Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks
Abstract
:1. Introduction
- Allows dynamic configuration of the BSW to protect them against internal and external attacks; and
- Enforces the configurations to ensure that execution of the workflow is indeed protected at run-time.
2. Proposed Methodology
- Participating entities that could be internal (i.e., part of the same organization) or external (i.e., third party);
- The role of entities in the workflow process (e.g., supplier, procurement, finance); and
- Workflow process based on the entities and operates as follows:
- (a)
- Defining dynamic constraints and configurations to secure interactions among participating entities against internal and external attacks; and
- (b)
- Enforcing the constraints and configurations to protect the execution of the workflow process against internal and external attacks at run-time.
2.1. Constraints
- Basic constraints that are atomic constraints on the values of various parameters, e.g., length of a parameter, range of the parameter’s value, and relationship between two or more parameters and
- Advanced constraints that include complex relationships among different constraints and may require additional computations, e.g., filtering safe participants based on a given list of safe participants.
Listing 1. Expressive language for constraints. |
<Constraints> → Expression <Expression> →Term | Bool | (Expression) | Expression ∧ Expression | Expression ∨ Expression | ¬ Expression <Bool> → A Java Boolean expression <Term> → A Java expression term |
3. Threat Model
- The interactions within the internal processes or parties, e.g., finance, inventory, or warehouse; and
- The interactions that involve the external processes or parties, such as supplier, vendors, or banks.
3.1. Internal Attack
3.2. External Attack
4. Implementation
- Workflow manager application (WMA) is a Java-based server application that
- (a)
- Implements all the business rules for the workflow process; and
- (b)
- Allows adding constraints and configurations to protect the execution at run-time; and
- (c)
- Stores interaction-related information and constraints in the MySQL database.
- Client is a web application client that provides an interface for interactions among all corresponding entities involved in the workflow process.
- Distributed ledger application (DLA) is a smart contract-based distributed ledger (Ethereum [20,22]) implemented using Solidity—a blockchain implementation language [21]—that:
- (a)
- Records all the requests (from the client) and responses (from the server) to prevent process workflow inconsistencies among the corresponding entities and to allow for future audits of the process; and
- (b)
- Executes smart contracts that automatically enforce the security and compliance of the business process workflow.
- Database is a MySQL-based storage of business information, which is exchanged between the client and the server. It does not need to be recorded on the public distributed ledger; it relates to entities and their data and other sensitive information.
4.1. Stage 1
- IF validated, then the DLA
- (a)
- Checks the compliance of the request with the workflow smart contract;
- (b)
- Records the desired information; and
- (c)
- Sends a positive acknowledgement to the WMA to process the request.
- IF NOT validated, then the DLA
- (a)
- Sends a negative acknowledgement to the WMA to deny the request;
- (b)
- Records the essential information; and
- (c)
- Records the negative response information for future reference of the request’s trust.
4.2. Stage 2
- IF the response is found valid and compliant, then the DLA
- (a)
- Sends a positive acknowledgement to the WMA; and
- (b)
- The WMA also sends the response to the client. Importantly, the response includes essential information from the request to ensure that the right client is receiving the response.
- Otherwise, the DLA
- (a)
- Records the essential information about the negative response; and
- (b)
- Suspends the process by sending an appropriate signal to the client.
- Organize module, which performs the following operations:
- User registration—by providing the user’s details.
- Organization registration—by providing the organization’s information and its role in the supply chain process, e.g., supplier or consumer.
- Procurement module, which performs the following operations:
- Issuance of purchase requisition—by adding product details that may include up to five items.
- Review of purchase requisition—by approving the best requisition.
- Supplier module, which performs the following operations:
- Issuance of quotation—by listing the amount for the product.
- Preparing supply of the product—by issuing the exact product details of the shipment.
- Warehouse module, which performs the following operations:
- Inspection of products—by inspecting the received product for compliance with the agreed purchase specification.
- Paying the cost—by paying the desired amount.
- Issue a purchase requisition.
- Obtain a quotation from different suppliers.
- Approve the best bid for the product.
- Obtain the supply from the chosen supplier.
- Receive the products and inspect them.
- Pay the amount.
5. Example Case Study
Supply Chain Process
- The procurement department initiates the demand (supply requirements) of items by issuing a purchase requisition (PR), which is
- (a)
- Later reviewed by another division of procurement that ensures the specification of the requested items; and
- (b)
- After review, the PR is sent to the financial department to check the availability of finances to handle/supply the requested items. If the financial department does not approve, then re-evaluation of the PR is requested to the PR initiator.
- If the financial feasibility of the PR is approved, then various suppliers are contacted after asking for tenders. Later,
- (a)
- Each supplier issues a quotation for the items as asked in the PR, which is later approved/disapproved by the procurement; and
- (b)
- For those suppliers, whose quotation is approved by the procurement, they start preparing items for supply along with their documentation, and finally, all prepared supply is delivered to the warehouse of the process organization.
- When the requesting warehouse receives delivery of the items, then
- (a)
- The warehouse inspects the delivered items to ensure they received the product as per specification (i.e., PR). The process of inspection of items may involve external entities, for instance, manufacturers who manufactured those products and/or other entities that could provide some certified testing and attestation of the product as per the given PR specification.
- (b)
- If the products received are consistent with the PR-based specification of those products, then the financial department of procurement pays the amount to the supplier and stores the products in the warehouse after their registration.
- (c)
- If the products received are not consistent with the PR specification, then the procurement contacts the supplier and investigates the reason for inconsistency, until the matter is settled.
The settlement is done in various ways, for instance, by replacing the delivered products, opting for another supplier, or a deduction in payment for the breach of contract.
6. Threat Detection
6.1. Example—Internal Attack
- A stakeholder W initiates a supply process for buying some product P by using the ICT application .
- Stakeholders X, Y, and Z bid for the product P using their apps , , and . For simplicity we assume , , , and are the same portal and are connected to each other to support digital operations.
- (a)
- The execution of the applications is protected by a run-time security monitor, which reports any violations when detected. The security monitor’s focus is to protect the local ICT applications.
- (b)
- All interactions among the applications are recorded in a distributed ledger (i.e., blockchain-based) with smart contracts that only protect the collective role (i.e., agreement) of the stakeholders in the supply chain process.
- Analogous to Stuxnet, an attacker attempts to modify the execution of (attack scenario). For instance, providing incorrect bid values to that the blockchain cannot detect because it does not know the local state of the stakeholder (the attack happens locally in the stakeholder’s system) and is not part of the collective agreement among stakeholders.
6.2. Example—External Attacks
- A stakeholder W initiates a supply process for buying some product P, using the ICT application .
- Stakeholders X, Y, and Z bid for the product P, using their apps , , and . For simplicity we assume , , , and are the same portal and are connected to each other to support digital operations.
- (a)
- The execution of the applications is protected by a run-time security monitor, which reports any violations when detected. The security monitor’s focus is to protect the local ICT applications.
- (b)
- All interactions among the applications are recorded in a distributed ledger (i.e., blockchain-based) with smart contracts that only protects the collective role (i.e., agreement) of the stakeholders in the supply chain process.
- There is an external attack on Stakeholder W’s infrastructure; it has an impact on the supply chain process, e.g., data of their customers have been breached or their system is compromised due to some other attack. The blockchain cannot detect this attack because it cannot directly use this information to protect the system, as it is not encoded on the smart contracts.
6.3. Complementary Protection to Blockchain-Based System
7. Related Work
- Allows to define a customized supply chain process based on participating entities and interactions among them and underlying business policies/rules for the process; and
- Ensures that the blockchain-based supply chain process is protected against internal and external attacks.
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A. Overview of Selected Applications of the Supply Chain Process
Definition | Application Areas | Work | Focus Areas | Benefits | Beneficiaries | Collaborations or Partnerships | Use of technology or Approach | Privacy and Security Concerns | |
---|---|---|---|---|---|---|---|---|---|
Everledger | A global ledger used to secure and track valuable items [36] | Diamonds, Gemstones, Minerals, Wines, Luxury items, Artwork | It maintains a permanent record of the history of valuable goods and luxury items needing provenance with transparency. To facilitate that, the chronology of the product’s ownership is recorded and tailored to involve the appropriate integrity markers. The products become tamper-proof as they are uploaded on the supply chain and it becomes possible to track their history and validate their authenticity [36] | Traceability, Provenance and anti-counterfeit | Verified identity, Secure sharing, Hybrid technology solution, Deep domain knowledge | Real-world solutions for all industries | True Image Solution, Ltd. (TIS) | Latest forensic approaches, NFC, RFID, IoT | Everledger offers secure sharing i.e., making use of advanced encryption and joint compute function to ensure 100% request and response anonymity |
BlockVerify | Using private blockchains, BlockVerify monitors the entire distribution network, trading partners, and product sourcing [37] | Pharmaceuticals, Diamonds, Luxury items, Electronics | A private blockchain is used which is highly transparent, scalable, and tamper-proof. Each product, before being stored on the tamper-proof blockchain, is assigned a unique identification code. This number can be accessed by anyone to check the authenticity of the product [37]. | Traceability, Provenance and anti-counterfeit | Identify counterfeits, Non duplicable, Companies verify, Global solution | Pharmaceuticals, Manufacturers | Trading partners | Blockchain technology, Customer level authentication, Track-and-Trace (TnT) technology | BlockVerify ensures anti-corruptible product security, i.e., each product is validated and recorded, so that even companies can not forge their own products |
Verisart | For protection of creation and ownership records, Verisat Artwork, collectibles | Using mobile device or computer, the museum quality record of the product is created in 2 easy steps. The most trusted ledger of the world then encrypts and timestamps these records. The sharing and transference of certificates can be done at any time. (Varisart, 2018) | Certification and verification of art | Documentation, Access, Privacy, Tagging | Artist studios, Galleries, Auction houses, Cultural organizations | Paddle 8, DACS, Artsystems | Blockchain technology, Encryption of records | Default privacy settings in Verisart keep significant data and information hidden and secured from public view | |
Modum | For global supply chain operations, Modum provides data integrity and authenticity [26] | Pharmaceuticals, Last mile logistics | Product-specific temperature are set at first place to activate modum sensor and its connection with the parcel after scanning shipment ID. During transit, modum measures temperature changes and stores data in tamper-proof sensor. As the shipment arrives, the scanning of shipment ID takes place to carryout immediate read-out of the sensor. The sensor is connected to the secured back-end for data verification and storing [26]. | Environmental audit of shipments | Sensing + monitoring, Events + actions, Prediction + Analytics | Pharma distributors | Swiss Port, SAP, Variosystems, University of Zurich, University of St. Gallen | Emerging technologies, Blockchain, IoT, AI | Modum logger is especially designed to ship high-volume pharmaceutical products in last mile logistics. It is cost-effective and has the highest level security, i.e., to ensure the authenticity of each data point, it is cryptographically secured |
Provenance | For greater transparency in supply chain, provenance believes in empowering brands to establish trust-based relationship using revolutionary technologies | Farmers’ cooperative, Fashion industry, Coconut supply chain | Membership is requested at the first step to start for free. Once the membership is confirmed, profile is developed and the product information is uploaded. That product information is then shared via retailers to showcase the attributes of the product which make it superior [38]. | Traceability, Provenance and anti-counterfeit | Trust, Collaboration, Integrity, Authenticity, Security, Loyalty | Business, Shoppers, Non-profit | Unilever, Sainsbury, Barclays, Standard Chartered [38] | Transparency tools, Traceability system | Provenance provides a data system for secure storing of information that is unchangeable, auditable, and open |
References
- El Hamdi, S.; Abouabdellah, A.; Oudani, M. Industry 4.0: Fundamentals and Main Challenges. In Proceedings of the 2019 International Colloquium on Logistics and Supply Chain Management (LOGISTIQUA), Paris, France, 12–14 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Gilchrist, A. Industry 4.0: The Industrial Internet of Things, 1st ed.; Apress: Berkely, CA, USA, 2016. [Google Scholar]
- Fraga-Lamas, P.; Varela-Barbeito, J.; Fernández-Caramés, T.M. Next Generation Auto-Identification and Traceability Technologies for Industry 5.0: A Methodology and Practical Use Case for the Shipbuilding Industry. IEEE Access 2021, 9, 140700–140730. [Google Scholar] [CrossRef]
- Ghosh, A.; Maeder, A.; Baker, M.; Chandramouli, D. 5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release 15. IEEE Access 2019, 7, 127639–127651. [Google Scholar] [CrossRef]
- Jabbar, S.; Lloyd, H.; Hammoudeh, M.; Adebisi, B.; Raza, U. Blockchain-enabled supply chain: Analysis, challenges, and future directions. Multimed. Syst. 2020, 27, 787–806. [Google Scholar] [CrossRef]
- Al-Farsi, S.; Rathore, M.M.; Bakiras, S. Security of Blockchain-Based Supply Chain Management Systems: Challenges and Opportunities. Appl. Sci. 2021, 11, 5585. [Google Scholar] [CrossRef]
- Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 2019, 100, 143–174. [Google Scholar] [CrossRef]
- Gordon, W.J.; Catalini, C. Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 2018, 16, 224–230. [Google Scholar] [CrossRef]
- Bumblauskas, D.; Mann, A.; Dugan, B.; Rittmer, J. A blockchain use case in food distribution: Do you know where your food has been? Int. J. Inf. Manag. 2020, 52, 102008. [Google Scholar] [CrossRef]
- Mirabelli, G.; Solina, V. Blockchain-based solutions for agri-food supply chains: A survey. Int. J. Simul. Process Model. 2021, 17, 1–15. [Google Scholar] [CrossRef]
- Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 839–858. [Google Scholar]
- Pilkington, M. Blockchain Technology: Principles and Applications. In Research Handbook on Digital Transformations; Research Handbooks in Business and Management; Olleros, F.X., Zhegu, M., Eds.; Edward Elgar Publishing: Cheltenham, UK, 2016; Chapter 11; pp. 225–253. [Google Scholar] [CrossRef] [Green Version]
- Perboli, G.; Musso, S.; Rosano, M. Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases. IEEE Access 2018, 6, 62018–62028. [Google Scholar] [CrossRef]
- Bocek, T.; Rodrigues, B.B.; Strasser, T.; Stiller, B. Blockchains everywhere—A use-case of blockchains in the pharma supply-chain. In Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, 8–12 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 772–777. [Google Scholar] [CrossRef]
- Dobrovnik, M.; Herold, D.M.; Fürst, E.; Kummer, S. Blockchain for and in Logistics: What to Adopt and Where to Start. Logistics 2018, 2, 18. [Google Scholar] [CrossRef] [Green Version]
- Caro, M.P.; Ali, M.S.; Vecchio, M.; Giaffreda, R. Blockchain-based traceability in Agri-Food supply chain management: A practical implementation. In Proceedings of the 2018 IoT Vertical and Topical Summit on Agriculture—Tuscany (IOT Tuscany), Tuscany, Italy, 8–9 May 2018; pp. 1–4. [Google Scholar] [CrossRef] [Green Version]
- Torky, M.; Hassanein, A.E. Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges. Comput. Electron. Agric. 2020, 178, 105476. [Google Scholar] [CrossRef]
- Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Ukwandu, E.; Ben-Farah, M.A.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Andonovic, I.; Bellekens, X. Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. Information 2022, 13, 146. [Google Scholar] [CrossRef]
- Dannen, C. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, 1st ed.; Apress: Berkely, CA, USA, 2017. [Google Scholar]
- Cai, W.; Wang, Z.; Ernst, J.B.; Hong, Z.; Feng, C.; Leung, V.C.M. Decentralized Applications: The Blockchain-Empowered Software System. IEEE Access 2018, 6, 53019–53033. [Google Scholar] [CrossRef]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; CCS ’16;. ACM: New York, NY, USA, 2016; pp. 254–269. [Google Scholar] [CrossRef]
- Everledger Uses Blockchain to Help Everyone Trust in What They Buy. Available online: https://www.everledger.io/ (accessed on 8 May 2022).
- Blockverify. Available online: http://blockverify.io (accessed on 15 May 2012).
- Verisart. Available online: https://verisart.com/ (accessed on 27 April 2022).
- Modum. Available online: https://modum.io/ (accessed on 27 April 2022).
- Ramachandran, A.; Kantarcioglu, M. SmartProvenance: A Distributed, Blockchain Based DataProvenance System. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, Tempe, AZ, USA, 19–21 March 2018; CODASPY ’18. ACM: New York, NY, USA, 2018; pp. 35–42. [Google Scholar]
- Mann, S.; Potdar, V.; Gajavilli, R.S.; Chandan, A. Blockchain Technology for Supply Chain Traceability, Transparency and Data Provenance. In Proceedings of the 2018 International Conference on Blockchain Technology and Application, Xi’an, China, 10–12 December 2018; ICBTA 2018; ACM: New York, NY, USA, 2018; pp. 22–26. [Google Scholar] [CrossRef]
- Monfared, S.A.R. Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 2016, 5, 1–10. [Google Scholar]
- Abbas, K.; Afaq, M.; Ahmed Khan, T.; Song, W.C. A Blockchain and Machine Learning-Based Drug Supply Chain Management and Recommendation System for Smart Pharmaceutical Industry. Electronics 2020, 9, 852. [Google Scholar] [CrossRef]
- Tseng, J.H.; Liao, Y.C.; Chong, B.; Liao, S.w. Governance on the Drug Supply Chain via Gcoin Blockchain. Int. J. Environ. Res. Public Health 2018, 15, 1055. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ahmadi, V.; Benjelloun, S.; El Kik, M.; Sharma, T.; Chi, H.; Zhou, W. Drug Governance: IoT-based Blockchain Implementation in the Pharmaceutical Supply Chain. In Proceedings of the 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ), Miami, FL, USA, 22–23 February 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Musamih, A.; Salah, K.; Jayaraman, R.; Arshad, J.; Debe, M.; Al-Hammadi, Y.; Ellahham, S. A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain. IEEE Access 2021, 9, 9728–9743. [Google Scholar] [CrossRef]
- Liu, X.; Barenji, A.V.; Li, Z.; Montreuil, B.; Huang, G.Q. Blockchain-based smart tracking and tracing platform for drug supply chain. Comput. Ind. Eng. 2021, 161, 107669. [Google Scholar] [CrossRef]
- Azzopardi, S.; Ellul, J.; Pace, G.J. Runtime Monitoring Processes Across Blockchains. In Fundamentals of Software Engineering; Hojjat, H., Massink, M., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 142–156. [Google Scholar]
- Diamonds, Blockchain and Banks: The Story of Everledger|BBVA. Available online: https://www.bbva.com/en/diamonds-blockchain-and-banks-the-story-of-everledger/ (accessed on 27 January 2022).
- BlockVerify Review: Real Anti-Counterfeit Supply Chain Blockchain? Available online: https://bitcoinexchangeguide.com/blockverify/ (accessed on 27 January 2022).
- Powering Impact-Led Commerce. Available online: https://www.provenance.org/technology (accessed on 27 January 2022).
Type | Name | Role |
---|---|---|
Internal | Warehouse | Inventory Management |
Procurement | Supply and Quotation Management | |
Finance | Financial Management | |
External | Suppliers | Management of Supplies |
Manufacturer | Product Evaluation and Quotation | |
Others | Product Evaluation |
Process | Operation | Normal Execution Time (s) | Threat Detection Time (s) | Overhead |
---|---|---|---|---|
Procurement | Issue | 0.00201 | 0.00203 | 0.9852% |
Review | 0.00300 | 0.00303 | 0.9900% | |
Supplier | Issue | 0.00309 | 0.00312 | 0.9615% |
Review | 0.00401 | 0.004045 | 0.8652% | |
Warehouse | Issue | 0.00403 | 0.004071 | 1.0071% |
Review | 0.00406 | 0.00410 | 0.9756% |
Process | Operation | Type | Normal Execution Time (s) | Threat Detection Time (s) | Overhead |
---|---|---|---|---|---|
Procurement | Issue | Application | 0.00213 | 0.00215 | 0.9389% |
Contract | 0.00502 | 0.00509 | 1.3752% | ||
Review | Application | 0.00310 | 0.00313 | 0.9584% | |
Contract | 0.00510 | 0.00517 | 1.3539% | ||
Supplier | Issue | Application | 0.00312 | 0.003152 | 1.0152% |
Contract | 0.00518 | 0.00525 | 1.3333% | ||
Review | Application | 0.00407 | 0.00410 | 0.7317% | |
Contract | 0.00520 | 0.00525 | 0.9523% | ||
Warehouse | Issue | Application | 0.00413 | 0.00417 | 0.9592% |
Contract | 0.00525 | 0.00532 | 1.3157% | ||
Review | Application | 0.00412 | 0.00416 | 0.9615% | |
Contract | 0.00537 | 0.00543 | 1.1049% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Farsi, S.; Bensmail, H.; Bakiras, S. Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks. Machines 2022, 10, 431. https://doi.org/10.3390/machines10060431
Al-Farsi S, Bensmail H, Bakiras S. Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks. Machines. 2022; 10(6):431. https://doi.org/10.3390/machines10060431
Chicago/Turabian StyleAl-Farsi, Sana, Halima Bensmail, and Spiridon Bakiras. 2022. "Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks" Machines 10, no. 6: 431. https://doi.org/10.3390/machines10060431
APA StyleAl-Farsi, S., Bensmail, H., & Bakiras, S. (2022). Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks. Machines, 10(6), 431. https://doi.org/10.3390/machines10060431