You are on page 1of 16

Arabian Journal for Science and Engineering (2023) 48:10173–10188

https://doi.org/10.1007/s13369-022-07555-1

RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

IoT with Multimedia Investigation: A Secure Process of Digital


Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth
Abdullah Ayub Khan1,2 · Aftab Ahmed Shaikh1 · Asif Ali Laghari1

Received: 14 October 2022 / Accepted: 12 December 2022 / Published online: 24 December 2022
© King Fahd University of Petroleum & Minerals 2022

Abstract
Internet of Things (IoT)-enabled wireless surveillance systems are gaining more attention because of the robust development in
information technology. It is due to the versatile distributed application features and improved performance of the technology,
which required proper investigation. In a multimedia environment, video captured by surveillance cameras is required to be
stored (uploaded) for secure preservation for the sake of futuristics analysis, especially in multimedia forensics investigation
processes. While storing large raw video files over the network and extracting features as per needs, the systems’ provenance
with the ledger integrity, reliability, transparency, availability, immutability, and trustworthiness are the main concerns. These
highlighted challenges pose a serious issue in the domain of network transmissions, where digital forensics investigation is
applied. In addition, the limited use of multimedia resource constraints over the wireless network, such as computational
power, network bandwidth, and storage created another type of challenging aspect throughout the investigation. However, the
current lifecycle is observing the most critical in terms of consecutive duplicated video frame creation. There is a need to handle
a few objects of interest, filter the frames, and investigate them before storing them on the secure digital ledger, which also
relieves the pressure of network transmission at the same time. The real-time monitoring of the blind area (which is covered
with dark shadows) of the video also affects the frame filtering accuracy. This impacts the forensics investigation hierarchy,
investigational data management, and multimedia-enabled chain-of-custody preservation. To address such challenging issues,
this paper bridges these gaps by enabling novel and secure digital forensics investigation processes using IoT-Blockchain-
based collaborative technology. A blockchain hyperledger sawtooth-enabled secure and efficient digital multimedia forensics
investigational distributed architecture is proposed. The process connects participating stakeholders to exchange details of
the investigation, including the video surveillance pre-processed frame filtering-related chain-of-custody details by creating a
private network. And so, customized consensus protocols such as proof-of-work sawtooth policies. To design and deploy such
protocols, the system enables the analysis of the overall activities of scheduled multimedia transmission before preserving them
on the distributed ledger. For automation, smart contracts are implemented to automate ledger redundancy verification and
validation, requesting for contents of video surveillance frame filtering and maintaining immutable preservation. Substantially,
it provides a secure interaction between the investigational processes because of lifecycle tuning. Through experimental results,
the proposed solution provides better performance with robust capability to track and trace real-time video surveillance, frame
auto-filtering redundancy, and object-of-interest investigation with an increased efficiency rate of 30% and reduces resource
consumption down to 11.56%.

Keywords Blockchain · Hyperledger sawtooth · Digital forensics investigation · Internet of Things (IoT) · Wireless network ·
Multimedia technology

B Abdullah Ayub Khan


abdullah.khan00763@gmail.com;
1 Department of Computer Science, Sindh Madressatul Islam
abdullah.ayub@bbsul.edu.pk
University, Karachi 74000, Pakistan
Aftab Ahmed Shaikh
2 Department of Computing Science and Information
aftab.shaikh@smiu.edu.pk
Technology, Benazir Bhutto Shaheed University Lyari,
Asif Ali Laghari Karachi 75660, Pakistan
asif.laghari@smiu.edu.pk

123
10174 Arabian Journal for Science and Engineering (2023) 48:10173–10188

1 Introduction information for applications of video surveillance. Substan-


tially, the filtering of the duplicated frames does not affect the
Nowadays, wireless video surveillance systems perform streaming quality of safety services and monitoring. It can
magnificently in every environment because of their flexible decrease the usage of wireless bandwidth. The IoT-wireless
modular infrastructure and easy installation procedure [1]. network-enabled cameras connect with other external multi-
This system performs tremendously in a distinct environ- media devices to perform different tasks, including initiating
ment, such as traffic monitoring [2], management of parking recording, storing, and interpreting. The process of foren-
systems [3], and public/private security protection in offices, sics investigation is applied if any suspicious activity occurs,
campuses, commercials, and residential communities [4, 5]. then the ecosystem restricts. While preserving distributed
The advancement and developments in information technol- chain-of-evidence in various storage channels along with
ogy, especially the collaborative approach of the Internet of managing frame redundancy, reducing the consumption of
Things (IoT) with wireless communication make the system transmission bandwidth [17], and turning security surveil-
more widely adopted in different applications, including real- lance into smart security and safety management. It has
time video surveillance, which requires video-related data significantly improved security-related procedures in various
feeding, examining, analyzing, and storing [6] (as shown in areas, including commercial, by enabling a more robust and
Fig. 1). However, the published report on worldwide fore- insightful response to wireless video surveillance incidents.
casting 2020 [7], the real-time video surveillance monitoring However, organizations are facing considerable issues in
system would expand by nearly 11%. Whereas the exponen- securing wireless video surveillance digital infrastructures
tial usage of IoT-video surveillance over the world reported, against different kinds of cyber-or cloud-based multime-
from 2019 to 2024 [8]. In this scenario, the current market is dia surveillance and virtual tampering and storage-related
expected to increase from $45.5 billion to nearly $69.7 bil- attacks [18]. The main aim of digital forensics is to per-
lion [9]. For instance, with the increasing rate of monitoring form a process of digital investigation that maintain a secure
infrastructure and the size of the area being enlarged to cover report of malicious attacks, collects all the details, and
the number of cameras, this increasing number of multime- presents chain-of-evidence to the court of law to determine
dia streaming leads to serious challenges in transmission and the actual involvement and purpose of crime on a digital
their digital investigation through resource constraint net- infrastructure over cyber environment. And so, the process
work technology [10].
Current commercial-based solutions reduce the load of
wireless transmission through the cameras, which is based
on real-time detection and streaming encoding. It presents
low video pixel utilization in the form of spatial and temporal
reduction, respectively [11]. The former solution is proposed,
where the cameras are used only for initiating recording
and wirelessly transmitting video when the different level
between multiple sequences of frames is over the threshold
[12]. However, various duplication frames are uploaded on
cloud storage, which poses a serious challenge in terms of
analyzing every aspect of records. On the other side, the ben-
efit of capturing real-time frames of every second makes the
system able to get a positive investigational solution [13].
For instance, the private and public sectors require security
monitoring along with that commercial and residential com-
munities are also more concern. Over the frames capturing
and filtering, various task can be possible through this, such
as people’s suspicious activities, movements, vehicular iden-
tifications, and drone operations. While these video frames
containing garbage means frame duplication, which effects
in the process of real-time collection along with examina-
tion while further digital investigation [14–16]. In addition,
this paper focusing on the temporal video pixel reduction of
the wirelessly transmitted multimedia quantity, in which a
large number of duplicated frames are transmitted in the data
streaming. Most importantly, it contains very little useful Fig. 1 Current process of video surveillance and investigation

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10175

is also responsible for mitigating and incident responding dynamic data transparency, provenance, tracking, traceabil-
to such IoT-cloud surveillance-related attacks. The digital ity, immutability, and assurance for performing different
forensics process is admired as it is used to capture wire- operations (dynamic camera surveillance rotation, zoom,
less video surveillance transmitted data (sequence of frames capture-specific objects, frame filter analysis, and object-of-
and extract object-of-interest), examine, analyze, store, and interest preservation). And so, the proposed camera controls
prove facts to convict the stakeholders involved in this crime surveillance maintains trust between the IoT-enabled real-
[19, 20]. This investigation led to the process of acquisi- time automation, including the external multimedia mon-
tion of the collected data for detailed evaluation; the findings itoring devices while sending, receiving, analyzing, inter-
from this analysis of different attributes helped to further preting, and recording the surveillance (sensing) into camera
interpret the crime incident and were then documented as action (wireless network transmission). It also ensures the
the forensics law enforcement report, which the admirable privacy protection for the complete node transactions of IoT-
deposition and testimonials represented in front of the jury surveillance-to-multimedia systems stored in a blockchain
[21]. It is also critical to maintain the transparency and distributed ledger of video surveillance-related frame filter-
secrecy of the digital investigation process [22]. A digi- based and point-of-interest data in a NuCypher Threshold
tal forensics with blockchain can store surveillance-related Re-encryption private network; it helps to examine and ana-
evidence and make a proper chain-of-custody transactions lyze the surveillance-based criminal activity by applying
with an immutable digital distributed ledger preservation, process of a digital forensics investigation. The main objec-
which enables a transparent process of multimedia investi- tives and contributions of this research are as follows:
gation. The wireless multimedia surveillance-enabled events
(incidents) occurrence is preserved in a gazette chain order
connected via various transmission channels in a permis-
sioned private Sawtooth network [23], such as on-chain and • In this paper, we present a detailed design of the
off-chain. The Sawtooth business logic (digital contracts) is IoT-blockchain-enabled wireless video surveillance-based
designed to achieve secure multimedia forensics investiga- investigational processes for multimedia forensics. And
tions, which are hard to tamper with because it is protected so, the paper highlights various related issues, limitations,
with a hash (SHA-256) encrypted. In addition, these pro- and security protection challenges of the current systems
tected ledgers in terms of chain-of-evidence are stored in faced in the analytical hierarchy of examination and com-
distributed file system storage (InterPlanetary file system, putation, which is because of the unstructured lifecycle of
IPFS), which is immutable in nature [24]. The decentralized multimedia forensics.
nature of blockchain technology also enables digital foren- • A novel and secure wireless video surveillance monitoring
sics to enhance the investigational node defense ability using architecture are proposed, that aims to collect records in
cryptographic encryption, and the deployment of intrusion real-time and process this information forensically, such
detection provides prevention dynamically for wireless video as chain-of-custody. It is presented that the proposed IoT-
surveillance and related monitoring systems. The installation blockchain uses a hyperledger Sawtooth-enabled video
of anti-disclosure and firewall authentication software tools monitoring in accordance with the frame filtering, col-
creates a new paradigm in the digital investigation environ- laborative validation, and object-of-interest for digital
ment. Along with that, consensus policies and the digital investigation analysis.
signature of the hyperledger network guarantee robust secu- • In this paper, a security procedure follows to protect trans-
rity, protection, and privacy with efficient node deliverance in actions from one end to another; the system uses NuCypher
terms of immutability, integrity, transparency, and distributed Proxy Re-encryption algorithms with digital (smart) con-
node trust within the IoT-real time multimedia-related case tracts. The design and development of such contracts
under investigation [25]. support a multi-proof-of-work consensus protocol that cre-
ates a secure channel between participating stakeholders,
such as registration, video surveillance ledger transmis-
1.1 Motivation, Objectives, Contributions, sion, forensics transaction process validation/verification,
and Section Distribution and transaction updates on the private network.
• Sequence diagrams of this customized private permis-
This research paper deals with a secure and efficient sioned hyperledger Sawtooth network simulate the work-
IoT-enabled real-time video surveillance architecture, a ing operations of the proposed architecture. In addition,
blockchain hyperledger sawtooth-enabled digital forensics the authors choose this module since Hyperledger Saw-
investigation in multimedia technology. The proposed IoT- tooth is an open-source, distributed blockchain platform
blockchain video surveillance, automation transmission over employing intelligent smart contract functionality is also
the wireless network and provide proper multimedia-related highlighted.

123
10176 Arabian Journal for Science and Engineering (2023) 48:10173–10188

• For the proposed IoT-Blockchain, various implementation structure is designed. The main target is to provide the cur-
challenges and limitations rises that become open issues rent IoT-multimedia forensics investigational information
for futuristic developments are separated and discussed. integrity, transparency, confidentiality, provenance, secure
storage, and resist forgery or tampering.
Several blockchain hyperledger-forensics-based methods
The rest of the paper is structured as follows. In Sect. 2,
concentrate on specific solutions that include a combination
we discuss various IoT-blockchain hyperledger Sawtooth-
of IoT-blockchain enabled distributed technology and dig-
enabled real-time video surveillance, monitoring, and secu-
ital forensic investigation processes and strategies [37], as
rity and digital forensics secure architectures for multimedia
discussed and mentioned in Table 1. In our proposed solu-
process investigation and chain-of-custody related literature
tion, we cover the complete process of IoT-digital forensics
and requirements. In Sect. 3, the current IoT-enabled wireless
investigation, video surveillance incident-related evidence
surveillance, forensics investigation analysis, and blockchain
collection with secure preservation and tackle various partic-
private network solution for secure ledger preservation, are
ipating stakeholders at the same time. We also provide and
discussed. Section 4 proposes the IoT-blockchain hyper-
ensure the security of the distributed network and platform
ledger Sawtooth-enabled secure architecture for the wireless
authentication that handles the evidence custody and guar-
surveillance forensics investigation process. In Sect. 5, we
antees preservation in a chronologically ordered, encrypted
discuss the working operation of the proposed architec-
ledger.
ture, and IoT-blockchain implementation limitations are
presented. Finally, conclusions appear in Sect. 6.

3 Current Wireless Surveillance Forensics


Investigation Using IoT
2 Related Work
Traditional video surveillance systems are dependent on
This section discusses various related literature on IoT-
various external equipment along with human operators.
blockchain enabling existing processes, proposed lifecycles,
And so, the evolution of the video surveillance system, the
digital forensics investigation procedures, real-time video
advent of an automated surveillance system, is gaining more
surveillance enrolment, and environmental limitations. In
attention and bringing priority because of the effectiveness,
this manner, several works are presented that highlights the
efficiency, and reliability of the system [38]. The adoption
role of cameras. Include the cameras on the edge have their
and use of advanced intelligent wireless video surveillance
own computation and communication capabilities and are
systems have recently reached a peak. This wireless intelli-
connected to the IoT-cloud via a wireless network for multi-
gent system identifies abnormal behavior and patterns in the
media transmission-related details [26]. The authors in [27,
video by developing a digital forensics investigation process
28] presented the advantages of the digital forensics pro-
with artificial intelligence. It enables efficient monitoring
cess, which offers IoT-video surveillance investigation, but
and accurate capture of the whole scenario with just a few
unfortunately, did not discuss the multimedia-based evidence
observers. Wireless IP (third generation) video surveillance
preservation solution in the run-time investigation and its
outperforms traditional video surveillance, with increased
involving events in the process of digital analysis, storage,
processing power and compression [37, 38]. For instance,
and sharing information through wireless network transmis-
this new category of wireless video surveillance has a sub-
sion based on different external portable devices on the cloud.
stantial impact on marketplace security and sensor control.
Li et al. discussed the blockchain-digital forensics investiga-
The components of this system are interconnected by several
tion framework for IoT and IPFS secure distributed storage
cameras (with connected IPs) and are ID protected. The IoT-
for evidence preservation that concerns the clear audit trail
forensics investigation process in multimedia technology and
and handles security issues, especially authentication, con-
blockchain-based solutions discussed in the subsections is as
trol access, availability, and lack of data traceability [29]. Ryu
follows.
et al. presented a blockchain-forensics investigation frame-
work for the Internet of Things. This solution is designed and
implemented to enable public network IoT-forensics investi- 3.1 IoT-Digital Forensics Investigation Process
gation for making authorship trust in the cloud [30]. in Multimedia Technology
In this paper, various related works and published litera-
ture is reviewed critically, where we found gaps in the previ- In IoT-forensics investigations, digital cameras and
ous solutions. In this manner, we proposed IoT-Blockchain multimedia devices such as mobile phones, handheld
using Hyperledger Sawtooth technology, a private per- ubiquitous devices are daily seized as a source of
missioned network (with distributed ledger transactions) evidence [39]. Video extraction from these devices

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10177

Table 1 Related work on IoT-real


time video surveillance Research method Proposed work Research Gaps References

A blockchain-based lawful M. Li et al. presented a Ethereum, [31]


evidence management blockchain-enabled public network,
scheme for digital lawful evidence permissionless
forensics management method, architecture
namely “LEChain”. It
highlighted that the
proposed work
supervises, handle
evidence, secure flow
control, and manage
court trails
A blockchain-based digital G. Kumar et al. proposed a Cross-border legalization, [32]
forensics framework for blockchain-IoT public permissionless
IoT applications framework for digital network structure,
forensics investigations, consortium infrastructure
which provides a using blockchain
distributed computing, ethereum
decentralized,
transparent forensics
investigation of
IoT-based digital
evidence in cross-border
environments
A Role of Internet of things M. Stoyanova et al. Issues in video-based [33]
(IoT) in digital forensics discussed the different evidence analysis,
collaborative studies of application-specific
blockchain-IoT-enabled standardization,
digital forensics certification problems in
investigation IoT-forensics,
frameworks. This paper automation,
covers several issues interoperability issues
involved in the complex
process of IoT-Forensics
investigation
A recent challenges and O. Akter et al. presented a Evidence segregation in the [34]
limitations in cloud blockchain-enabled cloud,
forensics with blockchain solution for IoT-cloud IP anonymity,
forensics investigation. A lack of cloud-IoT data
blockchain zone-based transparency,
approach is proposed for permissionless public
the forensics process in network
which IoT-forensics
investigations are split
into three zones (IoT,
cloud, and digital
investigation)
Cryptography hash P. Velmurugadass et al. Hash encryption SH-256, [35]
algorithms are being used developed cloud-based Harmony search
to improve blockchain software, defined optimization,
security in cloud networks, and altered the Elliptic curve integrated
environments forensics process for encryption scheme,
IoT-smart applications; public network,
this solution consists of permissionless,
nearly a hundred high security but more
multimedia external complex
devices, open flow
switches, and
blockchain-based
controllers with the cloud
server and authentication,
as well as investigation

123
10178 Arabian Journal for Science and Engineering (2023) 48:10173–10188

Table 1 (continued)
Research method Proposed work Research Gaps References

An autonomous log storage C. L. Hsu et al. presented Cross-border evidence [36]


management protocol an autonomous log legality,
with blockchain storage management attribute-based control
protocol with blockchain access,
distributed security gateway and server
technology investigation permission issues,
and control access via public communication,
IoT blockchain
permissionless network

Fig. 2 Process model for IoT-forensics investigation

is widely used in digital crime evidence and inves-


tigation, which helps to find key forensics evidence
materials (and fragments of evidence items) and estab-
lish links between evidence materials [40]. The IoT-
real-time video surveillance systems are used for res-
idential as well as commercial areas, such as malls,
banks, parks, parking, stores, traffic, and transporta-
tion, where video-based evidence is retrieved from
devices that can be used as digital evidence (crime
incidents) for further investigation process as shown
in Fig. 2. Initially, the captured footage of particular
scenes in digital forensics is often used for compar-
ative analysis [39], including forensics subject areas
such as tuning of frame filtering, collaborative vali-
dation, and object-of-interest (specific objects), with
forensics expert opinion being provided on this find- Fig. 3 IoT-real time video surveillance camera distribution diagram
ing. Examine the real-time identity of suspects through
embedded facial recognition services (AI techniques).
IoT-Forensics also examine object motion detection, sleep mode, cameras capture video at a low frame rate (15–20
gesture, and cross-pose recognition, etc., for the pur- fps) [2, 39]. Every camera has its own independent video pro-
pose of smooth investigation analysis. The quality of cessing system with an embedded core processor [40]. And
the footage matters in the case investigation, poor qual- so, with no GPU, we consume less computational power on
ity would significantly reduce the level of confidence of video streaming, but unfortunately, this system cannot handle
the digital forensics investigational process [41]. Thus, high computational video capturing (only surveillance) and
the documented records cannot be presented as strong processing tasks. All these cameras are connected directly to
evidence in a court of law. the central storage, where they transmit all recorded data and
save it in different folders with date and time.
The wireless video surveillance forensics camera analysis In this way, the IoT-forensics investigation process is
process has overlapping monitoring areas at specific times- applied to the saved data, and it initiates with the video-based
tamps and communicates with the embedded short-range crime incident evidence collection to preserve and present
Wi-Fi (wireless fidelity) module via less bandwidth usage this report in the court of law, as already discussed earlier
as shown in Fig. 3. The individual camera has two distinct in this section. This complete scenario of digital evidence
modes of monitoring, one is the active mode, where cameras preservation in cloud-based (centralized server) storage is
capture video at a high frame rate (50–60 fps), while in the still insecure. To make this chain-of-evidence secure, we

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10179

used blockchain hyperledger Sawtooth, a permissioned pri- variety of actions sequentially. Whereas the participating
vate network modular architecture that provides evidence stakeholders can create a request by posting a transaction on
integrity, transparency, immutability, provenance, and secure this blockchain private network.
distributed ledger storage (IPFS). The IoT-Forensics contracts are more accurate because the
program code is fixed and cannot be changed, which means
3.2 Blockchain Distributed Security and Privacy completely immutable; there is also a blockchain hyperledger
for IoT-Forensics Sawtooth consume low execution risk, reduce cost, fewer
intermediaries, is speedy, and provide real-time updates, and
This section presents the blockchain solution for IoT- support IoT-video surveillance process of investigation and
Forensics investigation that allows the decomposition and forensics infrastructure. Moreover, it provides a securely
maintain the hyperledger Sawtooth blockchain enabling real- protected storage file structure for the process of forensics
time video data applications and recording in a systematic investigation, a platform that allows preserving IoT-Forensics
manner [41]. This solution identifies the common dimensions incident evidence and investigation reports and presenting
and domain requirements based on blockchain security pro- these encrypted records in the court of law.
tection. The Sawtooth private permissioned network provides
a partially decentralized blockchain in which only partici-
pating nodes get permissioned by IoT-Forensics engineers in 4 Real-Time Video Surveillance Forensics
the consensus process, digital contracts, and nodes of busi- Investigation Architecture Enabled by IoT
ness rules. The engineer also manages the stakeholders and with Blockchain
trusted parties and the cryptographic hash encrypted storage
which is commonly shared and exchanged by permissioned The proposed architecture presents the complete IoT-
nodes of IoT-video surveillance transactions and secures the Forensics chain-of-evidence capturing hierarchy, where the
process of investigation [40, 41]. This modular architec- protection of video surveillance data in the distributed envi-
ture demonstrates the multi-chaining concept in IoT-video ronment is the main feature. Secondly, the lifecycle of
surveillance digital forensics investigation; a few crucial key individual node transactions between participating stake-
factors related to IoT-Forensics transactions and the process holders is designed, that handle processes of data records
of digital investigation are discussed as follows: (such as capturing, examining, analyzing, preserving, pre-
senting, and documenting) through a customized Sawtooth
• On-Chain: Available distributed ledgers that are visi- consensus protocol. The proposed IoT-Blockchain aims to
ble to the connected participating stakeholders on this update the incident ledger, such as case reports, evidence col-
permissioned private network. It records all IoT-video lection, judiciary decisions, etc. With the NuCypher Proxy
surveillance transactions on the node and shares them with Re-encryption, it ensures the integrity and transparency of
the entire forensics blockchain. Thus, since these transac- wireless sensors-enabled cameras’ video recording preser-
tions are irreversible and cannot be altered (immutable), vation. Whereas only IoT-Forensics Sawtooth engineers
for completing the transaction, there has to be an agreed authenticate and authorize the request of participating stake-
number of stakeholder confirmations. holders regarding the access of blockchain features, such as
• Off-Chain: These transactions are not published on the reading chain-of-evidence and reporting, accessing, trans-
main blockchain hyperledger Sawtooth permissioned pri- action updates, and submitting registration applications. It
vate network. However, the third parties (a guarantor) is possible through the proposed Distributed application
who are involved in this chain are able to choose to have (DApp), as shown in Fig. 5. In addition, Sawtooth Engineer
an agreement outside of the blockchain, and they are also manages all IoT-surveillance chain-of-evidence access
responsible for the confirmed completion of the transaction requests for approval from different stakeholders (such as
(actual transaction execution) and certifying the agree- victim, accused, investigator, enforcement agency, and court
ment. IoT-Forensics transactions can be carried out using a of law) over the proposed permissioned private network
multi-signature-based solution. This chain can be instantly which two intercommunication channels, such as on-chain
executed as compared to on-chain transactions. and off-chain. For instance, the case investigator/forensics
expert handles logs of video file storage management and
Digital contracts in blockchain hyperledger sawtooth- checks transaction redundancy and tackles the filtering video
enabled IoT-Forensics (such as reg(), addNode(), frame sequence and collaborative validation problems by
updateNodeTrans()) are made up of programable code enabling the IoT-surveillance duplication restriction and
that stores files and keeps track of account balances [42]. forensics analysis tools. Whereas the evidence is preserved
The IoT-Forensics Sawtooth engineer executes these con- in the InterPlanetary File Storage (IPFS), a distributed IoT-
tracts with the use of consensus protocols to agree upon the Forensics video surveillance evidence storage structure. The

123
10180 Arabian Journal for Science and Engineering (2023) 48:10173–10188

primary objective of this storage is to preserve case-related The other features of the proposed work in the video surveil-
transactions, recorded evidence reported and presented doc- lance environment are discussed as follows: securing incident
umentation, case trails, the court of law and settlement investigation (identification of objects of interest), maintain-
information, and judiciary decisions. ing chain-of-evidence confidentiality, integrity, transparency,
However, the proposed blockchain hyperledger Sawtooth- and availability of 24/7 with automation.
enabled a secure and protected IoT-Forensics investigation
architecture for real-time video surveillance. To do a secure 4.1 Transaction Execution and Store Distributed
investigation, the process hierarchy of incidence response to Ledger of IoT-Digital Forensics Investigation
detect suspicious activities is proposed. The lifecycle of the in Chain-of-custody
proposed investigation process is as follows: (i) capturing
data from cameras through wireless sensors, (ii) examin- Through the process of storing IoT-video surveillance-
ing, (iii) analyzing, (iv) preserving, (v) presenting, and (vi) based captured suspicious activities, records are preserved in
documenting. There is a customized Sawtooth off-chain IPFS (a distributed external blockchain hyperledger storage
communication channel designed between the stakeholders file structure) for IoT-Forensics investigation and recorded
for the sake to initiate transaction processors. This can val- chain-of-evidence traceability. These chains of evidence
idate Sawtooth node interconnectivity (Peer-to-Peer (P2P)), are exchanged only among the participating stakeholders
state, consensus, and CLI sawtooth as shown in Fig. 4. within the private permissioned network. In IoT-Forensics,
On the other side, on-chain (implicit) communication con- the IPFS distributed storage leverages high efficiency for
nects to the main sectors of IoT-Forensics real-time video forensics video frame filtering, collaborative validation, and
surveillance process. It works as a respondent, while inci- point-of-object related information record storage. This stor-
dent transactions occur in the investigation hierarchy, such age structure enables chain-of-evidence exchange, transfer,
as frame filtering. It provides integrity and transparency to track, and trace, and preserves large video surveillance and
the Sawtooth case validator throughout implicit transaction digital forensics investigation-related records with domain
deliverance. To automate the transaction of the proposed efficiency, as shown in Fig. 4. Moreover, the IPFS stored
IoT-Blockchain, we designed, developed, and deployed dif- transaction nodes are fully cryptographic hash (SHA-256)
ferent digital contracts—to ensure the registration, validity of encrypted, which is the direct way to preserve the distributed
chain-of-evidence preservation, node peering and their inter- ledger on the blockchain hyperledger Sawtooth with robust
connectivity, sawtooth customized consensus verification security. For instance, this storage does not require any stake-
protocol for deliverance and active processor of transac- holder permit to exchange records with the selected one. With
tions. However, the programming interface of the Sawtooth the implementation of the IoT-Forensics node, transactions
state transfer protocol used to retrieve the IoT-Forensics execution and the processes of digital signature, announce-
chain-of-evidence-related objects, such as video surveillance ment, service delivery, endorsing, and verification protocols
recordings and objects-of-interest in the incident reported are presented in Fig. 5.
through the wireless network. Whereas the transaction pro- The large amounts of video surveillance-based recorded
cessor helps in investigation and maintain video file records files are used to trigger through individual Sawtooth business
in the distributed ledger. While a set of commands such rule (digital contracts). The transaction execution proposal is
as IoT-Forensics process, investigation, capture, examine, sent to the P2P connected nodes in the chain to endorse digital
analysis, preserve, and report tunes through the Sawtooth contracts, they execute the endorsement, and the distributed
Command Line Interface (CLI) that interacts with blockchain ledger is successfully endorsed, as shown in Fig. 5. How-
hyperledger security protection and storage services. ever, a digital signature provides an acceptance mechanism to
The acyclic transaction nodes’ interconnectivity shares the participating stakeholders, where they can able to accept
complex validation and verification. Whereas the customized changes involved in the process of the chain of custody. And
consensus policies manage participating stakeholder trans- so, it returns to the endorser to endorse the document and
actions, where it can initiate the request of accessing as exchange it among the stakeholders after the completion of
well as execute a transaction to the approval of update the endorsement process. The peering of nodes validates the
transactions—implemented in a separate process. A trusted integrity of IoT-Forensics case transactions and aggregates
transactional execution environment is designed that enables them onto the distributed ledger. For instance, the REST API
an efficient multithreading validation processes with the executes the complete running transactions delivered through
help of proof-of-work blockchain consensus. Substantially, the hyperledger Sawtooth directly; through this REST API,
the proposed distributed ledger architecture provides high the IoT-Forensics chain-of-evidence investigation system can
security for the digital forensic investigation process in an GET (meaning current state) and POST (meaning digital con-
IoT-wireless video surveillance environment. With the strong tract) node services in the peering private network. It also
performance of blockchain increase the adaptation in future. extracted the video surveillance investigation case records

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10181

Fig. 4 Blockchain hyperledger sawtooth enables novel and secure IoT-forensics investigation architecture for real-time video surveillance and
process of incident response

and the process of incident response from the various nodes


in the blockchain. The programmed ledger (contracts) of the
IoT-Forensics chain-of-evidence is stored on the Sawtooth
IPFS distributed storage.
These digital contracts are designed and implemented
(shown in digital contracts #1-#3) to create IoT-Forensics
recorded information integrity, transparency, immutability,
preservation, and provenance of the complete process of
investigation and maintain a secure exchange pathway among
participating stakeholders. This blockchain Sawtooth per-
missioned private network encrypted ledgers are immutable,
meaning they cannot be altered or manipulated, which means
there is no option for tampering or forging, and further
enhancing the tracking and traceability features of the pro- Fig. 5 The process of IoT-forensics evidence and incident response
posed architecture with security. transaction execution

4.1.1 Smart (Digital) Contract Implementation


in Fig. 5. We have presented three digital contracts for
In this proposed blockchain hyperledger Sawtooth-enabled IoT-Forensics video surveillance-based crime incident inves-
IoT-Forensics real-time video surveillance investigation and tigations and preserved the chain-of-evidence in a distributed,
the process of forensics evidence secure preservation archi- secure, and protected blockchain ledger. The pseudo-
tecture, we build a permissioned private channel in which representations of the designed and implemented digital
we restrict direct message delivery and receive transmission contracts are as follows (Table 2 and 3):
capability. The reason for the restriction is that IoT-Forensics The blockchain hyperledger Sawtooth enables IoT-
transaction privacy and integrity between the subspaces of Forensics investigation contracts and a customized Sawtooth
network stakeholders. consensus (proof-of-work) protocol for participating stake-
The functionality of digital contracts enables IoT- holders is initiate between the IoT-real time video surveil-
Forensics transactions and Sawtooth logic of business lance monitoring and the process of a digital forensic inves-
to invoke specific node execution on this private dis- tigation. To register new case records of the incident captured
tributed ledger. The digital contracts also handle the entire via surveillance cameras (including video frame filtering,
consensus protocol and execution of service delivery and collaborative validation, and point-of-interest) and monitor
digital signature in the process of transaction execution information of multimedia with the registration of participat-
operation on the blockchain communication network shown ing stakeholders for this case investigation. A reg() function is

123
10182 Arabian Journal for Science and Engineering (2023) 48:10173–10188

Table 2 Business Rule# 1 Table 3 Business Rule# 2

Smart (Digital) Contract #1: Stakeholders Participation (reg()) Smart (Digital) Contract #2: Blockchain-Forensics Node
Transactions (AddNode())
Input: IoT-Real Time Video Surveillance Forensics Engineer
Initialized System Address Input: IoT-Real Time Video Surveillance Forensics Engineer
Variable: int.main(): Initialized System Address
type.file[z]; Variable: int.main():
Video-based incident evidence case registration number, type.file[z];
(caseNum); track ID,
case details, (trackID);
(caseDetails); previous court of law decision,
case chain-of-custody, access (PCoLD);
(caseCOC); current decision
case decision, (current Decision)
(caseDecision); timestamp (execute);
go timestamp(execute), update records contract (UpdateNodeTrans());
IoT-Forensics Add Node Transaction Contract Address IoT-Forensics Engineer, counter (TranCounter)
(AddNode()), IoT-Forensics Engineer authorized to set add node
transactions registration; transactions addresses
(TranReg), if int.main(): type.file[z] is  IoT-Forensics Engineer
counter (TranCounter); then,
IoT-Forensics Engineer is authorized and responsible and if UpdateNodeTrans() is not Added in the digital contact
maintain a set of case transaction registration contracts; (AddNode())
if Tx.main() is   true then,
then, digital contract state will change and add new case node and
if caseNum is not the digital contact their details
then, update trackID, PCoLD, currentDecision, timestamp,
digital contract state will change and add new case node and execute,
their details and
update caseNum, caseDetails, caseCOC, caseDecision, UpdateNodeTrans();
timestamp, execute, else
and Error generate then backtrack;
AddNode(); terminate;
else else
Error generate then backtrack; Error generate then backtrack;
terminate; terminate;
else
Error generate then backtrack;
terminate; (AddNode()), respectively, shown in digital contract 3 (Table
4).

created to add and execute IoT-Forensics chain-of-evidence- 5 Operations of the Proposed IoT-Real Time
related information and is used by IoT-Forensics engineers Video Surveillance Investigation
to record the details of stakeholders and permission them
according to the consensus protocol. Whereas the AddNode() 5.1 Simulations and Results
function is designed to add new transactions that occur dur-
ing the investigation process (including chain-of-evidence In this paper, we used the VIRAT-2020 temporal real-time
examine, analysis, preserve, report, generation, presentation, video surveillance public repository dataset/database. It is
court trial, and settlement) and execute updated information designed to be realistic multimedia streaming, diverse scenes,
in the UpdateNodeTrans() contract, which updates all trans- completely natural human events, and categories-based, rec-
action history with the new AddNode() related information ognized actions, and clutter background related videos. It is
and shares it among the chain stakeholders. a well-known benchmark dataset for artificial intelligence,
These contracts also record additional IoT-Forensics IoT, and multimedia-based communities. This dataset pro-
related information such as update caseNum, caseDetails, vides a wide range of temporal resolution, which is designed
caseCOC, caseDecision, update trackID, PCoLD, current- to capture these ranges with 20–200 pixels and a frame rate
Decision, update assAddress, CurrentTrans, previousTrans, of 2–30 Hz. And so, it provides both the original video with
calTrans, timestamp, and other activity execute steps. Fur- downsampled and high-definition quality [43].
thermore, the well-deployed UpdateNodeTrans() contract The simulation is executed for the temporal real-time
exchanges its updated addresses with the other contracts video surveillance stream to detect suspicious activities and

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10183

Table 4 Business Rule# 3

Smart (Digital) Contract #3: Blockchain-Forensics Updated


Node Transactions (UpdateNodeTrans())

Input: IoT-Real Time Video Surveillance Forensics Engineer


Initialized System Address
Variable: int.main():
type.file[z];
assign address (assAddress);
current;
timestamp(execute),
current transaction (CurrentTrans);
previous transaction (previousTrans), IoT-Forensics Engineer
IoT-Forensics Engineer, calculate total transactions (calTrans)
IoT-Forensics Engineer authorized and responsible to set the
digital contract updates
if Tx.main() is IoT-Forensics Engineer
then,
if AddNode(), UpdateNodeTrans() is not Added in the digital
contact
then,
digital contract state will change and add new case node and
update their details
update assAddress, execute, CurrentTrans, previousTrans,
calTrans, timestamp,
and
UpdateNodeTrans();
else
Error generate then backtrack;
terminate;
else
Error generate then backtrack;
terminate;

Fig. 6 IoT-real time camera-based original video surveillance recording


(1), convert recorded image into gray scale (2), examine and analyze
crime incidents that occurred in the captured footage, as real-time scene (3), and detect the suspicious activity and register inci-
shown in Fig. 6. And so, the outputs are examined and dent evidence by comparing to the preserved data
analyzed through the process of a multimedia forensics inves-
tigation. Based on IoT-based video surveillance, real-time
captured data input, analysis of the individual objects in the
scene, and the output of the video presented to the suspi- surveillance and the process of digital forensics investiga-
cious activities’ detection in the footage and preserved report tion distributed architecture. In this proposed ecosystem, we
against the incident can be viewed, as shown in Fig. 6. This design and created platform for ledger protection, where the
complete procedure reduces the consumption of resources encryption complexity is set to be high, and robust in the
constraints down to 11.56%. overall process execution of dynamic investigation.
Each frame is filtered, examined, validated, analyzed, Despite this, the low processing and simplicity can affect
stored, and presented the IoT-Forensics investigation coding the system security and the quality of streaming video
in accordance with the business rule is designed, shown in surveillance forensics investigation. In this regard, the IoT-
Fig. 7. On the other side, real-time streaming and video trans- streaming information is forwarded to the digital investi-
mission have also been analyzed, preserved, and reported gation, where the defined process analysis the sequence of
using secure blockchain hyperledger sawtooth-enabled pro- video frame filtration, collaborative validation, and detects
cess of digital forensics investigation, which results in high- the object shown in Fig. 8. This forensics investigation
security protection of chain-of-evidence (collected informa- coding is performed to obtain the IoT-streamed of video
tion), hash (SH-265) encrypted IoT-Forensics node transac- surveillance dynamic incident response and preserve infor-
tions, and robust performance of wireless video surveillance mation (chain-of-evidence) in the blockchain distributed
and transmission-related information processing. ledger. However, blockchain Hyperledger Sawtooth per-
With the development of the Blockchain Hyperledger missioned private network provides high integrity of the
Sawtooth-enabled Internet of Things based real-time video chain-of-evidence, participating stakeholders information

123
10184 Arabian Journal for Science and Engineering (2023) 48:10173–10188

Fig. 8 Calculate the IoT-real-time video surveillance frame filtering and


object analysis frequency, (1) examine and analyze the sequence of
frame filtering, collaborative validation, and object-of-intertest captured
in the video, (2) input and output of video surveillance point-of-interest
characteristics fluctuation, and (3) 3D demonstration of output features

interaction between stakeholders and digital signature with


the point of SHA-256 encryption.
The AddNode() contract is performed between the federal
investigation department and a court of law, where an IoT-
Forensics engineer manages the entire chain-of-evidence-
related transactions and tackles redundancy. Whereas the
Fig. 7 Wireless camera-based video surveillance recording and digi- UpdateNodeTrans() contract is performed between the Saw-
tal forensics investigation, (1) input of iot-real time video surveillance tooth validation and IoT-Forensics engineer and exchanges
object (point-of-interest) detection frequency calculation, (2) after updates among the stakeholders (checking if the stakeholder
forensics analysis the output of object-of-interest detection and their
frequency is registered, then allowing access), and all this information
is stored in a distributed digital ledger.

5.2 Implementation Challenges, Issues,


confidentiality, system provenance, evidence transparency, and Limitations
and immutability in stored records, as shown in Fig. 9.
Figure 9 depicts the private permissionless and without 5.2.1 Data Automation and Privacy with Smart Contracts
blockchain security [43, 44]. The authors in [43] and [44]
proposed a framework for Blockchain-IoT for multimedia The blockchain-IoT is a distributed, decentralized permis-
surveillance and investigation using a public network mod- sioned private network, where wireless video surveillance
ular structure, which is quite less secure for digital forensics captures and exchanges multimedia-related critical infor-
chain-of-evidence preservation. mation including the video frames filtered, collaborative
Figure 10 presents the working operation of the validation, and detection of objects-of-interest of the trans-
blockchain Hyperledger Sawtooth-enabled IoT-real time mitted IoT-wireless chain of nodes [45]. This information
video surveillance and process of digital forensics investiga- is recorded and stored in the core distributed ledger elec-
tion architecture, in which we have discussed the chain-of- tronically, where Hyperledger Sawtooth-enabled modular
evidence security, registration of participating stakeholders, architectures to allow access control of such sensitive evi-
investigation process validation, and IoT-Forensics node dence to the participating stakeholders. The challenging
transaction verification. The process initiates and executes problem is to restrict the duplication of video frames and
between the participating stakeholders and the federal inves- their filtering, which consumes more time with high exe-
tigation department once the sawtooth consensus protocol cution costs and increases the use of computational power.
reaches the level of record reg() contract, which is used for Although the traditional manual analysis procedures of frame

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10185

dependent on third-party preservation and security solutions


[18]. Additionally, these solutions are completely unreli-
able and inappropriate tools (unlicensed) are used for the
capture of IoT-multimedia-related information from exter-
nal portable devices and its analysis through distinct digital
forensics investigation methods [45].

5.2.3 Platform Interoperability Problem

A substantial adaptation of enterprise infrastructure across


various businesses to provide an effective and efficient solu-
tion to the users using distinct platforms, for example,
distributed ledger technology, enabled the legacy of the
system [45]. The existing legacy of IoT-video surveillance
forensics investigation procedural solutions is one of the
examples of a lack of interoperability. Weak implementa-
tion and system discontinuity can exacerbate scalability and
adoption issues [46, 47]. For instance, hyperledger tech-
nologies work on this issue, proposing a different system
for interoperability and trying to cope with this problem;
cross-chain blockchain can provide adaptability, scalabil-
ity, and interoperability solutions and efficiently overcome
these issues and maximize the interconnectivity between IoT-
multimedia environments.

5.2.4 Distributed Node Storage Challenge

In the current IoT-forensics environment, evidence chain


Fig. 9 Comparison of blockchain hyperledger, (1) display the compar- management is either preserved on the cloud storage or enter-
ison of blockchain-enabled IoT-forensics security with public hyper- prise personal central storage leads systems compromised
ledger, (2) display the comparison of blockchain-enabled iot-forensics
security with private permissioned hyperleder sawtooth [46, 47]. It is because of a lack of standardization with weak
privacy and security. Substantially, there is no proper way to
stop IoT-multimedia-related attacks and make them secure.
filtering, collaborative validation, and marking objects-of- By enabling the feature of blockchain, which is traceability,
interest are tedious, they lead to apathy and utilize more time the main objective is to resist forgery and tampering of chain-
and human effort in this newly distributed ledger technol- of-evidence throughout the process of chain-of-custody [18].
ogy [46]. For instance, the problems are analyzed in a way, In this scenario, the use of IPFS immutable file storage
that shows an increased process of automation of IoT-real- decentralized systems with the proposed IoT-blockchain
time video surveillance and forensics investigation evidence hyperledger Sawtooth modular structure alleviates these
traceability, which is still a major challenge in the blockchain types of challenges. In addition, blockchain technology pro-
hyperledger environment. vides real-time monitoring capability among the patients that
helps in the digital investigation in terms of video capturing,
5.2.2 Regulatory Compliance examining, identifying, analyzing, documenting, storing,
and presenting evidence in a court of law [47]. To auto-
Various problems are associated with the existing IoT- mate such transactions, the DApp is designed with business
digital forensics investigation process and the chain of rules to maintain the distributed ledger and related solutions
multimedia evidence, including fault tolerance, errors in the between nodes. It includes aiding the IoT-multimedia foren-
IoT-multimedia case investigation transactions, static inci- sics investigation authority, chain-of-evidence preservation
dent response, and record-keeping in the manual ledger or and custody, and in turn improving the integrity and trans-
cloud-enabled centralized server-based storage, especially parency of the collected chain-of-evidence.

123
10186 Arabian Journal for Science and Engineering (2023) 48:10173–10188

Fig. 10 Operation of validation and verification of the proposed blockchain hyperledger sawtooth-enabled IoT-forensics architecture through
sequence diagram

6 Conclusion A proposed blockchain-enabled digital forensics investiga-


tion ecosystem is deployed to bring tamper resistance to
This paper discusses the current challenges involved in the evidence. The use of Hyperledger Sawtooth enables
the IoT environment, especially in IoT with wireless sen- evidence-related participating stakeholders to register and
sors network-based real-time video surveillance, monitor- request, access, and record IoT-wireless video surveillance-
ing, existing examination, investigation, and security-related related node transactions through the Blockchain Sawtooth
problems. In this paper, the lifecycle of the existing IoT- distributed application (DApp) on the distributed ledger. And
enabled real-time video capturing from a surveillance camera so, Hyperledger Sawtooth is a permissioned private net-
and analyzing them dynamically is critical. It is because work that provides a modular framework that separates the
examining each frame filtering, collaborative validation, and core domain from the application system. By using this,
detection of objects of interest in a multimedia environ- we designed and implemented digital contracts (business
ment is complex, which is the most highlighted limitation rules) and accomplished the customized consensus policy
to consider in this paper. Substantially, after the examined (managing who can access/read and write in the forensics
and analyzed aspect of filtered objects of interest and pre- chain-of-custody) for core domain fault tolerance to simulate
serving all the transactions in the distributed storage as a a trustworthiness execution environment for the protected
chain-of-custody for further digital investigation is another evidence. We discussed the IoT-blockchain implementation
challenging prospect. In addition, to prevent individual cap- issues and limitations of the proposed wireless real-time
tured ledgers, the paper collaborates a digital forensics video surveillance and monitoring via the process of a digital
investigation process with the proposed blockchain hyper- forensic investigation.
ledger sawtooth architecture to securely protect the hierarchy
Acknowledgements I would like to thank Prof. Dr. Aftab Ahmed
of lifecycle, which makes chain-of-custody privacy. And
Shaikh (Dean Faculty of Information Technology/Chairman), Depart-
so, this can help in the real-time investigation of suspi- ment of Computer Science, Sindh Madressatul Islam University 74000,
cious activities and related crimes via the activated incident Karachi, and Dr. Asif Ali Laghari (Assistant Professor), Department of
response method. Thus, it is of utmost importance to assure Computer Science, Sindh Madressatul Islam University 74000, Karachi
for their supervision, continuous help, motivation, support, and guided
and guarantee the transparency, confidentiality, integrity, me with this dissertation. They allowed me to work on this disserta-
immutability, and provenance of analyzed evidence that is tion topic. Along with this, I would also like to thank my departmental
collected from wireless multimedia surveillance and preserve professors (teachers) wholeheartedly. This Ph.D. research is dedicated
its chain-of-custody during IoT-cloud crime investigation. to my mentors at Sindh Madressatul Islam University 74000, Karachi,
under whose constant motivation and guidance I have been able to
We proposed IoT-Blockchain video surveillance dis- complete this dissertation. In fact, they not only enlightened me with
tributed architecture for multimedia forensics technology. the academic knowledge but also gave me valuable advice whenever I
needed it the most.

123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10187

Author Contributions AAK has written original draft, organization, of things (IoT) domain. In: The Internet of Things for Smart Urban
preparation, and performed part of the literature survey, edited, design Ecosystems, pp. 305–331. Springer, Cham (2019)
modular architecture, explored the software tools, with rewrote the 15. Zikria, Y.B.; Afzal, M.K.; Kim, S.W.; Marin, A.; Guizani, M.: Deep
draft after reviewed. AAS (Supervisor) and AAL (Co-Supervisor) have Learning for Intelligent IoT: Opportunities, Challenges and Solu-
reviewed, suggested, and recommended a sort of improvements in this tions (2020)
paper. All the authors of this paper read and agreed to the online version 16. Gaddipati, M.S.S.; Krishnaja, S.; Gopan, A.; Thayyil, A.G.; Devan,
of the published article. A.S.; Nair, A.: Real-time human intrusion detection for home
surveillance based on IOT. In: International Conference on Infor-
mation and Communication Technology for Intelligent Systems,
Declarations pp. 493–505. Springer, Singapore (2020)
17. Rodda, A.; Mallika, S.S.; Jaiganesh, M.; Mrunalini, M.: Suspect
Conflict of interest The authors declare no conflict of interest. detection system–an architecture based on surveillance visual ana-
lytics using IoT. Mater. Today: Proc. (2020)
18. Khan, A.A.; Laghari, A.A.; Gadekallu, T.R.; Shaikh, Z.A.; Javed,
A.R.; Rashid, M.; Estrela, V.V.; Mikhaylov, A.: A drone-based data
References management and optimization using metaheuristic algorithms and
blockchain smart contracts in a secure fog environment. Comput.
1. Panda, S.K.; Sahu, S.K.: Design of IoT-based real-time video Electr. Eng. 102, 108234 (2022)
surveillance system using raspberry Pi and sensor network. In: 19. Xu, R.; Nikouei, S.Y.; Nagothu, D.; Fitwi, A.; Chen, Y.: Blend-
Intelligent Systems, pp. 115–124. Springer, Singapore (2021) sps: a blockchain-enabled decentralized smart public safety system.
2. Liu, Y.; Kong, L.; Chen, G.; Xu, F.; Wang, Z.: Light-weight AI and Smart Cities 3(3), 928–951 (2020)
IoT collaboration for surveillance video pre-processing. J. Syst. 20. Minoli, D.; Occhiogrosso, B.: Blockchain mechanisms for IoT
Architect. 114, 101934 (2021) security. Internet of Things 1, 1–13 (2018)
3. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, 21. Khan, P.W.; Byun, Y.C.; Park, N.: A data verification system for
I.H.: Convergence of blockchain and artificial intelligence in IoT CCTV surveillance cameras using blockchain technology in smart
network for the sustainable smart city. Sustain. Cities Soc. 63, cities. Electronics 9(3), 484 (2020)
102364 (2020) 22. Shaikh, Z.A.; Khan, A.A.; Teng, L.; Wagan, A.A.; Laghari, A.A.:
4. Raju, P.S.; Mahalingam, M.; Rajendran, R.A.: Review of intellec- BIoMT modular infrastructure: the recent challenges, issues, and
tual video surveillance through internet of things. In: The Cognitive limitations in blockchain hyperledger-enabled E-healthcare appli-
Approach in Cloud Computing and Internet of Things Technolo- cation. Wirel. Commun. Mob. Comput. 1, 1 (2022)
gies for Surveillance Tracking Systems, pp. 141–155. Academic 23. Almusaylim, Z.A.; Zaman, N.; Jung, L.T.: Proposing a data pri-
Press (2020) vacy aware protocol for roadside accident video reporting service
5. Khan, A.A.; Laghari, A.A.; Shaikh, Z.A.; Dacko-Pikiewicz, Z.; using 5G in vehicular cloud networks environment. In: 2018 4th
Kot, S.: Internet of Things (IoT) security with blockchain technol- International conference on computer and information sciences
ogy: a state-of-the-art review. IEEE Access (2022). https://doi.org/ (ICCOINS), pp. 1–5, (2018). https://doi.org/10.1109/ICCOINS.
10.1109/ACCESS.2022.3223370 2018.8510588
6. Vijeikis, R.; Raudonis, V.; Dervinis, G.: Towards automated 24. Kumar, M.S.; Vimal, S.; Jhanjhi, N.Z.; Dhanabalan, S.S.;
surveillance: a review of intelligent video surveillance. Intell. Com- Alhumyani, H.A.: Blockchain based peer to peer communication
put. 784–803 (2021) in autonomous drone operation. Energy Rep. 7, 7925–7939 (2021)
7. Zhou, Z.; Yu, H.; Shi, H.: Optimization of wireless video surveil- 25. Alamri, M.; Jhanjhi, N.Z.; Humayun, M.: Blockchain for Internet
lance system for smart campus based on internet of things. IEEE of Things (IoT) research issues challenges & future directions: a
Access 8, 136434–136448 (2020) review. Int. J. Comput. Sci. Netw. Secur 19(1), 244–258 (2019)
8. Ghosh, G.; Sood, M.; Verma, S.: Internet of Things based video 26. Guruprakash, J.; Koppu, S.: EC-ElGamal and Genetic algorithm-
surveillance systems for security applications. J. Comput. Theor. based enhancement for lightweight scalable blockchain in IoT
Nanosci. 17(6), 2582–2588 (2020) domain. IEEE Access 8, 141269–141281 (2020)
9. Khan, A.A.; Shaikh, A.A.; Cheikhrouhou, O.; Laghari, A.A.; 27. Zawali, B.; Ikuesan, R.A.; Kebande, V.R.; Furnell, S.: Realising
Rashid, M.; Shafiq, M.; Hamam, H.: IMG-forensics: multimedia- a push button modality for video-based forensics. Infrastructures
enabled information hiding investigation using convolutional neu- 6(4), 54 (2021)
ral network. IET Image Process. (2021) 28. Bourouis, S.; Alroobaea, R.; Alharbi, A.M.; Andejany, M.;
10. Zhang, J.; Xu, C.; Gao, Z.; Rodrigues, J.J.; de Albuquerque, Rubaiee, S.: Recent advances in digital multimedia tampering
V.H.C.: Industrial pervasive edge computing-based intelligence iot detection for forensics analysis. Symmetry 12(11), 1811 (2020)
for surveillance saliency detection. IEEE Trans. Industr. Inf. 17(7), 29. Li, S.; Qin, T.; Min, G.: Blockchain-based digital forensics inves-
5012–5020 (2020) tigation framework in the Internet of Things and social systems.
11. Sultana, T.; Wahid, K.A.: IoT-guard: event-driven fog-based video IEEE Trans. Comput. Soc. Syst. 6(6), 1433–1441 (2019)
surveillance system for real-time security management. IEEE 30. Ryu, J.H.; Sharma, P.K.; Jo, J.H.; Park, J.H.: A blockchain-based
Access 7, 134881–134894 (2019) decentralized efficient investigation framework for IoT digital
12. Wang, R.; Tsai, W.T.; He, J.; Liu, C.; Li, Q.; Deng, E.: A video forensics. J. Supercomput. 75(8), 4372–4387 (2019)
surveillance system based on permissioned blockchains and edge 31. Li, M.; Lal, C.; Conti, M.; Hu, D.: LEChain: a blockchain-based
computing. In: 2019 IEEE International Conference on Big Data lawful evidence management scheme for digital forensics. Fut.
and Smart Computing (BigComp), pp. 1–6. IEEE (2019) Gener. Comput. Syst. 115, 406–420 (2021)
13. Naeem, M.; Ejaz, W.; Iqbal, M.; Iqbal, F.; Anpalagan, A.; 32. Kumar, G.; Saha, R.; Lal, C.; Conti, M.: Internet-of-Forensic (IoF):
Rodrigues, J.J.: Efficient scheduling of video camera sensor net- A blockchain based digital forensics framework for IoT applica-
works for IoT systems in smart cities. Trans. Emerg. Telecommun. tions. Fut. Gener. Comput. Syst. 120, 13–25 (2021)
Technol. 31(5), e3798 (2020) 33. Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.;
14. Santamaria, A.F.; Raimondo, P.; Palmieri, N.; Tropea, M.; De Markakis, E.K.: A survey on the internet of things (IoT) forensics:
Rango, F.: Cooperative video-surveillance framework in internet

123
10188 Arabian Journal for Science and Engineering (2023) 48:10173–10188

challenges, approaches, and open issues. IEEE Commun. Surv. 43. Khan, A.A.; Shaikh, A.A.; Shaikh, Z.A.; Laghari, A.A.; Karim, S.:
Tutor. 22(2), 1191–1221 (2020) IPM-Model: AI and metaheuristic-enabled face recognition using
34. Akter, O.; Akther, A.; Uddin, M.A.; Islam, M.M.: Cloud foren- image partial matching for multimedia forensics investigation with
sics: challenges and blockchain based solutions. Int. J. Mod. Educ. genetic algorithm. Multimed. Tools Appl. 1, 1–17 (2022)
Comput. Sci. 10(8), 1–12 (2020) 44. Ranjith, J.; Mahantesh, K.: Blockchain-based knapsack system for
35. Velmurugadass, P.; Dhanasekaran, S.; Anand, S.S.; Vasudevan, V.: security and privacy preserving to medical data. SN Comput. Sci.
Enhancing Blockchain security in cloud computing with IoT envi- 2(4), 1–7 (2021)
ronment using ECIES and cryptography hash algorithm. Mater. 45. Khan, A.A.; Wagan, A.A.; Laghari, A.A.; Gilal, A.R.; Aziz, I.A.;
Today: Proc. 37, 2653–2659 (2021) Talpur, B.A.: BIoMT: a state-of-the-art consortium serverless net-
36. Hsu, C.L.; Chen, W.X.; Le, T.V.: An autonomous log storage man- work architecture for healthcare system using blockchain smart
agement protocol with blockchain mechanism and access control contracts. IEEE Access 10, 78887–78898 (2022)
for the Internet of Things. Sensors 20(22), 6471 (2020) 46. Liang, W.; Ji, N.: Privacy challenges of IoT-based blockchain: a
37. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y.: A survey of IoT systematic review. Clust. Comput. 1, 11–19 (2021)
applications in blockchain systems: Architecture, consensus, and 47. Shaikh, Z.A.; Khan, A.A.; Baitenova, L.; Zambinova, G.; Yegina,
traffic modeling. ACM Comput. Surv. (CSUR) 53(1), 1–32 (2020) N.; Ivolgina, N.; Laghari, A.A.; Barykin, S.E.: Blockchain hyper-
38. Kaur, R.; Ali, A.: A novel blockchain model for securing IoT based ledger with non-linear machine learning: a novel and secure
data transmission. Int. J. Grid Distrib. Comput. 14(1), 1045–1055 educational accreditation registration and distributed ledger preser-
(2021) vation architecture. Appl. Sci. 12(5), 2534 (2022)
39. Lone, A.H.; Naaz, R.: Applicability of blockchain smart contracts
in securing Internet and IoT: a systematic literature review. Comput. Springer Nature or its licensor (e.g. a society or other partner) holds
Sci. Rev. 39, 100360 (2021) exclusive rights to this article under a publishing agreement with the
40. Qatawneh, M.; Almobaideen, W.; AbuAlghanam, O.: Challenges author(s) or other rightsholder(s); author self-archiving of the accepted
of Blockchain Technology in Context Internet of Things: A Survey. manuscript version of this article is solely governed by the terms of such
Int. J. Comput. Appl. 975, 8887 (2020) publishing agreement and applicable law.
41. Oktian, Y.E.; Lee, S.G.; Lee, B.G.: Blockchain-based continued
integrity service for IoT big data management: a comprehensive
design. Electronics 9(9), 1434 (2020)
42. Atlam, H.F.; Azad, M.A.; Alzahrani, A.G.; Wills, G.: A review of
blockchain in Internet of Things and AI. Big Data Cognit. Comput.
4(4), 28 (2020)

123

You might also like