You are on page 1of 14

Evidence Protection System Using Blockchain

Technology

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


Under the Esteemed Guidance of Presented By
Mr. K.S.R PRASAD M.Tech., V.JYOTHI SRI 209P1A0574
Assistant Professor C.SIDDHARTHA 209P1A0579
T.MALLESWARA RAO 209P1A0595
A. REVATHI 209P1A0550
ABSTRACT
The Evidence Protection System uses a special kind of technology called
blockchain to keep evidence safe and secure. It's like a digital ledger that
records evidence in a way that can't be changed. This system doesn't have a
single point of control, which makes it harder for someone to tamper with the
evidence. It also uses smart contracts to automate tasks and make sure only
authorized people can access the evidence. Encryption and hashing are used to
protect sensitive information within the evidence while still allowing it to be
verified as authentic.
PROBLEM STATEMENT
The current ways of managing evidence in legal and investigative
processes have some problems. They often use centralized databases, which
can be easily hacked or accessed without permission. These systems might
not have strong enough security measures to keep sensitive information safe.
This can lead to data breaches or the unauthorized release of evidence. Some
systems also struggle to handle a large amount of evidence or
complex legal cases.
Literature Survey
1. Evidence Management System Using Blockchain and Distributed File
System
Author: Shritesh Jamulkar,Preeti Chandrakar,Rifaqat Ali,Aman Agrawal

The proposed secure evidence management system utilizes a custom


transaction family on Hyperledger Sawtooth to record and manage every
transaction in a distributed peer-to-peer file storage network (IPFS) using
blockchain technology. This ensures a secure and tamper-resistant
documentation
2. BLOCKCHAIN TECHNOLOGY FOR SECURING FORENSIC
EVIDENCE
Author: Dr. Reshma Banu,Deeksha G,M Preethi,Triveni S

Implementing a robust methodology involves integrating blockchain


technology for maintaining forensic evidence in a secure and immutable
manner. This involves creating a legal chain where reports pass through
various stages such as pathology and forensic labs, ensuring the permanence
of evidence.
3. Digital Forensics Using Blockchain

Author: Dr.S. Harihara Gopalan, S. Akila Suba, C. Ashmithashree,A.


Gayathri, V. Jebin Andrews

The methodology involves integrating blockchain technology into the Chain


of Custody process for electronic evidence protection. The approach includes
documenting consecutive steps using blockchain's decentralized network,
ensuring data integrity through hashing, and storing information in blocks
4. Block-DEF: A secure digital evidence framework using blockchain

Author: Zhihong Tian , Mohan Li , Meikang Qiu, Yanbin Sun , Shen Su

The proposed Block-DEF methodology employs a secure digital evidence


framework using blockchain, featuring a loose coupling structure. Evidence
information is stored on the blockchain, while the actual evidence is stored on
a trusted platform, preventing blockchain bloat.
EXISTING SYSTEM

Current evidence management systems in legal and investigative


processes often lack security and efficiency, risking tampering and
inaccuracies, undermining trust in court evidence, and relying heavily on
manual tracking methods.
DISADVANTAGES

• Delays, confusion, inefficiencies in legal process.

• Security breach affects evidence integrity.

• Slow, error-prone evidence transfer.

• Failure to integrate systems


PROPOSED SYSTEM
In simple terms, the project aims to create a system called the Evidence
Protection System (EPS) that uses blockchain technology to securely store
and verify evidence. This system keeps a record of evidence by creating a
digital timestamp, which makes it impossible to change or tamper with
the evidence. By using blockchain, the system avoids the risks of
centralization and ensures that the stored evidence is safe and
transparent. The project also uses tools like Ganache, Metamask, and
Flask to help manage and interact with the blockchain technology.
ADVANTAGES:
• Secure data integrity.
• Transparent evidence transfer.
• Simplifies verification process.
• Promotes legal interoperability.
• Ganache ensures data persistence.
• MetaMask enhances transaction security.
• Extension offers user-centric functionalities.
SOFTWARE REQUIREMENTS

➢Software Requirements:Python IDLE(3.7.0),Node Js,Visual Studio


Community Version,Ganache,MetaMask-Chrome Extension

➢Backend Framework:Python,Java Script,Solidity

➢Frontend Technologies:HTML,CSS,JavaScript,Bootstrap-4
HARDWARE REQUIREMENTS

➢ Processor: i5 and above

➢ RAM: 8GB and above

➢ ROM: 20GB and above


THANK YOU

You might also like