i-manager's Journal on Digital Forensics & Cyber Security (JDF)


Volume 3 Issue 1 January - June 2025

Research Paper

Blockchain-Based Secure Architecture for Electronic Health Records Management using Smart Contracts and Attribute-Based Encryption

Suneetha Eluri* , Dhana Lakshmi Gorle **, Kanthi Rekha Miriyala***
*-*** Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India.
Eluri, S., Gorle, D. L., and Miriyala, K. R. (2025). Blockchain-Based Secure Architecture for Electronic Health Records Management using Smart Contracts and Attribute-Based Encryption. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 1-10. https://doi.org/10.26634/jdf.3.1.21747

Abstract

Electronic Health Records (EHRs) are essential for modern healthcare systems but continue to face significant challenges related to security, interoperability, and patient-centered control. This paper presents a novel Blockchain-based Electronic Health Records Abstract System (BEAS) that integrates Ethereum smart contracts with Attribute-Based Encryption (ABE) and the Elliptic Curve Integrated Encryption Scheme (ECIES) to strengthen data security and enhance patient autonomy. The system utilizes the InterPlanetary File System (IPFS) for efficient off-chain storage and employs Attribute-Based Access Control (ABAC) to ensure scalable and flexible data access. Experimental results show a 30% reduction in transaction execution time compared to conventional systems, along with improved access control and data integrity. Future enhancements will focus on optimizing encryption performance, expanding the roles of healthcare providers such as nurses, and exploring scalable storage solutions to further improve system efficiency.

Research Paper

Optimized Hybrid Encryption Framework for Securing Real-Time Route Information in Intelligent Vehicular Networks

Rama Mahitha Chowdary* , Gonugunta Lakshmi Prasuna**, Uppada Kumari Pragna***
*-*** Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh, India.
Chowdary, R. M., Prasuna, G. L., and Pragna, U. K. (2025). Optimized Hybrid Encryption Framework for Securing Real-Time Route Information in Intelligent Vehicular Networks. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 11-25. https://doi.org/10.26634/jdf.3.1.21766

Abstract

Securing route information in Vehicular Ad-Hoc Networks, VANETs, is essential for maintaining privacy, data integrity, and real-time responsiveness in vehicular communications. This research introduces an enhanced hybrid encryption system that integrates Advanced Encryption Standard, AES, with Elliptic Curve Cryptography, ECC. The model demonstrates high efficiency with AES for symmetric encryption and employs ECC for secure asymmetric key exchange, thereby decreasing computational overhead compared to conventional RSA-based systems. The performance measurements underscore the framework's benefits. The execution time for encryption and decryption is significantly reduced compared to RSA+ECC hybrids. Memory consumption is optimized, requiring less space than similar methods. Energy usage is lower, making it suitable for battery-limited situations like electric and autonomous vehicles. Experimental findings indicate the framework's resilience in preserving data integrity in dynamic VANET contexts. Moreover, latency is minimized, facilitating real-time applications such as collision avoidance and traffic management. The findings confirm the AES+ECC paradigm as a scalable and efficient solution for VANETs, offering improved security and performance while addressing key challenges in intelligent transportation systems.

Research Paper

Healthcare Institutions Security Posture: An Open-Source Security Architecture Practical Implementation

Rashid Husain* , Manoj Komakula**, Rabia Khan***, Rajesh Tyagi****
*,*** Department of Computer Science, Sule Lamido University Kafin Hausa, Jigawa, Nigeria.
**,**** Department of Computer Science and Engineering, Amity University, Gurgaon, Haryana, India.
Husain, R., Komakula, M., Khan, R., and Tyagi, R. (2025). Healthcare Institutions Security Posture: An Open-Source Security Architecture Practical Implementation. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 26-33. https://doi.org/10.26634/jdf.3.1.21552

Abstract

The healthcare industry is a critical sector that demands robust cybersecurity measures to protect sensitive data and infrastructure. With the rapid evolution of cyber threats, attack vectors, and adversarial strategies, organizations and governments face significant challenges in ensuring data security. While extensive research exists on cybersecurity threats, breaches, and the efficacy of open-source security tools, their practical implementation in real-world healthcare settings particularly where financial constraints exist remain underexplored. This study proposes an Open Security Operations Center (SOC) architecture to strengthen cybersecurity in the healthcare domain, specifically addressing the protection of Personally Identifiable Information (PII). The proposed architecture will be rigorously tested for performance, and the results will be analyzed to assess its effectiveness. The findings will contribute to developing security frameworks that enhance the cyber resilience of small and medium-scale healthcare institutions while addressing the financial and operational challenges inherent in the cybersecurity landscape.

Research Paper

Digital Arrest in India: Driven Cybersecurity for National Digital Security

Reeti Chopra*
Department of Computer Science Engineering, VIT Bhopal University, Bhopal, Madhya Pradesh, India.
Chopra, R. (2025). Digital Arrest in India: Driven Cybersecurity for National Digital Security. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 34-43. https://doi.org/10.26634/jdf.3.1.22016

Abstract

India's rapid digital transformation has led to a significant increase in cybercrimes, including deepfake-enabled scams such as Digital Arrest fraud, highlighting the urgent need for advanced security solutions. This paper presents a novel Artificial Intelligence (AI)-driven cybersecurity framework specifically designed for real-time deepfake detection and anomaly analysis. The system employs advanced machine learning (ML) and deep learning (DL) techniques to identify inconsistencies in multimedia content, such as facial discrepancies, and detect unusual user behaviors, like suspicious financial transactions. Hypothetical results demonstrate that this AI approach yields superior threat detection rates, such as >95%, and significantly reduced false positives and response times, thereby minimizing financial losses and data breach costs. To address privacy concerns, the study emphasizes privacy-preserving AI methods. Future research will focus on enhancing AI model interpretability and exploring hybrid human-AI systems to contribute to safer digital environments and support sustainable digital transformation.

Research Paper

A Dual-Layer Approach for Image and Data Encryption using Logistic Map using Python

Godwin B.* , Reji M.**
*-** Department of Electronics and Communication Engineering, Rohini College of Engineering and Technology, Kanyakumari, Tamil Nadu, India.
Godwin, B., and Reji, M. (2025). A Dual-Layer Approach for Image and Data Encryption using Logistic Map using Python. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 44-48. https://doi.org/10.26634/jdf.3.1.21510

Abstract

Image encryption combined with data encryption has emerged as a critical tool for safeguarding sensitive information and maintaining secrecy. This study describes how to incorporate hidden text data within an image and encrypt it using complex techniques like logistic maps. This paper presents a secure approach for data and image encryption using pixel intensity manipulation and pixel shuffling. The suggested technique ensures that the original image may be recovered after decryption, while the secret data is kept safely hidden. The performance, benefits, and security analysis of the proposed encryption scheme are all explored in detail.

Research Paper

Barriers to Cashless Payment Adoption

Merla J. V.* , Deepha Jeya Merlin D.**
*-** Department of Commerce, Women's Christian College, Nagercoil, Kanyakumari, Tamil Nadu, India.
Merla, J. V., and Merlin, D. D. J. (2025). Barriers to Cashless Payment Adoption. i-manager’s Journal on Digital Forensics & Cyber Security, 3(1), 49-53. https://doi.org/10.26634/jdf.3.1.21336

Abstract

The cashless payment system has experienced significant growth within the banking industry due to its convenience and numerous benefits, which makes cashless payments more appealing to consumers than traditional cash transactions. Despite these advantages, customers face barriers that hinder the full adoption of cashless payment systems. At the same time, customer trust plays a vital role in the adoption process, with factors like reliability, transparency, security, privacy, and responsiveness in digital payment platforms. This research aims to examine the barriers and trust determinants of cashless payment adoption using a convenience sampling method with a sample size of 120 respondents from Kanyakumari District. The results indicate that security concerns, digital illiteracy, and inadequate infrastructure are the primary barriers, while privacy, security measures, responsiveness, and reliability are critical in building trust among users. The study suggests various measures such as improving infrastructure, enhancing security features, and educating customers to promote the growth and adoption of cashless payment systems. Addressing these barriers and enhancing the understanding of customer trust will foster the rapid growth and adoption of cashless payment systems.