Abstract
Blockchain-based applications are arising because they ensure integrity, anti-tampering, and traceability. The data tampering risk is one of the main security concerns of data-centric applications. By the nature of the blockchain technology, it is befitting a revolutionary solution to mitigate the tampering risk. But there exists no proper guidance to explain how blockchain-based application could mitigate this risk. In this paper, we consider tampering risk management and discuss how blockchain-based applications could mitigate it. The study includes a comparison of different solutions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sato, T., Himura, Y.: Smart-contract based system operations for permissioned blockchain. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings 2018-Janua, pp. 1–6 (2018)
Chen, L., Lee, W.K., Chang, C.C., Choo, K.K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95, 420–429 (2019)
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: Proceedings of 17th IEEE/ACM International Symposium on Cluster. Cloud and Grid Computing, CCGRID 2017, pp. 458–467 (2017)
Iqbal, M., Matulevičius, R.: Blockchain-based application security risks: a systematic literature review. In: Proper, H., Stirna, J. (eds.) CAiSE 2019. LNBIP, vol. 349, pp. 176–188. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20948-3_16
Microsoft: Transaction Integrator Threat Mitigation (2017)
Study.com: What is Data Tampering? - Definition & Prevention
Fimin, M.: Five early signs of data tampering (2017)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Ruffy, F., Hommel, W., Eye, F.V.: A STRIDE-based security architecture for software-defined networking. In: ICN 2016, The Fifteenth International Conference on Networks, no. c, pp. 95–101 (2016)
Chen, J., Ma, X., Du, M., Wang, Z.: A blockchain application for medical information sharing. In: TEMS-ISIE 2018–1st Annual International Symposium on Innovation and Entrepreneurship of the IEEE Technology and Engineering Management Society, pp. 1–7 (2018)
Gallo, P., Quoc Nguyen, U.: BlockSee: blockchain for IoT video surveillance in smart cities Suporn Pongnumkul NECTEC Thailand. In: 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), pp. 1–6 (2018)
Dubois, É., Mayer, N., Heymans, P., Matulevičius, R.: Intent. Perspect. Inf. Syst. Eng. 2010, 1–384 (2014)
Matulevičius, R.: Fundamentals of Secure System Modelling, 1st edn. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-61717-6
Pradeepkumar, D.S., Singi, K., Kaulgud, V., Podder, S.: Evaluating complexity and digitizability of regulations and contracts for a blockchain application design. In: 2018 ACM/IEEE 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, no. 1, pp. 25–29 (2018)
Ali, S., Wang, G., White, B., Cottrell, R.L.: A blockchain-based decentralized data storage and access framework for PingER. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 1303–1308 (2018)
Cha, S.C., Chen, J.F., Su, C., Yeh, K.H.: A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access 6, 24639–24649 (2018)
Li, H., Zhu, L., Shen, M., Gao, F., Tao, X., Liu, S.: Blockchain-based data preservation system for medical data. J. Med. Syst. 42, 1–13 (2018)
Lin, C., He, D., Huang, X., Choo, K.K.R., Vasilakos, A.V.: BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116(February), 42–52 (2018)
Alcarria, R., Bordel, B., Robles, T., Martín, D., Manso-Callejo, M.Á.: A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors 18(10), 3561 (2018)
Hjalmarsson, F.P., Hreioarsson, G.K., Hamdaqa, M., Hjalmtysson, G.: Blockchain-based e-voting system. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 983–986 (2018)
Pop, C., et al.: Decentralizing the stock exchange using blockchain an ethereum-based implementation of the Bucharest stock exchange, pp. 459–466 (2018)
Yu, B., Liu, J.K., Sakzad, A., Steinfeld, R., Rimba, P., Au, M.H.: Platform-Independent Secure Blockchain-Based Voting System, vol. 2433. Springer, Heidelberg (2018)
Sylim, P., Liu, F., Marcelo, A., Fontelo, P.: Blockchain technology for detecting falsified and substandard drugs in distribution: pharmaceutical supply chain intervention. J. Med. Internet Res. 20(9), e10163 (2018)
Bhuiyan, Z.A., Wang, T., Wang, G.: Blockchain and big data to transform the healthcare, pp. 2–8 (2018)
Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)
García-Magariño, I., Lacuesta, R., Rajarajan, M., Lloret, J.: Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Netw. 86, 72–82 (2019)
Dai, H., et al.: TrialChain: a blockchain-based platform to validate data integrity in large. Biomed. Res. Stud. 1–7 (2018)
Ray, S.: Blockchains versus Traditional Databases (2017)
Dexter, S.: How Are Blockchain Transactions Validated? Consensus VS Validation (2018)
Owasp: Top 10–2017 A10-Insufficient Logging & Monitoring (2017)
Domain, C.P.: From Yahoo to Uber, major hacks of data
Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153–165 (2010)
Rao, U.H., Nayak, U.: Understanding Networks and Network Security, pp. 187–204. Apress, Berkeley (2014)
Dagan, G.: The Actual Networking behind the Ethereum Network: How It Works (2018)
Pozo, A.: Ethereum: Signing and Validating (2017)
Acknowledgement
This research has been supported by the Estonian Research Council (grant IUT20-55).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Iqbal, M., Matulevičius, R. (2019). Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk. In: Di Ciccio, C., et al. Business Process Management: Blockchain and Central and Eastern Europe Forum. BPM 2019. Lecture Notes in Business Information Processing, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-030-30429-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-30429-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30428-7
Online ISBN: 978-3-030-30429-4
eBook Packages: Computer ScienceComputer Science (R0)