Abstract
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task; it is cumbersome since traditional schemes in databases could be subject to modifications. However, it can be solved using blockchain technology. This paper provides a data integrity verifiability architecture for cloud systems based on blockchain. The architecture provides a mechanism to store events (as logs) within a blockchain platform from any cloud system. Users can then consult data integrity through a microservice, acting as an intermediate server that carries out a set of verification steps within the blockchain, which confirms the integrity of a previously stored log. Our architecture takes advantage of the blockchain strength concerning integrity, providing a traceability track of the stored logs. A prototype system and a case study were implemented based on the proposed architecture. Our experimental results show that the proposed decentralized architecture can be adapted to cloud existing systems that were born without blockchain technology and require a modular and scalable audit characteristic.
1. Introduction
In recent years, cloud computing has been one of the most important topics in the field of information technology (IT) [1]. Every day, many organizations and companies are migrating their services over the cloud [2]. However, a primary obstacle in moving their systems to the cloud concerns the security and the continuously increasing number of digital crimes occurring in cloud environments [1]. Ensuring data integrity in any system is currently an imperative requirement. Stored data can be vulnerable to manipulation, intentionally or not, even more when placed in the cloud. Data integrity is a fundamental aspect of storage security and reliability [3]. It consists of protecting information against modifications or inappropriate destruction.
Policies, regulations, and secure mechanisms should be developed to protect people from being deceived; cloud forensics is a step forward in dealing with it [1]. A fundamental mechanism for digital forensics is auditing the logs; they are used to keep track of important activities. Logs have been used to provide information about past events and, therefore, show the path of the state of a system [4].
“Ensuring” logs from improper users has been reviewed by many researchers in different areas, such as distributed systems [4,5], cloud computing [6,7], and services [8,9,10,11]. These system solutions have been developed to be adapted for TCP/IP internet infrastructures. The internet was built to guarantee communication, not to guarantee information security properties. Thus, TCP/IP-based solutions layered on the internet have raised significant trust and privacy concerns.
Blockchain seems to be a suited technology for dealing with cloud system data integrity, because blockchain is characterized by features, such as transparency, traceability, and security [12]. These features make the adoption of blockchain attractive toward enhancing information security, privacy, and trustworthiness in very different contexts. Firstly, this technology was developed to improve integrity in the Bitcoin network [13]; then, it gave way to other cryptocurrencies. Recently, blockchain and the smart contract extension have permitted considering other use cases, such as the supply chain, Internet of Things, healthcare systems, digital right management, insurance, financial systems, and real estate systems [14]. These implementations share a very important characteristic related to trust—a crucial element of blockchain technology [15,16].
Blockchain applies cryptography and hash functions to chain the blocks, along with a decentralized structure, making it very difficult for third parties to manipulate the information compared to traditional databases. Its potential is enormous in information transactions, such as cloud storage. Blockchain technology itself already has the strengths of including logging and traceability mechanisms. However, the reality is that most organizations were born without it, and their storage information is executed via traditional databases (off-chain). A complete migration could imply very high economic costs since systems with high information content would require too much computational costs deploying their transactions on the blockchain network [17].
In this article, blockchain technology is used as a repository to store all events that can arise in an external system, ensuring its integrity. We provide an audit mechanism, propose a hybrid solution architecture on a permissionless blockchain with smart contract support. Each event, before being stored, is transformed in a log containing the attribute tags that respond to the following questions: how was the event generated? Who generated it? What included the event? Where was it generated? When was the event generated? The log is stored in the blockchain by executing smart contracts. This will allow validating and knowing the traceability of any data modification, guaranteeing if the information provides integrity or not, i.e., knowing the possible alterations by third parties.
On the other hand, following the new technological demands, in terms of software development, we identified that the microservice approach offers an evolutionary step concerning monolithic ones. Thus, we provided an architecture following the microservice approach. However, a microservice system design remains challenging since it can be independently deployed, has lower coupling, and is self-contained. For cloud applications development, microservice allows more freedom to evolve and requires a mechanism to inform others about what has changed or to track past events in the system. With the highly decentralized development and design of microservices, it becomes difficult to maintain a centralized architectural design reference [18]. As a result, the system might be vulnerable to data integrity attacks. Hence, this paper aims to provide a decentralized architecture with two general services. Firstly, a data integrity mechanism in which all events (records) triggered by a cloud system are stored within a blockchain in a hashed form. Secondly, a verifiability process that checks the data integrity. The mechanism was built through a microservice architecture to be integrated with any system as a service.
We implemented our architecture, and our experiments show that it can be successfully suited within other cloud systems. Our main contributions are listed as follows:
- A mechanism for auditing issues storing logs from the initialization phase of a system until the execution of user transactions guaranteed by blockchain strengths concerning integrity.
- A consulting mechanism that provides certainty about the integrity of the logs stored in the blockchain.
- Traceability of each log transaction carried out by the corresponding users of a cloud system in distributed environments.
- An auditing mechanism where cloud systems (following the microservice architecture) can plug it.
Our proposal falls in a design science research in the information systems area [19]; specifically, in the software engineering topic. The methodology of our work follows that proposed in [20], commonly applied in engineering. Such a methodology comprehends the following steps: (a) Motivation and problem identification; (b) Objectives; (c) Design; (d) Development; and (e) Demonstration and validation.
Following the methodology described previously, we structured the paper as follows: (Step a) is deepened in Section 2, which also grounds some technologies used throughout the document and some related works; Section 3 raises the objectives (Step b) and describes our general architecture (Step c) and main components; Section 4 and Section 5 detail the design of our architecture (continuing Step c); Section 6 explains our prototype (Step d), together with a case study shown in Section 7; some demonstrations and validations (Step e) are provided in Section 8. Finally, we outline our discussion and conclusions in Section 9.
2. Preliminaries and Related Work
The amount of data currently generated worldwide does not have a direct comparison with the data generated in the past since users create and store more data than ten years ago. For example, a single user currently solely provides large amounts of data per day in social networks. The large amounts of data are often stored in the cloud. Thus, one of the current high-demand issues is data integrity, especially for auditing matters.
On the other hand, companies are migrating their processes to the cloud, causing the implementation of new strategies in the software development process. This section starts contextualizing the evolutionary requirements of the automation systems highlighting what worked in the past does not necessarily work today. Then, we approach some works that focused on the subject of data integrity in cloud systems and those focused on blockchain.
2.1. From Programming Office Systems to Microservice Architecture
Office systems, reference [21], were the first good solutions for the automation of organizations. Over time, these systems became fragmented subsystems; then, an excellent evolution was client–server systems. Organizations could obtain information in real-time from centralized databases, which represented significant advances in software development. A client–server system (denoted in the literature as monolithic architecture) is a way to build a complete software as a unit and the central server has several responsibilities and does mostly everything. Monolithic architecture is still valid for small projects, but when organizations or team groups become more extensive, client–server systems have been shown to not be enough, reference [22].
Microservice architecture is a good solution to solve the monolithic problem and it recently has become more popular. It is a software architecture design that offers the following characteristics: modularity, scalability, integration of heterogeneous and legacy systems, and distributed development, reference [23]. These characteristics are highly required when designing a system that will be mounted in the cloud. Although the microservice system design remains challenging, it has become the leading design for cloud native systems; since it provides benefits, such as faster deployment cycles, better scalability, and good separation of concerns among services, reference [18].
2.2. Data Integrity in Cloud Systems
Cloud computing can be perceived as a collection of computing resources providing shareable infrastructure through the internet, which are accessible and available everywhere, reference [24]. The name was coined by Mr. Ramnath Chellappa in 1997, reference [25], which agree with [24,26].
Cloud computing is defined by the National Institute of Standards and Technology (NIST) as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction, reference [27]. Applications of cloud computing are mailing services to storage, document processing, hosting services, image processing, and video streaming [26].
The reality is that cloud computing right now is one of the most trending topics in the field of information technology (IT) in recent years [1]. Companies, such as Amazon, Google, and Microsoft, have enhanced their services to provide cloud environments for their customers. Thus, every day, many organizations and companies are migrating their services over the cloud, since the benefits of cloud computing encompass improved efficiency, flexibility, and reduced infrastructure costs, reference [2].
However, there exist some concerns when uploading systems to the cloud, such as security, privacy, power efficiency, compliance, and integrity [1,28]. Preserving confidentiality and integrity in distributed systems and cloud services is also a key problem. The importance of confidentiality and data integrity in cloud systems is imminent. Confidentiality refers to restricting access to information, at least, it is authorized to access it. Data integrity aims to protect information against intruder modifications or software bugs.
Traditional techniques used for data integrity and verification for cloud storage are already provided in the literature [29]. Man et al. [30] argue that traditional systems (only off-chain) remain inefficient, antiquated, leading to critical data omissions, security vulnerabilities, and even corruption. We explore a newer technique, the combination of data integrity with a blockchain platform.
2.3. Data Integrity with Blockchain
Blockchain, firstly introduced by Satoshi Nakamoto [13] in the design of Bitcoin, is described as a distributed database, where the information contained is allocated in blocks; each block is chained with its previous one by adding the hash address of the previous block, among other data, establishing a chain. Each block can also include smart contracts, a set of computer instructions that are triggered to run specific tasks. Blockchain is an excellent option for data integrity; it is resistant to malicious data modification.
Some initiatives have explored the use of blockchain to provide integrity in audit issues. Suzuki, et al. [31], proposed a scheme using blockchain technology as a request-response channel for a client–server system in a control access application to record both client requests and the server responds in an auditable manner. Ahmad et al. [32] argued that traditional log systems are vulnerable and subject to a series of attacks; they searched for a system able to avoid audit logs being "tamped" by adversaries; then, they proposed a system called BlockAudit, which used Hyperledger blockchain. There are other works based on Hyperledger, focusing on auditing data integrity using schemes involving a third-party auditor [33]. PengCheng et al. [34], use a mobile agent technology to deploy distributed virtual machine agent model in the cloud; the machine agent enables to cooperate to store data, then they built an integrity protection mechanism with their virtual machine proxy model; they trust in the security mechanism of the blockchain technology to improve the performance of the cloud computing concerning secure storing and secure computing. Even though there are works focused on blockchain in data integrity aspects, we aimed to provide a data verifiability architecture that can be integrated with other systems, in particular with cloud-based.
A closely related work is presented in [35], an audit mechanism that saves all the events of a supply chain in a blockchain in a hashed form; then users of the supply chain system can query integrity, data provenance, and traceability from a blockchain through an intermediate server that establishes communication between blockchain and the supply chain. Recently, RootLogChain was proposed in [36], it is an audit mechanism that is built upon a security protocol to create a root user in a blockchain, and from there, all root events are stored as logs within a blockchain.
3. The Architecture Model
This work provides an architecture able to store all events (logs) within a blockchain in a hashed form; then, we give a verifiability process to check the data integrity. This architecture can be adapted to cloud systems that generate HTTP events. These events must be triggered to the architecture to be saved.
Figure 1 illustrates an outline of our model. The Cloud System, denoted as , is illustrated in the left part of Figure 1. CS must establish communication with The Verifiability Blockchain Service Interface, abbreviated as VBSI, for both to store each event that occurs internally within and to provide reliability by means of a consulting process. VBSI is an intermediary between CS and the blockchain part. Blockchain acts as a software connector [37], where all events are registered. The following subsections outline the general operability of these three parts: , VBSI and the blockchain.
Figure 1.
General Model: interaction among The Cloud System, The Verifiability Blockchain Service Interface and the blockchain.
3.1. The Cloud System
From the final user perspective, cloud computing can be divided into two parts: the client and the server [38]. The client part comprises the software used by the final user. The user does not have to install complex software to use services provided by the cloud; usually, a web browser, mobile application, or terminal are used. The server side has to do with the back-end, it is an abstract layer with the hardware and the connectivity; it means various computers, servers, and data storage.
On the other hand, according to Zhang et al. [39], the cloud computing architecture consists of four layers: the hardware, the infrastructure, the platform, and the application. The hardware layer, typically implemented in data centers, manages the physical resources such as servers, routers, switches, power, cooling systems, etc. The infrastructure layer shares physical resources using virtual technologies, such as VMware, XEN, and KVM. The platform layer consists of operating systems and application frameworks. The application is the highest layer consisting of the cloud applications; it is the view of the final user.
In the case of our model, we locate The Cloud System in the platform layer according to cloud computing architecture of Zhang et al. [39]. The Cloud System will establish communication with VBSI using the TCP/IP protocol. In particular, it will be over the hypertext transfer protocol (HTTP) [40], and its secure version HTTPS [41]. The methods that The Cloud System will be requesting to VBSI will be GET, POST, PUT and DELETE.
3.2. Microservices of VBSI
Considering that our model might be implemented as an extension in systems requiring audit data characteristics, we designed it following a software scheme as a service using a microservice architecture. This architecture was introduced as a new alternative, reference [42], over the monolithic approach. Microservices were developed as small, well-defined purposes, and autonomous services, deployed independently [23,43]. Currently, organizations tend to upload their services to the cloud, and this architecture is usually recommended.
Figure 1 illustrates three general microservices: Event API-Gateway, Audit and Users, as illustrated at the top-right of Figure 1. VBSI is the interface of our model, dedicated to interacting with The Cloud System. sends HTTP (respectively HTTPS) request methods to trigger events. These events are received by the Event API-Gateway, which assorts the events and resends to one of the following types of services: (a) Storing data (it involves submitting, updating, or deleting information) in a hashed way; or (b) Consulting information for audit issues. Any of these services must check the suited permissions with the Users service. The answer sent to The Cloud System depends on the processed operation in the blockchain. Details of the global mechanism of VBSI will be explained in Section 4.
3.3. Participants as Smart Contracts
The blockchain part stores events in order to validate the information stored in the The Cloud System. Our proposal of including blockchain as a verification procedure coincides with [35,44]. Each event in the system is marshaled in hashing data to be stored by smart contract named Bitacora.
To execute, this smart contract is required to be called by a specific type of user. We created three types of users (root, administrator and transaction users), these type of users are represented in the blockchain as smart contracts. The general overview is as follows:
- Root: It is a crucial role, which is formed at the time that the system is initiated. Our model trusts in the root, and a smart contract Root is created the first time when the architecture is started. Hence, all subsequent operations are chained to this contract. The creation of the root is carried out following [36].
- Administrator: It is created by the root. An independent smart contract is created for each administrator. In our model, the administrator can add TUsers.
- TUser: When an administrator adds a new user, creates a TUser smart contract, and also generates a Resource smart contract. TUser is a transactional user who can store hash data in the blockchain through a smart contract called Resource.
Details of the global mechanism of the smart contracts will be explained in Section 5.
4. The Verifiability Blockchain Service Interface (VBSI)
VBSI interacts with two external entities: The Cloud System and the blockchain. The interaction with The Cloud System is performed through the Event API-Gateway, while the interaction with the blockchain is carried out by the Audit microservice. Internally, all operations must be "permissioned" by a microservice, so-called Users. In the following sub-sections, we will explain them in detail.
Table 1 gives a general abstract of some notations and abbreviations that can be found throughout the paper. The last column pinpoints the reference formula where it can be found.
Table 1.
Descriptions and references of some abbreviations and formulas.
4.1. Event API-Gateway
This follows the API-Gateway architecture of Gadge et al. [45]. The Event API-Gateway is the main controller of the backend. The Event API-Gateway is a server that is the single entry point into the system. It receives events requested by The Cloud System and emits a comeback answer. Such events are denoted as and involve the following CRUD (Create, Read, Update and Delete) operations. These operations are HTTP methods (POST, GET, PUT and DELETE, respectively). It means that an is a polymorphic function, hence, it could refer to any of the following forms:
Table 2 represents how the Event API-Gateway receives an HTTP (HTTPS, respectively) request method, and it specifies what is the corresponding interface played in the Audit service. For example, if a Create operation is requested, it is carried out using a POST method, then Storing interface is executed, meaning that a new operation is requested. In case an Update or Delete operation is requested, Audit service interprets it as an Update operation since no element is deleted.
Table 2.
CRUD operations sent via HTTP methods and the interpretation in the blockchain by services consulting and storing.
The Event API-Gateway communicates internally with Audit and Users and can also communicate externally with other microservices through another API-Gateway or cloud services directly.
The Event API-Gateway encapsulates the internal system architecture and provides an API that is tailored to each client. One of its responsibilities is to identify the following services: user administration, user authentication, user authorization, audit-storing, and audit-consulting. Other responsibilities are monitoring, load balancing, and caching.
4.2. Audit: Storing
Figure 2 illustrates the process of receiving an event and data storing in the blockchain. Let us assume that the Event API-Gateway receives an event with message to be stored within VBSI. The message is composed of:
denotes who is sending the message; who is the receiver; a set of data required to be stored in the blockchain; and is a hashed of the previous messages, as follows:
Token (Section 4.4 for more details) is obtained from :
Figure 2.
Storing operation, illustrating communication between Event API-Gateway, Storing, Users-Authorization service and the blockchain.
Storing service involves the following off-chain operations:
- Verify with the Users-Authorization service if has enough permissions to execute event , using Boolean function . Returning true if it has privileges to store the event in the blockchain; otherwise, it returns false.
- Send the event to the blockchain, using function . Returning , which is a tuple (calculated in the blockchain) of three elements, : (a) the token; (b) a transaction address and (c) a smart contract address.
Storing service can work under two scenarios: (a) Creating users; or (b) Executing operations over resources. Both will be explained in detail in Section 4.4.
4.3. Audit: Consulting
In order to consult information, Audit has another service, consulting, see Figure 3. Let us assume that the Event API-Gateway receives an event to consult a data that previously was stored within VBSI. There, is provided by the authorization service; and
Figure 3.
Consulting operation, illustrating communication among Event API-Gateway, Consulting, and Users-Authorization services and the blockchain.
In this case, is the receipt received when the storing action was carried out (it is the same as explained in Section 4.2); note that was the token id approved in the transaction for the smart contract address .
Consulting service involves the following off-chain operations:
- Verify with the authorization service that has enough permissions to execute ; it is used with function, which is detailed in Equation (9).
- If b is true, then it calls to the following remote function:There, states for the receipt details consulted with the blockchain and is the hashed information previously stored within the blockchain.
- Then, it is compared with , if they are the same, r variable is changed to .
- A tuple is returned, where:can be one of two options according to the previous steps: (a) and the detailed receipt when integrity is noted; otherwise, (b) it returns and an empty receipt.
4.4. Users
As one can see in Figure 1, the Users microservice has direct communication with the Audit microservice and the event API gateway. It means that Audit or the Event API-Gateway must verify with Users whether or not the requests received can be executed or not. This service acts as an access control service management. Although an alternative solution could be to consume an external system (e.g., software as a service, SaaS) provided by trusted third parties, as some proposed in the literature [46,47]; we preferred developing our solution to take better control of the logs.
Following some proposals in the literature about how to deal with access control management systems [48,49,50], Users microservices provide the following services: administration, authentication, and authorization. Table 3 illustrates all operations. The input column specifies the parameters received, whereas the output column, the answer. Column storing pinpoints if the service deserves (√) audit:storing operation in the blockchain; however, according to the user’s convenience, it could be modified. For example, each time a request involves an authentication process, we configured that functions and must register a storing operation (√) in the blockchain. However, any other implementation could lighten it up and omit it, arguing that it is unnecessary.
Table 3.
User’s microservice.
4.4.1. Administration
It provides the four CRUD operations: creation, read, update, and delete. When a request is received to create a user, function is processed. Where:
Let be credentials related with personal information of the user to be created, such as username, email, and a hashed password; be the type of user to be created; be the public key of the user; is the value required to execute the transaction in the blockchain; be a set of permissions that the user will be granted expressed in JSON format (Section 4.4.3 explains more about the permissions); and be the hashed of the previous messages. When a user is created, it also requires to create its smart contract, calling a storing operation (see Section 4.2), receiving and it is returned also.
When update and delete are requested ( and respectively), it is assumed that each user has its own smart contract, as it was previously created. These operations require generating new transactions over the existing smart contract, returning a new answer of the blockchain . These operations internally call for the storing service.
Our model follows the idea of [51], which is designed with three general types of users: Root, Administrators and TUsers. The following conditions are followed to build a tree structure:
- The system must have only one root, it follows the idea of [36].
- A public key must be used for only one type of user (validated via off-chain).
- The root user can create administrators (validated via off-chain and blockchain).
- Administrators can create other administrators and TUsers (validated via off-chain and blockchain).
- When a TUser is created, also a Resource smart contract is created (instruction sent via off-chain to the blockchain).
4.4.2. Authentication
This service provides three operations:
- ; this function receives the user’s credentials, type of user and type of event. Returning a token as a result;
- ; this function receives a token and returns an updated token. This function is used when a token is about to expire.
- ; this function receives a token and evaluates if the token is valid or not, returning a Boolean result.
4.4.3. Authorization
This function receives a token, an event, and a resource. The function verifies if the token supplied previously to some type of user has permissions to execute event on resource . The following is an example in JSON format:
{
"resource": "RootCreation",
"event": "POST",
"permitAccessTo": {
"Root": "true",
"Administrator": "false",
"TUser": "false"
},
"description": "Root is the user permitted to create a root"
}
This resource is called RootCreation, whose event POST is permitted only by the root user; the other users are not permitted; a description is also included.
On the other hand, the following function:
receives a token and returns a JSON format pinpointing a set of permissions that a user, linked with the token, has available to execute. The following is a permission example :
{
"stage": "users",
"serviceName": "hasAccess",
"typeOfOperation": "delete",
"nameOfOperation": "deleteMe",
"permitAccessTo": {
"Root": "true",
"Administrator": "true",
"TUser": "true",
"NameType": "Consumer"
},
"description": "Delete personal data"
}
which, it is a transaction user with type named “Consumer” can delete its own personal information; the types of users root and administrator have the same privileges.5. The Smart Contracts
Trust in data integrity is one of the primary concerns in computer systems. To remove that worry, we will register all events in a trustworthy architecture, such as blockchain. We consider that events are triggered by different types of users. These users will store events through smart contracts.
We established some particular user roles to limit the operations that each user can execute within the blockchain: Root, Administrator, and a Transaction User (TUser for shorter). TUsers are a generalization of more specialized transactional users. We designed these roles, such as smart contracts.
Our model establishes that any event generated by one of the role users must be registered in a Bitacora and the transactional users have Resources and any action or event over the resources must be registered in their own Bitacora.
5.1. Notation
The notation to be used to represent smart contracts will be similar to classes in object-oriented languages. A smart contract is composed of attributes and methods, which can be public (+) or private (−); prefix (*) denotes an attribute internally calculated. To provide encapsulation, all private attributes can be accessed using the corresponding getter method get[Attribute](); for example, let X be an attribute, its corresponding getter method would be getX().
A contract also has a constructor, which is a method that uses the same name as the contract and is used to create the contract. Figure 4 illustrates the smart contracts as class diagrams. Private methods can only be called within the contract, as long as public methods are still accessible from other contracts. Abstract methods are not implemented in such a contract. If a smart contract includes at least one abstract method, such a contract is also considered abstract and can only be deployed when abstract methods are implemented. The figure also illustrates some relations of a contract with others, for example: inheritance (extends arrow); and use dependency (dotted arrow).
Figure 4.
The smart contracts illustrated as class diagrams.
5.2. Objectcontract, Log, Bitacora and Root
The base model of the contracts Objectcontract, Log, Bitacora and Root were taken from [36], here were used to engage with smart contracts Admor, TUser and Resource as illustrated in Figure 4.
The explanation is as follows:
ObjectContract denotes the parent of all contracts. It contains two attributes: contract address and transaction address . When a contract is created, these attributes are generated and can be accessed publicly by methods and , respectively. Method is used to obtain the receipt of a transaction. Contract address is used to identify the contract in the blockchain and the transaction address to identify the event.
Log inherits from ObjectContract, you can see a description of the attributes in Table 4. All of such attributes are stored in the blockchain when method is called. Attributes marked with ∗ are auto-generated within the smart contract; the rest are obtained from . is an abstract method, which must be implemented in a specialized smart contract, such as Bitacora. A particular log event can be obtained using .
Table 4.
Attributes () and description of Smart Contract Log.
Bitacora inherits all attributes and methods of smart contract Log. Events are registered in this smart contract. The constructor is created when it is called the first time, from , data are extracted to form , and it calls , which is a private method, inherited from Log. This method stores in the Log. is another method, which can add events with information by calling to be stored in the Log. All log events can be obtained using method .
Root smart contract is created executing constructor The constructor creates its Bitacora and the first Log. Let be a user wanting to become a root; be a receiver user or target; be a token identifier to identify the transaction; and is composed of two set of messages and . is formed by , where is the user public key, which will be the owner of the contract, and the key address will be used to execute the next transactions; represents the cost necessary to perform transactions; credentials is related with root’s secret information, such as username, email, and a hashed password. With is possible to store extra information of the root.
As a result of executing constructor , it is generated a blockchain transaction answer , see Formula (5) for more details about .
Smart contract can add events, using method addEvent(Ev). This method calls of smart contract Bitacora. This transaction generates another transaction, ; however, the smart contract address is still the same since this method does not create a new smart contract.
In order to consult a Bitacora and a specific log, smart contract contains methods and respectively. Being the answer to the root after triggering an event.
Some modifications were carried out within the smart contract of the Root. We added method , which the Root can add administrators and to store in its private attribute called . requires to specify the smart contract key of the creator (in this case the smart contract of the root in the first parameter) and the key address of the new administrator.
5.3. Admor, TUser and Resource
Admor is an abbreviation of Administrator. An administrator is a special type of user that can add TUser’s (); add other administrators (, specifying the smart contract key of the creator and the key address of the new administrator); and obtain its Bitacora ().
TUser is an abbreviation of transactional user. In our model TUser is the operative type of user of a system able to execute CRUD transactions over some specified module or resource. Neither root nor administrators can deal with resources directly. Thus, tasks related to resources have to do with TUsers.
TUser is a generalization type of user, when created (in its constructor ) is required to pass: the specific role that it will be playing, which can be recovered via ; and an address key of the user. TUser can create, update, and delete resources by executing methods , , respectively. TUsers can also obtain their own Bitacora and the Bitacora of its Resource .
On the other hand, smart contract Resource is only created by a TUser, being its owner, and can only be accessed by it. When a resource is created (constructor ), an owner is assigned, in this case, the smart contract of the TUser accomplishes this role. The owner of the resource must be the only one that can update it or/and delete it, using its respective methods, see Figure 4.
6. Prototype System
The following prototype aims to give a better idea about the architecture we have proposed. Following the exposed in Section 3.2, in the sense that our architecture might be implemented as an extension on systems requiring an audit characteristic, the prototype follows a software scheme as a service using a microservice architecture. Figure 5 outlines the microservices and technologies used to implement our proposal. The implementation of each microservice includes Docker version 19.03.8 with Ubuntu 18.04 bionic operating system at the upper layer. Docker is a platform that delivers software in packages called containers. These containers are executed independently by the lightly operating system kernel and, therefore, use fewer resources than virtual machines, reference [52,53].
Figure 5.
Microservices and technologies implemented in the proposal architecture.
The following subsections describe how we have implemented the verifiability architecture, including its different parts; and the smart contracts within the blockchain.
6.1. VBSI
As you can see within the dotted rectangle in Figure 5, the VBSI part includes the following microservices: (a) Event API-Gateway; (b) Audit; and (c) Users.
Event API-Gateway was configured to accept HTTP methods (such as GET, POST, PUT, AND DELETE) in both ports 80 and 443. Port 80 was configured while developing the prototype, and port 443 to provide a private communication, implementing the transport layer security (TLS) protocol. This microservice is outward-facing for receiving external requests (such as the Internet); therefore, the rest of the ports were closed. Axios library was configured in the Event API-Gateway to deal with HTTP requests to the other microservices.
The Users microservice contains Administration, Authentication and Authorization services explained in Section 4.4. User administration involved to implement simple trusted tokens, which we have implemented with Nonce infrastructure (Nonce being an unguessable number built concatenating a random number with the current date); hashed messages were achieved with MD5-256 (it is a hashing algorithm that takes an input string of any size and generates an output, which is a 256 bit size); and public key infrastructure with openPGP. User-Authentication was implemented using an access control password-based protocol;internally, a trusted compound token is generated when authentication is achieved. For user authorization we have implemented a compound token using Jason web token (JWT): https://jwt.io, accessed on 4 February 2022. All services were required to use HTTPS connections.
Green rectangles within the Audit microservice in Figure 5 illustrates the Storing and Consulting services explained in Section 4.2 and Section 4.3. An example of storing and consulting service using Postman application will be explained in Section 7.3.
6.2. Blockchain and the Smart Contracts
The software component installed to execute the blockchain (as shown in Figure 5) was Ganache CLI v6.4.3. Ganache is a personal blockchain for rapid development and experimental tool under the Ethereum platform. It can be installed following the instructions shown in the Truffle suite at https://trufflesuite.com/ganache/index.html, accessed on 4 February 2022.
The smart contracts designed and shown in Figure 4 were implemented in Solidity language programming (Solidity available via https://docs.soliditylang.org/en/v0.7.4/, accessed on 4 February 2022, using version 6.12. The smart contracts can be downloaded at https://github.com/UPclopezpProjects/VBSI_smartContracts, accessed on 4 February 2022.
Library web3.js was used to connect with the blockchain. Unlike DAuth, mentioned in [54] where MetaMask extension was used in the client side description, our client side application is the User microservice, which, running node.js, connects with the blockchain by using an OAuth API web3 authentication protocol.
7. Case Study: An Avocado Cloud System
The following case study refers to an avocado supply chain system; although it could be adapted to any other, we provide this example to give a general idea of how it is integrated with the VBSI architecture we have proposed. Figure 6 illustrates such an integration, as one can see, it is a specialization of Figure 1.
Figure 6.
An avocado cloud system integrated with VBSIarchitecture.
7.1. Stages of the Supply Chain
The main requirement of the avocado supply chain is to register all events triggered from the producer to the end consumer. The stages of the supply chain are represented as individual microservices in the left part of Figure 6. Note that our experiments show that the configured operating system is similar to those used in VBSI, although it could be any other. The stages explanation, shown in the left part of the figure are:
- Farmer can have one or more orchards, might sell his/her harvest, and be sent to packers.
- Packers receive the avocado lot directly from the producer. They verify the lot, check regulatory documentation and establish if the fruit will be sent to be commercialized directly or a manufactured process.
- Carrier are engaged in transporting the avocados from one point to the next in the chains of the supply chain.
- Merchant buys the product to sell it directly to a consumer, a retailer (another merchant) or a wholesaler (another merchant).
- Consumer is the user who buys the fruit. It is the last stage of the chain.
7.2. The Data Integrity Storing Process in the Experimental System
The transaction users interact at different stages with the avocados and every interaction records information to provide traceability. Then, the system can monitor the avocados from each stage. Figure 7 illustrates a sequence diagram that, at the top, shows the operations, at the bottom the created user’s type, at the center the smart contracts created after the operations and at the right part (last column) the resources generated.
Figure 7.
Sequence diagram: stating an execution tree operations of the avocado supply chain with their smart contracts.
The smart contracts in the figure are represented with a rectangle split in three parts: at the top with its name; in the middle with two parts: the smart contract used to create the new smart contract and the user key; at the bottom the address of such smart contract. The figure also states a tree smart contract instance from the root creation until the generation of users resources, the general steps are as follows:
- Root creation: following the protocol in [36] the Root user is created with key . is the smart contract address generated in the blockchain; and is the Root’s Bitacora.
- Administrators creation: root, through smart contract , executes method to create two administrators (Admor1 and Admor2); in this case are and ; and the smart contracts generated are and respectively. Their smart contracts Bitacoras are and
- TUsers creation: the explanation of creating a TUser by an administrator is similar to that explained by the root creating administrators. In this case Admor1 creates a Farmer and a Packer user; and Admor2 creates a Carrier and a Merchant user.
- Resources creation: resources are added via a TUser by executing method . The figure shows resources created with addresses from to . These resources will be used to manage harvests. For example, Farmer will register new hashed data of the harvest in the blockchain to start the traceability; Carriers will register the harvest transportation from one part to another; Packer will create a new harvest batch with the information reported by the Farmer and will carry out the selection procedures; Merchant will register data information about when the lot was received and when it is sent to the wholesalers, retailers or ready to be sell for the consumers. In each stage, a QR code is generated, containing the transaction address generated in each stage. The QR code might be used by the consumer or any user of each stage of the supply chain to obtain the traceability and verify the origin of the avocado.
Figure 8 shows a dummy representation of the smart contracts executed in Figure 7. Note that each block contains three transactions represented by each of the smart contracts. This figure will be related with the below explanation of Figure 9 in the next subsection.
Figure 8.
Blockchain representation of the smart contracts shown in Figure 7.
Figure 9.
The Left table shows some data about where the resources are stored off-chain and in the blockchain; and the right table shows the logs stored in each Bitacora of the smart contracts.
7.3. The Integrity Verifiability Process
Figure 9 illustrates a summary of those resources created and shown in Figure 7, applying the Storing service explained in Section 4.2 and following the experimental storing process of Section 7.2. The Figure 9 illustrates two tables. The left one shows some data of the resources stored via off-chain. In particular, this table shows seven columns: Stage is the name of the stage in the supply chain; Id is used to identify the row; is the receipt received from the blockchain after a Storing process is called; D is the data to be hashed; is the hashed data; Asc and Atran are the transaction and smart contract addresses where the row were stored within the blockchain.
On the other hand, the right table of Figure 9 shows some information stored within the smart contracts, which guarantees integrity by a verification procedure as explained in Section 4.3. This table shows ten columns (see Table 4 to reference for the meaning of their titles): the first one, Ablock, specifies the block number where the smart contract is located within the blockchain, check Figure 8 to link it; in this case all event methods (Op in the table) triggered by the requesters were POST (because events were the creation of the stages, see Table 2 to collate), column When is denoted with unix epoch number, Operation type being the operation description carried out; column Where is the IP number from where the request was triggered; To is the session user identifier; and Hx the hashed data.
Table 5 shows a representative values of variables included in Figure 9, assuming that the rest variables can be interpreted in a similar way.
Table 5.
Representative variable values of Figure 9.
Once explained Figure 7, Figure 8 and Figure 9 about how the logs of events are stored in the blockchain through the smart contracts, and exemplifying some values in Table 5; we are ready to instance a consulting operation as demonstrated in Section 4.3. Assume that the Event API-Gateway receives a consulting operation request (it might be from any microservice of the supply chain as illustrated in Figure 6); an example of the consulting request is shown in the right part of Figure 10, note that the data to be sent are and of Table 5, these values are stored via off-chain (see the left table of Figure 9). Taking into account that coincides with the stored information in the blockchain (see the right table of Figure 9) the answer will be , pinpointing that is valid for . If would have been modified, then the answer would be .
Figure 10.
Storing and consulting service example using Postman application.
8. Validation and Proofs
This section provides some validations to our prototype and the case study to give certainty about its viability. They consist in setting two types of agents: friendly and unfriendly. Both types of agents, acting their corresponding roles, attempt to execute transactions. Each of the executed transactions must be registered within the blockchain and must generate a log.
We explain the behavior of the agents, some results about their implementations; a data integrity verifiability example interface; and the system complexity by stating a run showing the latency and processing time of the system.
8.1. Friendly and Unfriendly Agents
Friendly agents consist of a set of compliant agents following the rules of expected behavior. This type of agent aims to identify programming errors under normal situations. These situations mean that if a request contains n fields, and each field is configured with a specific type, then friendly agents send n fields without changing the types. On the other hand, unfriendly agents are non-compliant. They do not follow the rules, can change types, and change an unexpected behavior. Table 6 describes the behavior of the unfriendly agents.
Table 6.
Behaviour of the unfriendly agents.
Currently, there exist tools that can help with the software development process as a tester in the requests, e.g., the Postman application, which we also used. However, to implement the behavior of Table 6, was necessary to develop a tool with Java threads using an interface as shown in Figure 11. At the top of the figure can be seen some Resources of the first column of Table 6, among other things. Each tab of the figure was configured to execute automatic or manual requests. The number of requests must be input and the amount of friendly and unfriendly agents (honest or dishonest in the figure). Depending on the number N of agents, internally, the simulator creates N threads acting the corresponding role of the agents. Each friendly request must send the data as you can see in the input fields of the figure; note that some fields are required to be introduced manually, and others follow a regular expression to calculate random and automatic data fields.
Figure 11.
User interface to test the creation of different types of users.
At the end of each run, the system generates a detailed description as you can see in Figure 12. A version of the tool can be downloaded from GitHub: https://git.io/JDtin, accessed on 4 February 2022.
Figure 12.
Latency details shown in the graphical interface while sending and receiving requests.
We executed multiple stress proofs with this customized application and configured a malicious scenario. The following list describes the aspects of this tool and the prototype, which helped in the design of our proposal:
- Programming: we corrected some programming errors. It involved fixing from simple validations during the development process until more complex troubles, such as distributed and concurrent programming that sometimes are very difficult to detect.
- Adjustment to the smart contracts: although our smart contracts are illustrated as class diagrams to give a general representation, they were implemented on solidity programming language.
- Adjustment to the architecture: developing the prototype and the tester tool was more clear to make some adjustments to the proposed architecture.
8.2. A Data Integrity Verifiability Example Interface
Figure 13 shows the outstanding interfaces from a mobile application we developed to verify the integrity of data previously stored within a blockchain. The figure contains four images, from left to right: (1) Login interface: where the user might sign in by a previous register or by social networks; (2) A menu option with the possibility to scan QR codes to see the traceability of the avocado supply chain that the user wants to buy; (3) The traceability interface with a specific location in Google maps, and options such as stage details forward and backward arrow navigation, among others; and (4) The evidence log taken from the blockchain illustrates the interface that the final user can see to verify the details stored in the blockchain, otherwise, such details would not be shown.
Figure 13.
Mobile application to check the traceability of an avocado supply chain and the log example obtained from the blockchain.
8.3. System Complexity
We carried out some tests with respect to the amount of resources required to run the storing and consulting services. The tests were latency and processing time. Latency is the time any supply chain microservice takes to reach its destination and return, taking into account an HTTP request. The processing time is the time in milliseconds (ms) that the API Gateway takes to execute a request since it arrives until it is processed and returned to the requester. Table 7 shows some details of one of the runs. The first column states the stage of the cloud supply chain microservice from where the request was established. The following three columns state the transaction latency (Start, End) that the request takes (Time) to reach its destination and return to the microservice. The fifth column pinpoints the HTTP method executed (POST, PUT, DELETE, or GET). The next three columns state the processing time within the Event API-Server. The last column is a brief description about the type of request. Note that Start and End columns are expressed in epoch Linux time, and column Time is expressed in milliseconds, being it the difference between End and Start.
Table 7.
Transaction latency from a Cloud Supply Chain and processing time in the Event API-Gateway.
We can analyze that methods POST, PUT, and DELETE, which correspond to storing information within the blockchain, are very similar and took 6646 ms latency on average, respectively, a 1768 ms processing time. On the other hand, consulting information took 2516 ms latency on average, respectively 979 ms in processing time. These statistics could oscillate using another blockchain platform. The average transmission rate from the microservices was a 1.91 Mbps upload and 29.78 Mbps download.
9. Discussion and Conclusions
The work presented in this article is closely related with [35,36]; in this section, firstly, we discuss the main differences with our work, highlighting the extensions and our main contributions, then we give the conclusions.
9.1. Discussion
Table 8 shows, with a ✓, the main characteristics supported in the works [35,36] and our proposal model. We coincide in both works in prevailing characteristics of data integrity, blockchain technology, auditing and traceability services, and implementing the microservice architecture. However, reference [35] focuses exclusively to supply chain systems resulting in very bounded implementations, so, in this work, we decide to include a more generalized solution for cloud systems. In contrast with [35], our proposal starts with the security suggestion of [36] concerning the auditing mechanism from when a Root user is created in a decentralized environment.
Table 8.
Main characteristics of the following works [35,36] vs. the proposal model.
On the other hand, we propose a decentralized architecture that extends both works [35,36], presenting a general solution for cloud computing services; and considering the creation of several types of users and roles; respectively, making scalable and modular the audit mechanism proposed. Thus, we can integrate more services through smart contracts (as shown in Figure 4) and traceability with the processing time and latency shown in Section 8.3. A critical remark is that we can provide information by consulting the log stored in the blockchain provided by the smart contracts about how an event was generated, who generated it, what included the event, where was it generated, and when was the event generated.
9.2. Conclusions
Organizations tend to move their information systems to the cloud. Increasingly, one of the questions from users is about the integrity of storing data. Thus, providing data integrity is an essential activity that adds value to organizations. If this activity is provided using the appropriate technologies, it generates more value.
In this paper, we described a data integrity verifiability architecture comprised of the following:
- (a)
- An event API-gateway able to receive HTTP requests and to decide if it is addressed to an administrative user, for storing hashed data, or for consulting (audit) issues;
- (b)
- An administrative user service, able to register different types of users, authentication service able to provide tokens and authorization service, able to decide the permissiveness of the requester;
- (c)
- A storing service that saves hashed messages that later will be used as an audit process; and
- (d)
- A consulting mechanism that provides certainty about the integrity of previously stored data.
We described each of the components, and to give a better idea about implementations details, we supplied a prototype description. We also developed a pair of tools to validate our proposal, consisting of a tester tool and a mobile application to be used for end-users. In addition, as shown in this research, a distributed system connected to a public blockchain induces high transaction times due to processing and, hence, a longer latency.
This architecture can be replicated in different applications that do not natively have blockchain technology built-in as an extension for those systems requiring modular and scalable audit characteristics. Our solution has been built using a microservice architecture because, currently, this approach is the tendency in the software development area.
This is an ongoing work, we are looking for performance statistics, and it has been implemented under the Ethereum platform. Still, it could be interesting to compare other platforms, for example, Hyperledger.
Author Contributions
Conceptualization, J.C.L.-P.; data curation, J.C.L.-P. and L.A.M.-R.; formal analysis, J.C.L.-P. and L.A.M.-R.; funding acquisition, J.C.L.-P. and L.A.M.-R.; investigation, J.C.L.-P.; methodology, J.C.L.-P., L.A.M.-R. and I.A.-B.; project administration, J.C.L.-P.; Resources, J.C.L.-P., L.A.M.-R. and I.A.-B.; software, J.C.L.-P. and I.A.-B.; supervision, J.C.L.-P. and L.A.M.-R.; validation, J.C.L.-P., L.A.M.-R. and I.A.-B.; visualization, J.C.L.-P., L.A.M.-R. and I.A.-B.; writing—original draft, J.C.L.-P.; writing—review and editing, J.C.L.-P., L.A.M.-R. and I.A.-B. All authors have read and agreed to the published version of the manuscript.
Funding
This research was partly funded by COECyTJAL, issued in the FODECIJAL grant, code 8217-2019, under the fund to address state problems 2019; and it was partlially funded by the Mexican National Council for Science and Technology (CONACYT) through research projects 882 and 613.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The smart contracts can be downloaded at https://github.com/UPclopezpProjects/VBSI_smartContracts, accessed on 4 February 2022.
Conflicts of Interest
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
References
- Simou, S.; Kalloniatis, C.; Gritzalis, S.; Mouratidis, H. A survey on cloud forensics challenges and solutions. Secur. Commun. Netw. 2016, 9, 6285–6314. [Google Scholar] [CrossRef]
- Odun-Ayo, I.; Agono, F.; Misra, S. Cloud Migration: Issues and Developments. International MultiConference of Engineers and Computer Scientists. 2018; Volume 1. Available online: http://www.iaeng.org/publication/IMECS2018/IMECS2018_pp231-236.pdf (accessed on 4 February 2022).
- Sivathanu, G.; Wright, C.P.; Zadok, E. Ensuring Data Integrity in Storage: Techniques and Applications. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, StorageSS ’05, Fairfax, VA, USA, 11 November 2005; Association for Computing Machinery: New York, NY, USA, 2005; pp. 26–36. [Google Scholar] [CrossRef]
- Yavuz, A.A.; Ning, P. BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. In Proceedings of the 2009 Annual Computer Security Applications Conference, Honolulu, HI, USA, 7–11 December 2009; pp. 219–228. [Google Scholar] [CrossRef]
- Yavuz, A.A.; Ning, P.; Reiter, M.K. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. In Financial Cryptography and Data Security; Keromytis, A.D., Ed.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 148–163. [Google Scholar] [CrossRef] [Green Version]
- Araújo, R.; Pinto, A. Secure Remote Storage of Logs with Search Capabilities. J. Cybersecur. Priv. 2021, 1, 19. [Google Scholar] [CrossRef]
- Tian, H.; Chen, Z.; Chang, C.C.; Huang, Y.; Wang, T.; Huang, Z.A.; Cai, Y.; Chen, Y. Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 2019, 23, 3779–3792. [Google Scholar] [CrossRef]
- Zawoad, S.; Dutta, A.K.; Hasan, R. SecLaaS: Secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 8–10 May 2013; pp. 219–230. [Google Scholar] [CrossRef]
- Ray, I.; Belyaev, K.; Strizhov, M.; Mulamba, D.; Rajaram, M. Secure Logging as a Service—Delegating Log Management to the Cloud. IEEE Syst. J. 2013, 7, 323–334. [Google Scholar] [CrossRef]
- Zawoad, S.; Dutta, A.K.; Hasan, R. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. IEEE Trans. Dependable Secure Comput. 2016, 13, 148–162. [Google Scholar] [CrossRef]
- Barabanov, A.; Makrushin, D. Security audit logging in microservice-based systems: Survey of architecture patterns. arXiv 2021, arXiv:2102.09435. [Google Scholar]
- Bellini, E.; Iraqi, Y.; Damiani, E. Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey. IEEE Access 2020, 8, 21127–21151. [Google Scholar] [CrossRef]
- Wright, C.S. Bitcoin: A Peer-to-Peer Electronic Cash System; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
- Mohanta, B.K.; Panda, S.S.; Jena, D. An overview of smart contract and use cases in blockchain technology. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 10–12 July 2018; pp. 1–4. [Google Scholar]
- Siyal, A.A.; Junejo, A.Z.; Zawish, M.; Ahmed, K.; Khalil, A.; Soursou, G. Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography 2019, 3, 3. [Google Scholar] [CrossRef] [Green Version]
- Giraldo, F.D.; Milton, C.B.; Gamboa, C.E. Electronic Voting Using Blockchain And Smart Contracts: Proof Of Concept. IEEE Lat. Am. Trans. 2020, 18, 1743–1751. [Google Scholar] [CrossRef]
- Bergman, S.; Asplund, M.; Nadjm-Tehrani, S. Permissioned blockchains and distributed databases: A performance study. Concurr. Comput. Pract. Exp. 2020, 32, e5227. [Google Scholar] [CrossRef]
- Bushong, V.; Abdelfattah, A.S.; Maruf, A.A.; Das, D.; Lehman, A.; Jaroszewski, E.; Coffey, M.; Cerny, T.; Frajtak, K.; Tisnovsky, P.; et al. On Microservice Analysis and Architecture Evolution: A Systematic Mapping Study. Appl. Sci. 2021, 11, 7856. [Google Scholar] [CrossRef]
- Hevner, A.; Chatterjee, S. Design Science Research in Information Systems. In Design Research in Information Systems: Theory and Practice; Springer: Boston, MA, USA, 2010; pp. 9–22. [Google Scholar] [CrossRef]
- Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems Research. J. Manag. Inf. Syst. 2007, 24, 45–77. [Google Scholar] [CrossRef]
- Eyre, E.C. Office Systems. In Office Administration; Macmillan Education UK: London, UK, 1989; pp. 303–310. [Google Scholar] [CrossRef]
- Chen, R.; Li, S.; Li, Z. From Monolith to Microservices: A Dataflow-Driven Approach. In Proceedings of the 2017 24th Asia-Pacific Software Engineering Conference (APSEC), Nanjing, China, 4–8 December 2017; pp. 466–475. [Google Scholar]
- Jaramillo, D.; Nguyen, D.V.; Smart, R. Leveraging microservices architecture by using Docker technology. In Proceedings of the SoutheastCon 2016, Norfolk, VA, USA, 30 March–3 April 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Mishra, D. Cloud Computing: The Era of Virtual World Opportunities and Risks involved. Int. J. Comput. Sci. Eng. 2014, 3, 204–209. Available online: https://www.ijcse.net/docs/IJCSE14-03-04-105.pdf (accessed on 4 February 2022).
- Chellappa, R. Intermediaries in cloud-computing: A new computing paradigm. In Proceedings of the INFORMS Annual Meeting, Dallas, TX, USA, 26–29 October 1997; pp. 26–29. [Google Scholar]
- Ray, P.P. An Introduction to Dew Computing: Definition, Concept and Implications. IEEE Access 2018, 6, 723–737. [Google Scholar] [CrossRef]
- Mell, P.; Grance, T. The NIST definition of cloud computing. Natl. Inst. Sci. Technol. Spec. Publ. 2011, 800, 145. [Google Scholar]
- Subramanian, N.; Jeyaraj, A. Recent security challenges in cloud computing. Comput. Electr. Eng. 2018, 71, 28–42. [Google Scholar] [CrossRef]
- Pujar, S.R.; Chaudhari, S.S.; Aparna, R. Survey on Data Integrity and Verification for Cloud Storage. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Mann, S.; Potdar, V.; Gajavilli, R.S.; Chandan, A. Blockchain technology for supply chain traceability, transparency and data provenance. In Proceedings of the 2018 International Conference on Blockchain Technology and Application, ICBTA 2018, Xi’an, China, 10–12 December 2018; ACM: New York, NY, USA, 2018; pp. 22–25. [Google Scholar] [CrossRef]
- Suzuki, S.; Murai, J. Blockchain as an Audit-Able Communication Channel. In Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; Volume 2, pp. 516–522. [Google Scholar] [CrossRef]
- Ahmad, A.; Saad, M.; Bassiouni, M.; Mohaisen, A. Towards blockchain-driven, secure and transparent audit logs. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous ’18, Melbourne, AU, USA, 5–7 November 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 443–448. [Google Scholar] [CrossRef] [Green Version]
- Lu, N.; Zhang, Y.; Shi, W.; Kumari, S.; Choo, K.K.R. A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 2020, 92, 101741. [Google Scholar] [CrossRef]
- Wei, P.; Wang, D.; Zhao, Y.; Tyagi, S.K.S.; Kumar, N. Blockchain data-based cloud data integrity protection mechanism. Future Gener. Comput. Syst. 2020, 102, 902–911. [Google Scholar] [CrossRef]
- Lopez-Pimentel, J.C.; Rojas, O.; Monroy, R. Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; Volume 1, pp. 126–133. [Google Scholar] [CrossRef]
- López-Pimentel, J.C.; Morales-Rosales, L.A.; Monroy, R. RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root. Sensors 2021, 21, 7669. [Google Scholar] [CrossRef] [PubMed]
- Xu, X.; Pautasso, C.; Zhu, L.; Gramoli, V.; Ponomarev, A.; Tran, A.B.; Chen, S. The blockchain as a software connector. In Proceedings of the 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016; pp. 182–191. [Google Scholar] [CrossRef]
- Odun-Ayo, I.; Ananya, M.; Agono, F.; Goddy-Worlu, R. Cloud computing architecture: A critical analysis. In Proceedings of the 2018 18th International Conference on Computational Science and Applications (ICCSA), Melbourne, Australia, 2–5 July 2018; pp. 1–7. [Google Scholar]
- Zhang, Q.; Cheng, L.; Boutaba, R. Cloud computing: State-of-the-art and research challenges. J. Internet Serv. Appl. 2010, 1, 7–18. [Google Scholar] [CrossRef] [Green Version]
- Fielding, R.; Gettys, J.; Mogul, J.; Frystyk, H.; Masinter, L.; Leach, P.; Berners-Lee, T. RFC2616: Hypertext Transfer Protocol–HTTP/1.1. 1999. Available online: https://datatracker.ietf.org/doc/html/rfc2616 (accessed on 4 February 2022).
- Rescorla, E.; Schiffman, A. RFC2660: The Secure HyperText Transfer Protocol. 1999. Available online: https://www.ietf.org/rfc/rfc2660.txt (accessed on 4 February 2022).
- Eski, S.; Buzluca, F. An automatic extraction approach—Transition to microservices architecture from monolithic application. In Proceedings of the 19th International Conference on Agile Software Development: Companion, Porto, Portugal, 21–25 May 2018; Volume F147763, pp. 1–6. [Google Scholar] [CrossRef]
- Newman, S. Building Microservices: Designing Fine-Grained Systems; O’Reilly Media Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- International Business Machines Corporation. Why New Off-Chain Storage Is Required for Blockchains; Technical Report; IBM: Armonk, NY, USA, 2018. [Google Scholar]
- Gadge, S.; Kotwani, V. Microservice Architecture: API Gateway Considerations [White Paper]; GlobalLogic Inc.: San Jose, CA, USA, 2017; pp. 1–13. [Google Scholar]
- Lang, U. Openpmf scaas: Authorization as a service for cloud & soa applications. In Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 30 November–3 December 2010; pp. 634–643. [Google Scholar]
- Wu, R.; Zhang, X.; Ahn, G.J.; Sharifi, H.; Xie, H. ACaaS: Access control as a service for IaaS cloud. In Proceedings of the 2013 International Conference on Social Computing, Alexandria, VA, USA, 8–14 September 2013; pp. 423–428. [Google Scholar]
- Sandhu, R.S. Role-Based Access Control. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 1998; Volume 46, pp. 237–286. [Google Scholar] [CrossRef]
- Lazouski, A.; Martinelli, F.; Mori, P.A.; Martinelli, F.; Mori, P. A prototype for enforcing usage control policies based on XACML. In International Conference on Trust, Privacy and Security in Digital Business; Springer: Berlin/Heidelberg, Germany, 2012; pp. 79–92. [Google Scholar]
- Hu, V.C.; Ferraiolo, D.; Kuhn, R.; Friedman, A.R.; Lang, A.J.; Cogdell, M.M.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K.; et al. Guide to Attribute Based Access Control (abac) Definition and Considerations (draft); NIST Special Publication; National Institute for Standards and Technology: Gaithersburg, MD, USA, 2013; pp. 1–54.
- López-Pimentel, J.C.; Rojas, O.; Alcaraz-Rivera, M.; Sosa-Gómez, G.; Verteramo-Chiu, L. Automating the avocado supply chain with Blockchain and Off-chain. In Proceedings of the 8th International Conference on Information Systems, Logistics and Supply Chain, ILS 2020, Austin, TX, USA, 22–24 April 2020; pp. 292–298. [Google Scholar]
- Mouat, A. Using Docker: Developing and Deploying Software with Containers; O’Reilly Media Inc.: Sebastopol, CA, USA, 2016; p. 346. [Google Scholar]
- Stubbs, J.; Moreira, W.; Dooley, R. Distributed Systems of Microservices Using Docker and Serfnode. In Proceedings of the 2015 7th International Workshop on Science Gateways, Budapest, Hungary, 3–5 June 2015; pp. 34–39. [Google Scholar] [CrossRef]
- Patel, S.; Sahoo, A.; Mohanta, B.K.; Panda, S.S.; Jena, D. DAuth: A decentralized web authentication system using Ethereum based blockchain. In Proceedings of the 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India, 30–31 March 2019; pp. 1–5. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).