Research Article

An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment

Algorithm 5

For forensic investigation.
Evidence as: input
Evidence as: inputGraph of evidence as an: output
(1)Begin
(2) Using the SBVM system, verify the investigator's identity.
(3) Determine the case’s evidence.
(4) Collect evidence in the form of {Evidence_Identity, Time_stamp, IP_Source, uploaded_User, accessed_User, Performed_Actions, Hash_Tn, Block Hash, Location_Attribute, virtual machine server, and OFS ID} from blockchain.
(5) Create an evidence graph by means of attributes of evidence.
(6) For every one of the evidence
(7)  Ensure that {Block_Hash && IP_Source} are right and correct.
(8)  If this is the case (Verification D True)
(9)  Verify the signature//Validation of evidence
(10)   If this is the case (Signature is valid)
(11)    Collect reliable evidence
(12)   Else
(13)    Prepare illegitimate evidence
(14)   End if
(15)  End if
(16) End for
(17)Prepare and share the copy of evidence with the jurisdictionary court.
(18)End