evidence is logged as immutable, permissioned ledger entries, while artefacts themselves remain protected in secure off-chain repositories. Each event is captured through signed metadata and cryptographically time-stamped records, providing tamper-evident traceability. Custody workflows are encoded in Fabric chaincode, with role-based, multi-party authorization required for sensitive transitions. Moreover, Fabric’s privacy channels and fine-grained access controls enable cross-agency collaboration without unnecessary data exposure. A prototype implementation shows that the system achieves end-to-end accountability, practical throughput, and sub-second median latency on commodity hardware-demonstrating that stronger evidentiary assurance can be achieved for law-enforcement and forensic applications without incurring prohibitive operational costs.

Downloads

Download data is not yet available.

References

Y. Prayudi and A. Sn, "Digital chain of custody: State of the art," International Journal of Computer Applications, vol. 114, no. 5, p. 1-9, 2015.

M. N. Sadiku, A. E. Shadare and S. M. Musa, "Digital chain of custody," Int. J. Adv. Res. Comput. Sci. Softw. Eng, vol. 7, no. 7, p. 117, 2017.

A. H. Lone and R. N. Mir, "Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer," Digital Investigation, vol. 28, pp. 44-55, 2019.

A. Malik and A. K. Sharma, "Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things," Journal of Information Security and Applications, vol. 77, p. 103579, 2023.

B. C. A. Petroni, R. F. Gonçalves, P. S. a. R. de Arruda Ignácio, J. Z. Reis and G. J. D. U. Martins, "Smart contracts applied to a functional architecture for storage and maintenance of digital chain of custody using blockchain," Forensic Science International: Digital Investigation, vol. 34, p. 300985, 2020.

L. Ahmad, S. Khanji, F. Iqbal and F. Kamoun, "Blockchain-based chain of custody: Towards real-time tamper-proof evidence management," in Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020.

L. Loffi, G. L. Camillo, C. A. De Souza, C. M. Westphall and C. B. Westphall, "Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review," IEEE Access, 2025.

D. Batista, A. L. Mangeth, I. Frajhof, P. H. Alves, R. Nasser, G. Robichez, G. M. Silva and F. P. D. Miranda, "Exploring blockchain technology for chain of custody control in physical evidence: a systematic literature review," Journal of Risk and Financial Management, vol. 16, no. 8, p. 360, 2023.

E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman and Y. Manevich, "Hyperledger fabric: a distributed operating system for permissioned blockchains," in Proceedings of the Thirteenth EuroSys Conference, 2018.

N. T. Tung, N. T. Trong, N. T.Hien, N. Q. Hoan, and D. X. Cho, "A Combinational Model-Based APT Attack Detection Approach," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 30-39, 2025.

D. T. Mai and N. V. Hung, "Improve the effectiveness of machine learning models in detecting website phishing using morphological features in URL analysis," Journal of Science and Technology on Information Security, vol. 2, no.22, pp. 49-57, 2024.

L. V. Thinh, "Federated Trust-Based Authentication for Secure Mobile Cloud Access," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 88-104, 2025.

N. T. Cam, P. N. Duy, and H. M. T. Phuc, "Large-scale Android malware detection by integrating Blockchain and IPFS for secure virus signature distribution," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 72-87, 2025.

V. K. Linh, N. V. Hung, T. N. Anh, D. D. Nhuan, and D. C. Hien, "Enhance deep learning model for malware detection with a new image representation method," Journal of Science and Technology on Information Security, no.1.CS (21), pp. 31-39, 2024.

Downloads

Abstract views: 347 / PDF downloads: 69

Published

2025-12-31

How to Cite

Hung, T. X. ., Dung , L. T., & Tu, T. A. (2025). A Blockchain-Based Chain of Custody for Digital Evidence: Design and Evaluation. Journal of Science and Technology on Information Security, 3(26), 25-38. https://doi.org/10.54654/isj.v3i26.1167

Issue

Section

Papers

Most read articles by the same author(s)