A Blockchain-Based Chain of Custody for Digital Evidence: Design and Evaluation
DOI:
https://doi.org/10.54654/isj.v3i26.1167Keywords:
digital evidence, chain of custody, blockchain, permissioned ledger, smart contracts, auditability, forensic readiness, private data collectionsTóm tắt
Maintaining a trustworthy chain of custody is essential to ensure the integrity, provenance, and admissibility of digital evidence. However, traditional evidence-management systems often suffer from opacity, limited auditability, and susceptibility to insider abuse or procedural errors. To address these gaps, we propose a blockchain-based chain-of-custody framework built on Hyperledger Fabric. In this design, the full lifecycle of evidence is logged as immutable, permissioned ledger entries, while artefacts themselves remain protected in secure off-chain repositories. Each event is captured through signed metadata and cryptographically time-stamped records, providing tamper-evident traceability. Custody workflows are encoded in Fabric chaincode, with role-based, multi-party authorization required for sensitive transitions. Moreover, Fabric’s privacy channels and fine-grained access controls enable cross-agency collaboration without unnecessary data exposure. A prototype implementation shows that the system achieves end-to-end accountability, practical throughput, and sub-second median latency on commodity hardware-demonstrating that stronger evidentiary assurance can be achieved for law-enforcement and forensic applications without incurring prohibitive operational costs.
Downloads
References
Y. Prayudi and A. Sn, "Digital chain of custody: State of the art," International Journal of Computer Applications, vol. 114, no. 5, p. 1-9, 2015.
M. N. Sadiku, A. E. Shadare and S. M. Musa, "Digital chain of custody," Int. J. Adv. Res. Comput. Sci. Softw. Eng, vol. 7, no. 7, p. 117, 2017.
A. H. Lone and R. N. Mir, "Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer," Digital Investigation, vol. 28, pp. 44-55, 2019.
A. Malik and A. K. Sharma, "Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things," Journal of Information Security and Applications, vol. 77, p. 103579, 2023.
B. C. A. Petroni, R. F. Gonçalves, P. S. a. R. de Arruda Ignácio, J. Z. Reis and G. J. D. U. Martins, "Smart contracts applied to a functional architecture for storage and maintenance of digital chain of custody using blockchain," Forensic Science International: Digital Investigation, vol. 34, p. 300985, 2020.
L. Ahmad, S. Khanji, F. Iqbal and F. Kamoun, "Blockchain-based chain of custody: Towards real-time tamper-proof evidence management," in Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020.
L. Loffi, G. L. Camillo, C. A. De Souza, C. M. Westphall and C. B. Westphall, "Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review," IEEE Access, 2025.
D. Batista, A. L. Mangeth, I. Frajhof, P. H. Alves, R. Nasser, G. Robichez, G. M. Silva and F. P. D. Miranda, "Exploring blockchain technology for chain of custody control in physical evidence: a systematic literature review," Journal of Risk and Financial Management, vol. 16, no. 8, p. 360, 2023.
E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman and Y. Manevich, "Hyperledger fabric: a distributed operating system for permissioned blockchains," in Proceedings of the Thirteenth EuroSys Conference, 2018.
N. T. Tung, N. T. Trong, N. T.Hien, N. Q. Hoan, and D. X. Cho, "A Combinational Model-Based APT Attack Detection Approach," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 30-39, 2025.
D. T. Mai and N. V. Hung, "Improve the effectiveness of machine learning models in detecting website phishing using morphological features in URL analysis," Journal of Science and Technology on Information Security, vol. 2, no.22, pp. 49-57, 2024.
L. V. Thinh, "Federated Trust-Based Authentication for Secure Mobile Cloud Access," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 88-104, 2025.
N. T. Cam, P. N. Duy, and H. M. T. Phuc, "Large-scale Android malware detection by integrating Blockchain and IPFS for secure virus signature distribution," Journal of Science and Technology on Information Security, no. 1.CS (24), pp. 72-87, 2025.
V. K. Linh, N. V. Hung, T. N. Anh, D. D. Nhuan, and D. C. Hien, "Enhance deep learning model for malware detection with a new image representation method," Journal of Science and Technology on Information Security, no.1.CS (21), pp. 31-39, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).










