Bitcoin is a new form of global digital currency based on peer-to-peer network, enabling a new payment system, and also a completely decentralised cryptocurrency. The P2P network consists of a digital file listing transactions like a ledger, a copy of which is also maintained on every computer on the network, and the transactions are also broadcasted in the public ledger of the Bitcoin network. Anonymity is the core feature that makes Bitcoin popular among people around the world. This feature is attained through the Bitcoin addresses in the public ledger, which represents the users in the Bitcoin network. Because of the illicit use of Bitcoins, the level of anonymity has reduced even though the users are still using the anonymizers like TOR to keep the anonymity stronger to connect to the Bitcoin network. In this paper, we analyse the complete process of transaction of Bitcoins and the anonymity thatlies in that process. The study also focuses on finding the forensic artefacts and the investigative way of approach towards the Bitcoin using forensic tools. The forensic tools are used to analyse the web browser activities, local drive, hard disk image, cookies, downloads and session data related to Bitcoins. The attacker can relate the transaction of the users and can control the Bitcoin blocks by even delaying the transactions. This research will focus on the methods in which the memory and even mobile devices involved in the transaction could be captured and analysed.
[1]
Liam Morris.
Anonymity Analysis of Cryptocurrencies
,
2015
.
[2]
Christian Decker,et al.
Information propagation in the Bitcoin network
,
2013,
IEEE P2P 2013 Proceedings.
[3]
Björn Scheuermann,et al.
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
,
2016,
IEEE Communications Surveys & Tutorials.
[4]
Primavera De Filippi,et al.
Bitcoin
,
2019
.
[5]
Berkley A. Pamplin.
Virtual currencies and the implications for U.S. anti-money laundering regulations
,
2014
.
[6]
Leanne Stuhlmiller.
Mitigating virtual money laundering: An analysis of virtual worlds and virtual currencies
,
2013
.
[7]
Lamar D. Jones.
Examining the forensic artifacts produced by use of bitcoin currency
,
2014
.
[8]
Elisabeth Senmarti Robla.
Analysis of Reward Strategy and Transaction Selection in Bitcoin Block Generation
,
2015
.
[9]
Chen Zhao.
Graph-based forensic investigation of Bitcoin transactions
,
2014
.
[10]
Ghassan O. Karame,et al.
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
,
2012,
IACR Cryptol. ePrint Arch..
[11]
Edgar R. Weippl,et al.
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
,
2016,
Financial Cryptography.
[12]
Alex Biryukov,et al.
Bitcoin over Tor isn't a Good Idea
,
2014,
2015 IEEE Symposium on Security and Privacy.