Blockchain-Based Evidence Trustworthiness System in Certification
Abstract
:1. Introduction
- Evidence offers solid confirmation that an entity complies with the specific requirements of a regulation or standard. This verification is essential to ensure that the certification is grounded in factual and precise information.
- The presentation of evidence fosters trust and credibility among stakeholders, such as auditors, regulators, or even customers. It demonstrates that a given certification is more than a formality, being supported by verifiable data.
- Evidence guarantees transparency in any certification process, enabling all involved parties to understand the foundation upon which the certification was awarded, fostering openness and accountability.
- Evidence is essential during audits and reviews to demonstrate compliance with standards. It helps auditors verify that processes and practices comply with the required criteria.
- In numerous industries, presenting evidence is a legal requirement to ensure that organizations adhere to all pertinent laws and regulations.
- Evidence-based certification eliminates subjectivity from the process. Decisions are grounded in objective data rather than opinions, ensuring both fairness and consistency.
- Digital evidence is particularly vulnerable to tampering, and any unauthorized modifications can undermine its integrity.
- Inherent volatility in digital evidence means that mishandling during collection, storage, or transfer can lead to data loss or corruption.
- Maintaining the long-term integrity of digital evidence is complex. Conventional storage solutions often fail to prevent data degradation and loss over time.
2. Research Methodology
3. Evidence Security
3.1. Risk Assessment
- Confidentiality ensures that the information remains inaccessible and undisclosed to unauthorized entities. Maintaining the confidentiality of evidence is crucial in a certification process, as such evidence often contains sensitive information.
- Integrity involves maintaining the accuracy and consistency of the evidence, ensuring that it remains unchanged. During the certification process, auditors depend on the integrity of the evidence to issue certificates and, therefore, require total confidence in it.
- Availability refers to the accessibility and usability of evidence when auditors require it. Although not mandatory for a certification process, ensuring high availability of evidence is highly recommended.
- Authenticity ensures that the evidence is authentic and comes from a verified source. This is related to the authentication of the evidence sources.
- Authorization refers to access levels or user privileges for different assets, including information. In a certification context, it is essential to control who can provide or access the evidence.
- Non-repudiation is the ability to prove that an event has occurred and to identify its originating entities. In certification, non-repudiation is crucial, as sources providing evidence should not be able to deny their involvement.
- High: The attacker is highly motivated and sufficiently capable; current controls to prevent the vulnerability are inefficient.
- Moderate: The attacker is motivated and capable, but controls are in place.
- Low: The attacker lacks motivation and/or capability, or controls are in place to prevent or at least significantly impede the vulnerability.
- High: There is a strong need for corrective measures.
- Moderate: Corrective actions are needed, and a plan must be developed to incorporate these actions over a reasonable period of time.
- Low: It must be decided whether corrective actions are required or whether the risk can be accepted.
- Strong user access control techniques are required to limit access to evidence only to authorized users.
- Encryption and anonymization techniques are employed to protect the privacy of evidence [18].
- Integrity must be guaranteed to detect evidence manipulation.
3.2. Risk Mitigation
- Authority:
- -
- In Blockchain, each node participates in a consensus mechanism to verify transactions, providing equal access and capabilities, thus democratizing the system.
- -
- Traditional databases, on the other hand, are controlled by a central authority (administrator), making Blockchain advantageous as it eliminates the need for trust by design.
- Architecture:
- -
- Blockchain distributes data across all nodes, and each node stores a copy of the entire Blockchain. This setup ensures that even if some nodes are compromised, the system remains operational, making single-point failure infeasible.
- -
- Traditional databases store data centrally on a server, which is more vulnerable to attacks.
- Data Handling:
- -
- In Blockchain, data cannot be deleted; once recorded, it remains forever. For an audit trail, updating evidence is not necessary, as any update is considered new evidence. Deleting existing information is also not a requirement for an audit trail; in fact, not being able to remove information is beneficial to the transparency and trustworthiness of the audit solution.
- -
- Traditional databases offer more functionalities, such as updating and deleting data.
- Integrity:
- -
- Blockchain ensures data integrity through a consensus mechanism where all nodes validate transactions and store a copy of the entire Blockchain, making it nearly impossible for a malicious actor to alter the data.
- -
- Traditional databases are more vulnerable if the administrator is compromised.
- Transparency:
- -
- In Blockchain, all nodes have the same access and capabilities, ensuring transparency by design.
- -
- In traditional databases, the administrator controls who can access the data and what actions they can perform.
- Implementation and Maintenance Costs:
- -
- Blockchain is a relatively new technology, and its implementation and maintenance are generally more expensive than traditional databases. However, as Blockchain technology becomes more widespread, these costs are decreasing.
- -
- Traditional databases have more contained and predictable costs.
- Performance:
- -
- Blockchain is slow due to additional operations like signature verifications and consensus mechanisms. However, although desired, high performance on audit trails is not an essential requirement.
- -
- Traditional databases, however, are known for their fast execution times and the ability to handle large volumes of data.
- Replication:
- -
- Blockchain replicates entire transactions, allowing each participant node to replay the execution. In addition, it operates without a trusted central entity, replicating entire transactions for replay by each node.
- -
- In contrast, distributed databases replicate the resulting log of read and write operations. A distributed database management system is required to ensure that updates, additions, and deletions in one database are automatically reflected in all others.
- Concurrency:
- -
- Most Blockchains support only serial execution because the consensus mechanism, rather than transaction execution, is typically the performance bottleneck. This ensures deterministic behaviour of smart contracts when transactions are replicated across many nodes, making ledger states easier to identify. Although concurrency is not a major concern for an audit trail, some Blockchains, like Hyperledger Fabric, have started adopting simple concurrency techniques, such as executing transactions in parallel against ledger states before ordering.
- -
- In contrast, distributed databases use sophisticated concurrency control mechanisms to maximize concurrency and improve performance.
4. Secure Evidence Trustworthiness System
- Inalterability: Ensuring the integrity of evidence is crucial, and Blockchain guarantees this by design.
- Long-term maintenance: Evidence must remain accessible even years after certification expiration, which Blockchain ensures as long as the network is operational.
- Assurance of origin: Tracing the provider of evidence is essential, and permissioned Blockchain guarantees this through signed transactions.
- Adaptability: The audit trail solution can be adapted to the particularities of each application domain.
- High Usability: Trustworthiness systems must be user-friendly for non-technicians involved in certification processes. The Blockchain monitor included in the design to access evidence records via a browser makes the use of Blockchain transparent.
- Confidentiality: Evidence is usually considered sensitive information that should not be directly recorded on the Blockchain to avoid privacy issues. Integration with existing databases should be enabled.
- Automation: Auditors often require automatic processes to facilitate the certification process.
4.1. Sensitive Evidence
- Any authorized user defines an evidence identifier, calculates the evidence hash, and records it in the Blockchain. The raw evidence is securely stored in the local storage of the organization that prepares the certification process.
- -
- If the evidence is considered easy to deduce, a random number should also be added to the evidence before calculating the hash. This random number is also stored in secure local storage, linked to the value of the raw evidence.
- Subsequently, when an auditor needs to verify the integrity of evidence, he retrieves the recorded hash of the evidence by the evidence identifier through the Blockchain monitor.
- The auditor can also retrieve the current evidence value (and the random number, if applicable) using the evidence identifier from local storage, apply the hash function, and manually compare the result with the hash value from the Blockchain. If the hash remains unchanged, the evidence value is intact; if the hash differs, the evidence has been tampered with and cannot be trusted.
4.2. Automatic Integrity Verification
- Obtain the desired raw evidence (and the random values, if applicable) and the evidence identifiers from the local storage and calculate the corresponding hashes.
- Send the calculated hash to the Blockchain in order to be securely compared with the recorded one based on the evidence identifier. The comparison result is securely obtained in the smart contract, indicating true (trustworthy) or false (modified). In this case, the information is obtained through the REST API of the Blockchain client (instead of using the Blockchain monitor).
5. Validation and Results
5.1. Cybersecurity Certification
- Improves the integrity, reliability and transparency of the evidence in 100% of cases.
- Increases auditor confidence, and certifications are completed in a shorter time, as auditors do not need to manually verify evidence, and thus, costs are reduced.
- Enhances problem detection. The automatic integrity check functionality provides an easy way to detect evidence tampering.
- Consensus mechanisms: These have traditionally been time-consuming, such as the Proof of Work used in Bitcoin. However, current solutions include simpler and faster alternatives, especially in permissioned networks such as that suggested for the trustworthiness system [48,49]. In this validation, the Raft consensus algorithm was considered with the default configuration [50]. Raft is well adopted in private networks such as Quorum due to its good performance and scalability [51].
- Network Congestion: A congested network can cause high delays. However, permissioned networks are usually less congested because only a group of authorized participants can join the network, which reduces the number of nodes that need to validate transactions. This reduces overhead and improves efficiency [52]. In this validation, the deployment of a dedicated Quorum network ensures no congestion. However, in real-world implementations, such as the potential deployment in EBSI where the Blockchain network is shared by multiple services, some level of congestion is anticipated.
- Block size: A larger block can contain more transactions, but it can also increase processing time and latency. This is a configurable parameter determined by the Blockchain technology that needs to be optimized [53]. In this validation, the 64 kB default value for Quorum was considered. As the data to be recorded in the trustworthiness system (evidence and assessment result) is always lower than 1 kB considering the data model in Figure 6, a block can contain several transactions, improving the performance.
5.2. Applicability to Other Domains
- Decide whether the evidence to be secured is sensitive information and only the hash of the information can be recorded on the Blockchain as explained in Section 4.1. In contrast, information can be directly recorded on the trustworthiness system, making verification even more user-friendly. For example, health-related evidence will almost always be considered sensitive, as it often involves personal data that must be protected according to the GDPR. In this case, the use of hashes as proof of integrity is recommended. However, there may be cases where the evidence relates to anonymized patient information, aggregated disease information, or even public information about drugs or treatments that do not require confidentiality. In these cases, the evidence can be recorded directly in the trustworthiness system, avoiding subsequent calculation and verification of hashes.
- Identify the metadata or contextual information to be considered for each domain, depending on its particularities. Following with the example in the health certification domain, the following contextual information are examples that could be considered to characterize health evidence:
- -
- Date and time of evidence collection.
- -
- Data source, identifying the source of the data, such as clinical records, research studies, or medical devices.
- -
- Collection method, defining how evidence was obtained, ensuring reproducibility and validity.
- -
- Environmental conditions, including location or specific conditions, if applicable.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Pinolini, M. The importance of certification. J. Prot. Coatings Linings 2020, 37, 8–9. [Google Scholar]
- Sutawidjaya, A.H.; Mochtar, I.; Nawangsari, L.C. Quality certification and customer satisfaction. Eur. Res. Stud. J. 2018, XXI, 266–279. [Google Scholar] [CrossRef]
- ISO. ISO Survey 2023. 2024. Available online: https://www.iso.org/the-iso-survey.html (accessed on 3 November 2024).
- Teo, Y.; Shringarpure, S.; Jeong, H.; Prasannan, N.; Brecht, B.; Silberhorn, C.; Evans, M.; Mogilevtsev, D.; Sánchez-Soto, L. Evidence-based certification of quantum dimensions. Phys. Rev. Lett. 2024, 133, 050204. [Google Scholar] [CrossRef]
- Nair, S.; De La Vara, J.L.; Sabetzadeh, M.; Briand, L. An extended systematic literature review on provision of evidence for safety certification. Inf. Softw. Technol. 2014, 56, 689–717. [Google Scholar] [CrossRef]
- Nikkel, B. Fintech forensics: Criminal investigation and digital evidence in financial technologies. Forensic Sci. Int. Digit. Investig. 2020, 33, 200908. [Google Scholar] [CrossRef]
- Shah, M.S.M.B.; Saleem, S.; Zulqarnain, R. Protecting digital evidence integrity and preserving chain of custody. J. Digit. Forensics Secur. Law 2017, 12, 12. [Google Scholar] [CrossRef]
- Guttman, B.; White, D.R.; Walraven, T. Digital Evidence Preservation. NIST Interagency Report 2022. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8387.pdf (accessed on 5 November 2024).
- Shlonsky, A.; Wagner, D. The next step: Integrating actuarial risk assessment and clinical judgment into an evidence-based practice framework in CPS case management. Child. Youth Serv. Rev. 2005, 27, 409–427. [Google Scholar] [CrossRef]
- Berk, R.; Heidari, H.; Jabbari, S.; Kearns, M.; Roth, A. Fairness in criminal justice risk assessments: The state of the art. Sociol. Methods Res. 2021, 50, 3–44. [Google Scholar] [CrossRef]
- Ross, R.S. Guide for Conducting Risk Assessments. 2012. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf (accessed on 2 November 2024).
- van den Bos, J. Gathering Evidence: Model-Driven Software Engineering in Automated Digital Forensics. Ph.D. Thesis, Universiteit van Amsterdam, Amsterdam, The Netherlands, 2014. [Google Scholar]
- Tang, L.; Sun, Z.; Idnay, B.; Nestor, J.G.; Soroush, A.; Elias, P.A.; Xu, Z.; Ding, Y.; Durrett, G.; Rousseau, J.F.; et al. Evaluating large language models on medical evidence summarization. NPJ Digit. Med. 2023, 6, 158. [Google Scholar] [CrossRef]
- Yee, C.K.; Zolkipli, M.F. Review on confidentiality, integrity and availability in information security. J. ICT Educ. 2021, 8, 34–42. [Google Scholar]
- Chng, S.; Lu, H.Y.; Kumar, A.; Yau, D. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 2022, 5, 100167. [Google Scholar] [CrossRef]
- Varshney, G.; Kumawat, R.; Varadharajan, V.; Tupakula, U.; Gupta, C. Anti-phishing: A comprehensive perspective. Expert Syst. Appl. 2024, 238, 122199. [Google Scholar] [CrossRef]
- Zhao, Z.; Li, Z.; Zhou, Z.; Yu, J.; Song, Z.; Xie, X.; Zhang, F.; Zhang, R. DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 2024, 138, 103663. [Google Scholar] [CrossRef]
- Pratomo, A.B.; Mokodenseho, S.; Aziz, A.M. Data encryption and anonymization techniques for enhanced information system security and privacy. West Sci. Inf. Syst. Technol. 2023, 1, 1–9. [Google Scholar] [CrossRef]
- Ahmad, A.; Saad, M.; Al Ghamdi, M.; Nyang, D.; Mohaisen, D. Blocktrail: A service for secure and transparent blockchain-driven audit trails. IEEE Syst. J. 2021, 16, 1367–1378. [Google Scholar] [CrossRef]
- Tysebaert, S.; Lloreda Sanchez, H.; Riviere, E.; Rath, A. AuditTrust: A blockchain-based secure audit trail for data sharing in distributed environment. Commun. Comput. Inf. Sci. 2022. [Google Scholar]
- Pu, S.; Lam, J.S.L. The benefits of blockchain for digital certificates: A multiple case study analysis. Technol. Soc. 2023, 72, 102176. [Google Scholar] [CrossRef]
- Chowdhury, M.J.M.; Colman, A.; Kabir, M.A.; Han, J.; Sarda, P. Blockchain versus database: A critical analysis. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1348–1353. [Google Scholar]
- Nicola, M.; Jarke, M. Performance modeling of distributed and replicated databases. IEEE Trans. Knowl. Data Eng. 2000, 12, 645–672. [Google Scholar] [CrossRef]
- Carcary, M. Advancing the research audit trail: A ten year retrospective. In Proceedings of the European Conference on Research Methods for Business & Management Studies, Aveiro, Portugal, 18–19 June 2020; pp. 56–62. [Google Scholar]
- Gokoglan, K.; Cetın, S.; Bılen, A. Blockchain technology and its impact on audit activities. J. Econ. Financ. Account. 2022, 9, 72–81. [Google Scholar] [CrossRef]
- Vincent, N.E.; Skjellum, A.; Medury, S. Blockchain architecture: A design that helps CPA firms leverage the technology. Int. J. Account. Inf. Syst. 2020, 38, 100466. [Google Scholar] [CrossRef]
- Sakshi; Malik, A.; Sharma, A.K. A survey on blockchain based IoT forensic evidence preservation: Research trends and current challenges. Multimed. Tools Appl. 2024, 83, 42413–42458. [Google Scholar] [CrossRef]
- Oakley, J.; Worley, C.; Yu, L.; Brooks, R.R.; Özçelik, İ.; Skjellum, A.; Obeid, J.S. Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. Digit. Threat. Res. Pract. 2023, 4, 1–20. [Google Scholar] [CrossRef] [PubMed]
- Pattengale, N.D.; Hudson, C.M. Decentralized genomics audit logging via permissioned blockchain ledgering. BMC Med. Genom. 2020, 13, 1–9. [Google Scholar] [CrossRef]
- Hashem, R.; Mubarak, A.R.I.; Abu-Musa, A. The impact of blockchain technology on audit process quality: An empirical study on the banking sector. Int. J. Audit. Account. Stud. 2023, 5, 87–118. [Google Scholar]
- Tian, X.; Zhu, J.; Zhao, X.; Wu, J. Improving operational efficiency through blockchain: Evidence from a field experiment in cross-border trade. Prod. Plan. Control 2024, 35, 1009–1024. [Google Scholar] [CrossRef]
- Ferreira, J.M.; Acuña, S.T.; Dieste, O.; Vegas, S.; Santos, A.; Rodríguez, F.; Juristo, N. Impact of usability mechanisms: An experiment on efficiency, effectiveness and user satisfaction. Inf. Softw. Technol. 2020, 117, 106195. [Google Scholar] [CrossRef]
- Sobrino-Duque, R.; Carrillo-de Gea, J.M.; López-Jiménez, J.J.; Nicolás Ros, J.; Fernández-Alemán, J.L. Usevalia: Managing Inspection-Based Usability Audits. Int. J. Hum. Comput. Interact. 2024, 40, 719–743. [Google Scholar] [CrossRef]
- Chen, F.; Meng, F.; Xiang, T.; Dai, H.; Li, J.; Qin, J. Towards usable cloud storage auditing. IEEE Trans. Parallel Distrib. Syst. 2020, 31, 2605–2617. [Google Scholar] [CrossRef]
- Miller, A. Permissioned and permissionless blockchains. In Blockchain for Distributed Systems Security; IEEE: Piscataway, NJ, USA, 2019; pp. 193–204. [Google Scholar]
- Williams, I. Cross-chain blockchain networks, compatibility standards, and interoperability standards: The case of european blockchain services infrastructure. In Cross-Industry Use of Blockchain Technology and Opportunities for the Future; IGI Global: Hershey, PA, USA, 2020; pp. 150–165. [Google Scholar]
- Fan, C.; Lin, C.; Khazaei, H.; Musilek, P. Performance analysis of hyperledger besu in private blockchain. In Proceedings of the 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Newark, CA, USA, 15–18 August 2022; pp. 64–73. [Google Scholar]
- Regueiro, C.; Seco, I.; Gutiérrez-Agüero, I.; Urquizu, B.; Mansell, J. A blockchain-based audit trail mechanism: Design and implementation. Algorithms 2021, 14, 341. [Google Scholar] [CrossRef]
- Melissari, F.; Papadakis, A.; Chatzitheodorou, D.; Tran, D.; Schouteten, J.; Athanasiou, G.; Zahariadis, T. Experiences Using Ethereum and Quorum Blockchain Smart Contracts in Dairy Production. J. Sens. Actuator Netw. 2024, 13, 6. [Google Scholar] [CrossRef]
- Capocasale, V.; Gotta, D.; Perboli, G. Comparative analysis of permissioned blockchain frameworks for industrial applications. Blockchain Res. Appl. 2023, 4, 100113. [Google Scholar] [CrossRef]
- Pavlovics, A. JPMorgan’s Quorum Blockchain Performance Testing. 2018. Available online: https://scandiweb.com/blog/jpmorgan-s-quorum-blockchain-performance-testing/ (accessed on 17 December 2024).
- Voigt, P.; Von dem Bussche, A. The eu general data protection regulation (gdpr). In A Practical Guide, 1st ed.; Springer International Publishing: Cham, Switzerland, 2017; Volume 10, pp. 10–5555. [Google Scholar]
- Chi, L.; Zhu, X. Hashing techniques: A survey and taxonomy. ACM Comput. Surv. 2017, 50, 1–36. [Google Scholar] [CrossRef]
- Rawal, B.S.; Kumar, L.S.; Maganti, S.; Godha, V. Comparative Study of Sha-256 Optimization Techniques. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 387–392. [Google Scholar]
- Alkhwaja, I.; Albugami, M.; Alkhwaja, A.; Alghamdi, M.; Abahussain, H.; Alfawaz, F.; Almurayh, A.; Min-Allah, N. Password cracking with brute force algorithm and dictionary attack using parallel programming. Appl. Sci. 2023, 13, 5979. [Google Scholar] [CrossRef]
- Orue-Echevarria, L.; Garcia, J.L.; Banse, C.; Alonso, J. MEDINA: Improving Cloud Services trustworthiness through continuous audit-based certification. In Proceedings of the CEUR Workshop Proceedings, CEUR-WS, St. Petersburg, Russia, 23–26 June 2021. [Google Scholar]
- EMERALD. Evidence Management for Continuous Certification as a Service in the Cloud. 2024. Available online: https://cordis.europa.eu/project/id/101120688 (accessed on 5 November 2024).
- Zhou, S.; Li, K.; Xiao, L.; Cai, J.; Liang, W.; Castiglione, A. A systematic review of consensus mechanisms in blockchain. Mathematics 2023, 11, 2248. [Google Scholar] [CrossRef]
- Mazzoni, M.; Corradi, A.; Di Nicola, V. Performance evaluation of permissioned blockchains for financial applications: The ConsenSys Quorum case study. Blockchain Res. Appl. 2022, 3, 100026. [Google Scholar] [CrossRef]
- Ongaro, D.; Ousterhout, J. The raft consensus algorithm. Lect. Notes CS 2015, 190, 2022. [Google Scholar]
- Baliga, A.; Subhod, I.; Kamat, P.; Chatterjee, S. Performance evaluation of the quorum blockchain platform. arXiv 2018, arXiv:1809.03421. [Google Scholar]
- Gupta, M.K.; Dwivedi, R.K.; Sharma, A.; Farooq, M. Performance Evaluation of Blockchain Platforms. In Proceedings of the 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), Gorakhpur, India, 23–24 June 2023; pp. 1–6. [Google Scholar]
- Singh, N.; Vardhan, M. Computing optimal block size for blockchain based applications with contradictory objectives. Procedia Comput. Sci. 2020, 171, 1389–1398. [Google Scholar] [CrossRef]
- Hoerbst, A.; Ammenwerth, E. Quality and Certification of Electronic Health Records. Appl. Clin. Inform. 2010, 1, 149–164. [Google Scholar]
- Georgieva, P.; Nikolova, E.; Orozova, D.; Jecheva, V. Certification in Teaching Information Technologies for Engineering Graduates. In Proceedings of the ICERI2019 Proceedings, IATED, Seville, Spain, 11–13 November 2019; pp. 4564–4573. [Google Scholar]
- Bian, Y.; Yan, S.; Yi, Z.; Guan, X.; Chen, Y.J. Quality certification in agricultural supply chains: Implications from government information provision. Prod. Oper. Manag. 2022, 31, 1456–1472. [Google Scholar] [CrossRef]
- Heras-Saizarbitoria, I.; Boiral, O.; Díaz de Junguitu, A. Environmental management certification and environmental performance: Greening or greenwashing? Bus. Strategy Environ. 2020, 29, 2829–2841. [Google Scholar] [CrossRef]
Protection Goal | Potential Attack | Description |
---|---|---|
Confidentiality | Eavesdrop on evidence storage connection | Secretly listen to the private communication between the evidence source and the evidence storage without consent to gather data (or metadata) information. It is usually related to a lack of encryption services. |
Gain read access to evidence storage | Broken access control vulnerabilities occur when users can access data they should not be able to. This issue arises from a lack of proper protection in sensitive evidence or through privilege escalation. | |
Phishing | Obtain authentication data by impersonating oneself as a trustworthy entity in order to gain access to evidence. | |
Integrity | Man-in-the-Middle on evidence storage connection | The attacker secretly relays and alters the information in the communication between the evidence source and the evidence storage that believes that they are directly communicating with each other. |
Gain write access to evidence storage | Broken access control vulnerabilities occur when users can access data they should not be able to. This issue arises from a lack of proper protection in sensitive evidence or through privilege escalation. | |
Availability | Denial of Service (DoS) attack to the evidence storage | Flooding the evidence storage with traffic or sending it information that triggers a crash in order to shut down the system, making it inaccessible to its users. |
Internet access down | Internet outage due to an external problem (natural disaster, etc.). | |
Gain write access to evidence storage | Write access to the storage enables an attacker to simply delete evidence (see the integrity threat). | |
Authenticity and Non-Repudiation | Phishing | Obtain authentication data by phishing mechanisms to provide not real evidence. |
Poor private key | Passwords used are weak. Attackers could guess the password of a user to gain access to the evidence storage. | |
Man-in-the-Middle on evidence storage connection | The attacker secretly relays and alters the information in the communication between the evidence source and the evidence storage that believes that they are directly communicating with each other. | |
Authorization | Privilege escalation | Elevated access to the evidence storage by exploiting security vulnerabilities. |
Attacker | Motivation |
---|---|
Outsiders |
|
Insiders |
|
Attack | Likelihood | Justification |
---|---|---|
Eavesdrop on evidence storage connection | Low |
|
Gain read access to evidence storage | High |
|
Phishing | High |
|
Man-in-the-Middle on evidence storage connection | Moderate |
|
Gain write access to evidence storage | High |
|
Denial of Service (DoS) attack to the evidence storage | High |
|
Internet access down | Low |
|
Poor private key | High |
|
Privilege Escalation | High |
|
Attack | Effect | Impact |
---|---|---|
Eavesdrop on evidence storage connection Gain read access to evidence storage |
| Moderate |
Phishing Man-in-the-Middle on evidence storage connection Gain write access to evidence storage Poor private key Privilege Escalation |
| High |
Denial of Service (DoS) attack to the evidence storage Internet access down |
| High |
Likelihood | Low Impact | Moderate Impact | High Impact |
---|---|---|---|
Low | Low | Moderate | Moderate |
Moderate | Moderate | Moderate | High |
High | Moderate | High | Very High |
Attack | Likelihood | Impact | Risk |
---|---|---|---|
Eavesdrop on evidence storage connection | Low | Moderate | Moderate |
Gain read access to evidence storage | High | Moderate | High |
Phishing | High | High | Very High |
Man-in-the-Middle on evidence storage connection | Moderate | High | High |
Gain write access to evidence storage | High | High | Very High |
Denial of Service (DoS) attack to the evidence storage | High | High | Very High |
Internet access down | Low | High | Moderate |
Poor private key | High | High | Very High |
Privilege Escalation | High | High | Very High |
Attack | Justification |
---|---|
Eavesdrop on evidence storage connection |
|
Gain read access to evidence storage | |
Phishing |
|
Man-in-the-Middle on evidence storage connection | |
Gain write access to evidence storage | |
Poor private key | |
Privilege Escalation | |
Denial of Service (DoS) attack to the evidence storage |
|
Internet access down |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Regueiro, C.; Urquizu, B. Blockchain-Based Evidence Trustworthiness System in Certification. J. Cybersecur. Priv. 2025, 5, 1. https://doi.org/10.3390/jcp5010001
Regueiro C, Urquizu B. Blockchain-Based Evidence Trustworthiness System in Certification. Journal of Cybersecurity and Privacy. 2025; 5(1):1. https://doi.org/10.3390/jcp5010001
Chicago/Turabian StyleRegueiro, Cristina, and Borja Urquizu. 2025. "Blockchain-Based Evidence Trustworthiness System in Certification" Journal of Cybersecurity and Privacy 5, no. 1: 1. https://doi.org/10.3390/jcp5010001
APA StyleRegueiro, C., & Urquizu, B. (2025). Blockchain-Based Evidence Trustworthiness System in Certification. Journal of Cybersecurity and Privacy, 5(1), 1. https://doi.org/10.3390/jcp5010001