Blockchain-Based Reference Architecture for Automated, Transparent, and Notarized Attestation of Compliance Adaptations
Abstract
:Featured Application
Abstract
1. Introduction
2. Related Work
3. Background
3.1. Formal Definition of Streams
3.2. Formal Definition of Configurations
4. Results
4.1. Software Architecture
4.1.1. Management Smart Contract
- Constructor(uint g, uint q, address cloudAppProvider, address cloudAppConsumer, address cloudApp): The Constructor of the smart contract. The unsigned Diffie–Hellman must instantiate a new management contract. Moreover, the Constructor expects the blockchain addresses for all three communicating parties. The values g and q are later used for creating a shared secret key between the communicating parties. The blockchain addresses of the cloud application provider (cloudAppProvider), the cloud application consumer (cloudAppConsumer), and the cloud application (cloudApp) are all employed for authenticating smart contract requests. All management smart contract requests are authenticated based on the provided digital signature of placed transactions.
- getSymmetricParameters(): Returns the public Diffie–Hellman key-exchange values g and q. The values are initially set at the construction of the smart contract.
- setFirstSymmetricKey(uint value): Past research [38] has already shown that the Diffie–Hellman key-exchange protocol is vulnerable to man-in-the-middle (MITM) attacks; therefore, public keys should only be exchanged in an authenticated manner. The setFirstSymmetricKey function ensures an authenticated first exchange of the public Diffie–Hellman keys.
- setSecondSymmetricKey(uint value): At the same time as the setFirstSymmetricKey function, the setSecondSymmetricKey function ensures an authenticated first exchange of the public Diffie–Hellman keys.
- getFirstSymmetricKey(): Using the setFirstSymmetricKey function, the public Diffie–Hellman keys are stored on the blockchain. The getFirstSymmetricKey ensures that the set public keys can be retrieved from the blockchain.
- getSecondSymmetricKey(): At the same time as the getFirstSymmetricKey function, the getSecondSymmetricKey function ensures that the public keys set with the setSecondSymmetricKey function can be retrieved from the blockchain.
- setConfiguration(string c, string t): Using the Diffie–Hellman key-exchange protocol, a shared symmetric key s is created among the three communicating parties. Using the secret key s, the cloud application provider and cloud application consumer can create an encrypted configuration c and its authentication tag t [39]. c and t represent the inputs for this function.
- getConfiguration(): Returns (c,t)—the latest set configuration.
- setStatus(string h): This function should only be executed by the cloud application. It stores a hash value at the smart contract.
- getStatus(): Returns h—the last hash value of a cloud instance successfully implemented the configuration set by setConfiguration.
4.1.2. Cloud Management Script
4.1.3. Consumer Management Script
4.2. Software Implementation
5. Evaluation
5.1. Quantitative User Experience Survey
5.2. Qualitative Focus Group Discussions
6. Discussion
7. Conclusions
- Automatically: No user is required to implement the configuration. Furthermore, configurations are executed automatically, without delays or human error.
- Transparently: Every participant can see what the last successfully implemented configuration was at any time. Moreover, the previously stored configuration can also be seen due to blockchain technology. Configuration changes are not solely stored transparently. The costs of a change are also published transparently using a smart contract. Thus, configuration changes can be automated, and their costs are predictable.
- Notarized: If a cloud application succeeds, a snapshot is generated. The hash value of this snapshot is stored in a smart contract. If a dispute or uncertainty related to the configuration occurs, the hash value of the last successfully created snapshot can be retrieved from the blockchain. Simultaneously, the snapshot associated with the stored hash value can be retrieved from the data storage of the cloud provider. The integrity of the selected snapshot can be verified using the retrieved hash value. However, due to the properties of cryptographic hash values, a snapshot matching a hash value cannot be changed afterward. Consequently, the cloud configuration is documented in a tamperproof manner.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References and Notes
- Ritter, T.; Pedersen, C.L. Digitization Capability and the Digitalization of Business Models in Business-to-Business Firms: Past, Present, and Future. Ind. Mark. Manag. 2020, 86, 180–190. [Google Scholar] [CrossRef]
- Bharathi Murthy, C.H.V.N.U.; Shri, M.L.; Kadry, S.; Lim, S. Blockchain Based Cloud Computing: Architecture and Research Challenges. IEEE Access 2020, 8, 205190–205205. [Google Scholar] [CrossRef]
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing. In Cloud Computing and Government: Background, Benefits, Risks; Nova Science Publishers: Hauppauge, NY, USA, 2011; pp. 171–173. [Google Scholar] [CrossRef]
- Etro, F. The Economics of Cloud Computing. In Cloud Technology: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2014; Volume 4, pp. 2135–2148. ISBN 9781466665408. [Google Scholar]
- Ma, D. The Business Model of “Software-As-A-Service”. In Proceedings of the IEEE International Conference on Services Computing (SCC 2007), Salt Lake City, UT, USA, 9–13 July 2007; pp. 701–702. [Google Scholar]
- Singh, A.; Chatterjee, K. Cloud Security Issues and Challenges: A Survey. J. Netw. Comput. Appl. 2017, 79, 88–115. [Google Scholar] [CrossRef]
- Susanto, H.; Almunawar, M.; Tuan, Y. Information Security Management System Standards: A Comparative Study of the Big Five. Int. J. Electr. Comput. Sci. IJECS-IJENS 2011, 11, 23–29. [Google Scholar]
- Al-marsy, A.; Chaudhary, P.; Rodger, J.A. A Model for Examining Challenges and Opportunities in Use of Cloud Computing for Health Information Systems. Appl. Syst. Innov. 2021, 4, 15. [Google Scholar] [CrossRef]
- Martens, B.; Walterbusch, M.; Teuteberg, F. Costing of Cloud Computing Services: A Total Cost of Ownership Approach. In Proceedings of the Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2012; pp. 1563–1572. [Google Scholar]
- Makhlouf, R. Cloudy Transaction Costs: A Dive into Cloud Computing Economics. J. Cloud Comput. 2020, 9, 1. [Google Scholar] [CrossRef] [Green Version]
- McCafferty, D. How Unexpected Costs Create a “Cloud Hangover”. Available online: https://www.cioinsight.com/it-strategy/cloud-virtualization/slideshows/how-unexpected-costs-create-a-cloud-hangover.html (accessed on 30 March 2022).
- Zimmerman, D.K. Five Cloud Essentials for the Boardroom: What Banking and Financial Markets Executives Need to Know about Cloud Computing. J. Payments Strateg. Syst. 2014, 8, 84–93. [Google Scholar]
- van der Werff, L.; Fox, G.; Masevic, I.; Emeakaroha, V.C.; Morrison, J.P.; Lynn, T. Building Consumer Trust in the Cloud: An Experimental Analysis of the Cloud Trust Label Approach. J. Cloud Comput. 2019, 8, 6. [Google Scholar] [CrossRef]
- Buchkremer, R.; Demund, A.; Ebener, S.; Gampfer, F.; Jagering, D.; Jurgens, A.; Klenke, S.; Krimpmann, D.; Schmank, J.; Spiekermann, M.; et al. The Application of Artificial Intelligence Technologies as a Substitute for Reading and to Support and Enhance the Authoring of Scientific Review Articles. IEEE Access 2019, 7, 65263–65276. [Google Scholar] [CrossRef]
- Martín-Martín, A.; Orduna-Malea, E.; Thelwall, M.; Delgado López-Cózar, E. Google Scholar, Web of Science, and Scopus: A Systematic Comparison of Citations in 252 Subject Categories. J. Informetr. 2018, 12, 1160–1177. [Google Scholar] [CrossRef] [Green Version]
- Falagas, M.E.; Pitsouni, E.I.; Malietzis, G.A.; Pappas, G. Comparison of PubMed, Scopus, Web of Science, and Google Scholar: Strengths and Weaknesses. FASEB J. 2008, 22, 338–342. [Google Scholar] [CrossRef] [PubMed]
- Rowley, J.; Slack, F. Conducting a Literature Review. Manag. Res. News 2004, 27, 31–39. [Google Scholar] [CrossRef]
- Bird, S.; Loper, E. NLTK: The Natural Language Toolkit. In Proceedings of the 42nd Annual Meeting of the Association for Computational Linguistics, Barcelona, Spain, 21–26 July 2004; Association for Computational Linguistics: Barcelona, Spain, 2004; pp. 1–4. [Google Scholar]
- Balakrishnama, S.; Ganapathiraju, A. Linear Discriminant Analysis—A Brief Tutorial. Compute 1998, 18, 1–8. [Google Scholar]
- vom Brocke, J.; Simons, A.; Niehaves, B.; Niehaves, B.; Reimer, K.; Plattfaut, R.; Cleven, A. Reconstructing the Giant: On the Importance of. In Proceedings of the 17th European Conference on Information Systems (ECIS 2009), Verona, Italy, 8–10 June 2009; pp. 1–12. [Google Scholar]
- Koshiba, A.; Yan, Y.; Guo, Z.; Namiki, M.; Zhou, L. TEE-KV: Secure Immutable Key-Value Store for Trusted Execution Environments. In Proceedings of the ACM Symposium on Cloud Computing, Carlsbad, CA, USA, 11–13 October 2018; p. 535. [Google Scholar]
- Rebello, G.A.F.; Alvarenga, I.D.; Sanz, I.J.; Duarte, O.C.M.B. BSec-NFVO: A Blockchain-Based Security for Network Function Virtualization Orchestration. In Proceedings of the IEEE International Conference on Communications, Shanghai, China, 20–24 May 2019. [Google Scholar]
- Demi, S.; Colomo-Palacios, R.; Sánchez-Gordón, M. Software Engineering Applications Enabled by Blockchain Technology: A Systematic Mapping Study. Appl. Sci. 2021, 11, 2960. [Google Scholar] [CrossRef]
- Yang, H.; Su, R.; Huang, P.; Bai, Y.; Fan, K.; Yang, K.; Li, H.; Yang, Y. PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. Secur. Commun. Netw. 2021, 2021, 9993855. [Google Scholar] [CrossRef]
- Yang, C.; Zhao, F.; Tao, X.; Wang, Y. Publicly Verifiable Outsourced Data Migration Scheme Supporting Efficient Integrity Checking. J. Netw. Comput. Appl. 2021, 192, 103184. [Google Scholar] [CrossRef]
- Zuo, Y.; Kang, Z.; Xu, J.; Chen, Z. BCAS: A Blockchain-Based Ciphertext-Policy Attribute-Based Encryption Scheme for Cloud Data Security Sharing. Int. J. Distrib. Sens. Netw. 2021, 17, 1550147721999616. [Google Scholar] [CrossRef]
- Huang, P.; Fan, K.; Yang, H.; Zhang, K.; Li, H.; Yang, Y. A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access 2020, 8, 94780–94794. [Google Scholar] [CrossRef]
- Shen, B.; Guo, J.; Yang, Y. MedChain: Efficient Healthcare Data Sharing via Blockchain. Appl. Sci. 2019, 9, 1207. [Google Scholar] [CrossRef] [Green Version]
- Sato, T.; Himura, Y. Smart-Contract Based System Operations for Permissioned Blockchain. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018, Paris, France, 26–28 February 2018; pp. 1–6. [Google Scholar]
- Sato, T.; Himura, Y.; Nemoto, J. Design and Evaluation of Smart-Contract-Based System Operations for Permissioned Blockchain-Based Systems. arXiv 2019, arXiv:1901.11249. [Google Scholar]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Muralidharan, S.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Murthy, C.; Ferris, C.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the 13th EuroSys Conference, EuroSys 2018, Porto, Portugal, 23–26 April 2018; Association for Computing Machinery: Porto, Portugal, 2018. [Google Scholar]
- Wang, H.; Zhang, J. Blockchain Based Data Integrity Verification for Large-Scale IoT Data. IEEE Access 2019, 7, 164996–165006. [Google Scholar] [CrossRef]
- Yamashita, K.; Nomura, Y.; Zhou, E.; Pi, B.; Jun, S. Potential Risks of Hyperledger Fabric Smart Contracts. In Proceedings of the IWBOSE 2019—2019 IEEE 2nd International Workshop on Blockchain Oriented Software Engineering, Hangzhou, China, 24 February 2019; pp. 1–10. [Google Scholar]
- Broy, M.; Stølen, K. Specification and Development of Interactive Systems: Focus on Streams, Interfaces, and Refinement; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2001; ISBN 0387950737. [Google Scholar]
- Ringert, J.; Rumpe, B. A Little Synopsis on Streams, Stream Processing Functions, and State-Based Stream Processing. Int. J. Softw. Inform. 2011, 5, 29–53. [Google Scholar]
- Weber, T.; Buchkremer, R. Blockchain-Based Cloud Configuration Scrips; 2022. [Google Scholar]
- Diffie, W.; Hellman, M.E. New Directions in Cryptography. Secur. Commun. Asymmetric Cryptosyst. 2019, 22, 143–180. [Google Scholar] [CrossRef] [Green Version]
- Khader, A.S.; Lai, D. Preventing Man-in-the-Middle Attack in Diffie-Hellman Key Exchange Protocol. In Proceedings of the 2015 22nd International Conference on Telecommunications, ICT 2015, Sydney, Australia, 27–29 April 2015; pp. 204–208. [Google Scholar]
- McGrew, D.; Viega, J. The Galois/Counter Mode of Operation (GCM). Submiss. NIST Modes Oper. Process 2004, 20, 70–278. [Google Scholar]
- Mukhopadhyay, M. Ethereum Smart Contract Development: Build Blockchain-Based Decentralized Applications Using Solidity; Packt Publishing Ltd.: Birmingham, UK, 2018; ISBN 9781788473040. [Google Scholar]
- Nurseitov, N.; Paulson, M.; Reynolds, R.; Izurieta, C. Comparison of JSON and XML Data Interchange Formats: A Case Study. In Proceedings of the 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Next-Generation Applied Intelligence, Tainan, Taiwan, 24–27 June 2009; CAINE: Tainan, Taiwan, 2009; Volume 9, pp. 157–162. [Google Scholar]
- Jones, T.S.; Richey, R.C. Rapid Prototyping Methodology in Action: A Developmental Study. Educ. Technol. Res. Dev. 2000, 48, 63–80. [Google Scholar] [CrossRef]
- Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. 2014. Available online: https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf (accessed on 30 March 2022).
- Truffle Suit Trufflesuite/Ganache-Cli. Available online: https://github.com/trufflesuite/ganache-cli (accessed on 30 March 2022).
- Dannen, C. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners; Springer: Berlin/Heidelberg, Germany, 2017; ISBN 9781484225356. [Google Scholar]
- Ethereum Ethereum/Web3.Py. Available online: https://github.com/ethereum/web3.py (accessed on 30 March 2022).
- Microsoft Azure SDK. Available online: https://azure.microsoft.com/en-us/downloads/ (accessed on 30 March 2022).
- Beale, J. Snort 2.1 Intrusion Detection; Elsevier: Rockland, MA, USA, 2004; ISBN 9781931836043. [Google Scholar]
- Gueron, S.; Johnson, S.; Walker, J. SHA-512/256. In Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations, Washington, DC, USA, 11–13 April 2011; pp. 354–358. [Google Scholar]
- Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design Science in Information Systems Research. MIS Q. Manag. Inf. Syst. 2004, 28, 75–105. [Google Scholar] [CrossRef] [Green Version]
- Tremblay, M.C.; Hevner, A.R.; Berndt, D.J. Focus Groups for Artifact Refinement and Evaluation in Design Research. Commun. Assoc. Inf. Syst. 2010, 26, 27. [Google Scholar] [CrossRef] [Green Version]
- Schrepp, M.; Hinderks, A.; Thomaschewski, J. Applying the User Experience Questionnaire (UEQ) in Different Evaluation Scenarios. In Proceedings of the International Conference of Design, User Experience, and Usability, Heraklion, Greece, 22–27 June 2014; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8517, pp. 383–392. [Google Scholar]
- Laugwitz, B.; Held, T.; Schrepp, M. Construction and Evaluation of a User Experience Questionnaire. In Proceedings of the Symposium of the Austrian HCI and Usability Engineering Group, Graz, Austria, 20–21 November 2008; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5298, pp. 63–76. [Google Scholar]
- McQuarrie, E.F.; Krueger, R.A. Focus Groups: A Practical Guide for Applied Research; Sage Publications: Thousand Oaks, CA, USA, 1989; Volume 26. [Google Scholar]
- Kuckartz, U.; Rädiker, S. Analyzing Qualitative Data with MAXQDA; Springer: Berlin/Heidelberg, Germany, 2019; ISBN 978-3-030-15671-8. [Google Scholar]
- Park, J.H.; Park, J.H. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions. Symmetry 2017, 9, 164. [Google Scholar] [CrossRef] [Green Version]
Web of SCIENCE (WOS) | IEEE | Sage | Science Direct (SD) | MDPI | Wiley | |
---|---|---|---|---|---|---|
Search Term I | Cloud * AND Blockchain * AND Trust * | Cloud * AND Blockchain * AND Trust * | Cloud * AND Blockchain * AND Trust * | Cloud AND Blockchain AND Trust | Cloud * AND Blockchain * AND Trust * | Cloud AND Blockchain AND Trust |
Search Term II | Cloud * AND Blockchain * AND Compliance * | Cloud * AND Blockchain * AND Compliance * | Cloud * AND Blockchain * AND Compliance * | Cloud AND Blockchain AND Compliance | Cloud * AND Blockchain * AND Compliance * | Cloud AND Blockchain AND Compliance |
Search Field I | Publication Title | Publication Title | Publication Title | Publication Title | Publication Title | Publication Title |
Search Field II | Abstract | Abstract | Abstract | Abstract | Abstract | Abstract |
Additional Requirements | Articles, Proceedings Papers, Review Articles | Journals, Conferences | Research Article, Review Article | Review articles, Research articles | Article, Review | Journals |
HITS | 757 | 465 | 165 | 65 | 25 | 18 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Weber, T.; Buchkremer, R. Blockchain-Based Reference Architecture for Automated, Transparent, and Notarized Attestation of Compliance Adaptations. Appl. Sci. 2022, 12, 4531. https://doi.org/10.3390/app12094531
Weber T, Buchkremer R. Blockchain-Based Reference Architecture for Automated, Transparent, and Notarized Attestation of Compliance Adaptations. Applied Sciences. 2022; 12(9):4531. https://doi.org/10.3390/app12094531
Chicago/Turabian StyleWeber, Thorsten, and Rüdiger Buchkremer. 2022. "Blockchain-Based Reference Architecture for Automated, Transparent, and Notarized Attestation of Compliance Adaptations" Applied Sciences 12, no. 9: 4531. https://doi.org/10.3390/app12094531
APA StyleWeber, T., & Buchkremer, R. (2022). Blockchain-Based Reference Architecture for Automated, Transparent, and Notarized Attestation of Compliance Adaptations. Applied Sciences, 12(9), 4531. https://doi.org/10.3390/app12094531