Skip to main content

Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 361))

Abstract

Blockchain-based applications are arising because they ensure integrity, anti-tampering, and traceability. The data tampering risk is one of the main security concerns of data-centric applications. By the nature of the blockchain technology, it is befitting a revolutionary solution to mitigate the tampering risk. But there exists no proper guidance to explain how blockchain-based application could mitigate this risk. In this paper, we consider tampering risk management and discuss how blockchain-based applications could mitigate it. The study includes a comparison of different solutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sato, T., Himura, Y.: Smart-contract based system operations for permissioned blockchain. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings 2018-Janua, pp. 1–6 (2018)

    Google Scholar 

  2. Chen, L., Lee, W.K., Chang, C.C., Choo, K.K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95, 420–429 (2019)

    Article  Google Scholar 

  3. Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: Proceedings of 17th IEEE/ACM International Symposium on Cluster. Cloud and Grid Computing, CCGRID 2017, pp. 458–467 (2017)

    Google Scholar 

  4. Iqbal, M., Matulevičius, R.: Blockchain-based application security risks: a systematic literature review. In: Proper, H., Stirna, J. (eds.) CAiSE 2019. LNBIP, vol. 349, pp. 176–188. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20948-3_16

    Chapter  Google Scholar 

  5. Microsoft: Transaction Integrator Threat Mitigation (2017)

    Google Scholar 

  6. Study.com: What is Data Tampering? - Definition & Prevention

    Google Scholar 

  7. Fimin, M.: Five early signs of data tampering (2017)

    Google Scholar 

  8. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  9. Ruffy, F., Hommel, W., Eye, F.V.: A STRIDE-based security architecture for software-defined networking. In: ICN 2016, The Fifteenth International Conference on Networks, no. c, pp. 95–101 (2016)

    Google Scholar 

  10. Chen, J., Ma, X., Du, M., Wang, Z.: A blockchain application for medical information sharing. In: TEMS-ISIE 2018–1st Annual International Symposium on Innovation and Entrepreneurship of the IEEE Technology and Engineering Management Society, pp. 1–7 (2018)

    Google Scholar 

  11. Gallo, P., Quoc Nguyen, U.: BlockSee: blockchain for IoT video surveillance in smart cities Suporn Pongnumkul NECTEC Thailand. In: 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), pp. 1–6 (2018)

    Google Scholar 

  12. Dubois, É., Mayer, N., Heymans, P., Matulevičius, R.: Intent. Perspect. Inf. Syst. Eng. 2010, 1–384 (2014)

    Google Scholar 

  13. Matulevičius, R.: Fundamentals of Secure System Modelling, 1st edn. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-61717-6

    Book  Google Scholar 

  14. Pradeepkumar, D.S., Singi, K., Kaulgud, V., Podder, S.: Evaluating complexity and digitizability of regulations and contracts for a blockchain application design. In: 2018 ACM/IEEE 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, no. 1, pp. 25–29 (2018)

    Google Scholar 

  15. Ali, S., Wang, G., White, B., Cottrell, R.L.: A blockchain-based decentralized data storage and access framework for PingER. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 1303–1308 (2018)

    Google Scholar 

  16. Cha, S.C., Chen, J.F., Su, C., Yeh, K.H.: A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access 6, 24639–24649 (2018)

    Article  Google Scholar 

  17. Li, H., Zhu, L., Shen, M., Gao, F., Tao, X., Liu, S.: Blockchain-based data preservation system for medical data. J. Med. Syst. 42, 1–13 (2018)

    Article  Google Scholar 

  18. Lin, C., He, D., Huang, X., Choo, K.K.R., Vasilakos, A.V.: BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116(February), 42–52 (2018)

    Article  Google Scholar 

  19. Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)

    Article  Google Scholar 

  20. Hjalmarsson, F.P., Hreioarsson, G.K., Hamdaqa, M., Hjalmtysson, G.: Blockchain-based e-voting system. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 983–986 (2018)

    Google Scholar 

  21. Pop, C., et al.: Decentralizing the stock exchange using blockchain an ethereum-based implementation of the Bucharest stock exchange, pp. 459–466 (2018)

    Google Scholar 

  22. Yu, B., Liu, J.K., Sakzad, A., Steinfeld, R., Rimba, P., Au, M.H.: Platform-Independent Secure Blockchain-Based Voting System, vol. 2433. Springer, Heidelberg (2018)

    Google Scholar 

  23. Sylim, P., Liu, F., Marcelo, A., Fontelo, P.: Blockchain technology for detecting falsified and substandard drugs in distribution: pharmaceutical supply chain intervention. J. Med. Internet Res. 20(9), e10163 (2018)

    Google Scholar 

  24. Bhuiyan, Z.A., Wang, T., Wang, G.: Blockchain and big data to transform the healthcare, pp. 2–8 (2018)

    Google Scholar 

  25. Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)

    Article  Google Scholar 

  26. García-Magariño, I., Lacuesta, R., Rajarajan, M., Lloret, J.: Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Netw. 86, 72–82 (2019)

    Article  Google Scholar 

  27. Dai, H., et al.: TrialChain: a blockchain-based platform to validate data integrity in large. Biomed. Res. Stud. 1–7 (2018)

    Google Scholar 

  28. Ray, S.: Blockchains versus Traditional Databases (2017)

    Google Scholar 

  29. Dexter, S.: How Are Blockchain Transactions Validated? Consensus VS Validation (2018)

    Google Scholar 

  30. Owasp: Top 10–2017 A10-Insufficient Logging & Monitoring (2017)

    Google Scholar 

  31. Domain, C.P.: From Yahoo to Uber, major hacks of data

    Google Scholar 

  32. Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153–165 (2010)

    Article  Google Scholar 

  33. Rao, U.H., Nayak, U.: Understanding Networks and Network Security, pp. 187–204. Apress, Berkeley (2014)

    Chapter  Google Scholar 

  34. Dagan, G.: The Actual Networking behind the Ethereum Network: How It Works (2018)

    Google Scholar 

  35. Pozo, A.: Ethereum: Signing and Validating (2017)

    Google Scholar 

Download references

Acknowledgement

This research has been supported by the Estonian Research Council (grant IUT20-55).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mubashar Iqbal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iqbal, M., Matulevičius, R. (2019). Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk. In: Di Ciccio, C., et al. Business Process Management: Blockchain and Central and Eastern Europe Forum. BPM 2019. Lecture Notes in Business Information Processing, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-030-30429-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30429-4_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30428-7

  • Online ISBN: 978-3-030-30429-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics