IITM Journal of Management and IT
  • Year: 2025
  • Volume: 16
  • Issue: 2

A Survey on Secure and Scalable Cross-chain Provenance Techniques for Digital Forensics

  • Author:
  • S D Mohankumar1, J V N Lakshmi2, D Shashidhara3
  • Total Page Count: 12
  • Page Number: 88 to 99

1Research Scholar, REVA University, Bangalore

2Associate Professor, REVA University, Bangalore

3Research Scholar, PES College of Engineering, Mandya

Online Published on 19 February, 2026.

Abstract

Investigations of cybercrime today require forensic architectures that natively traverse multiple blockchains with ease while protecting and scaling evidence processing. Although blockchains support tamper- evident logs, their original single-chain architecture limits cross-platform interoperability and forensic scaling. Recent developments overcome these limitations such as zero-knowledge proofs supporting private but verifiable evidence verification, sharding architectures splitting state without compromising latency, and AI-based anomaly detectors identifying subtle tampering. But challenges remains like zero–knowledge proofs are computationally expensive, sharding poses intricate state-consistency problems and AI models need to be retrained constantly, incurring operational burden. Future research needs to make these pieces work for real-time, large-scale forensic applications by designing light-weight zero-knowledge constructs, self-tuning shard governance systems and compact AI with incremental-update threads. Integrating such abilities into single frameworks will offer privacy, scalability and security, supporting forensic processes for which courts will give credit in various, changing block-chain environments.

Keywords

Cross-Chain Interoperability, Digital Forensics, Blockchain Provenance, Security, Scalability