SECURITY FROM THE FIRST PHASES OF 5IRECHAIN LIFE CYCLE

Authors: Md Ahbab, Vilma Mattila & Jatinder Arora

ABSTRACT

The security of blockchain technology is more than ever in the point of view. Attacks on DLTs (Distributed Ledger Technology), including blockchain, which highlight the need to reinforce their security. The use of security reference architectures (SRA) has proven useful in addressing safety in the early phases of development facilitating the definition of security requirements and helping to implement security policies that allow us to protect a system throughout the life cycle. This article presents an SRA for the technology Blockchain defined through models and checking its application through an example of use.

Keywords: Blockchain, 5ire, SRA, reference architecture

REFERENCES

  • Abdallah, R., & Abdallah, R. (2022). A Blockchain-Based Methodology for Power Grid Control Systems. In The International Conference on Innovations in Computing Research (pp. 431- 443). Springer, Cham.
  • Avgeriou, P. (2003). Describing, instantiating and evaluating reference architecture: A case study. Enterprise Architecture Journal, 342, 1-24.
  • Biktimirov, M. R., Domashev, A. V., Cherkashin, P. A., & Shcherbakov, A. Y. (2017). Blockchain technology: Universal structure and requirements. Automatic Documentation and Mathematical Linguistics, 51(6), 235-238.
  • Deshpande, A., Stewart, K., Lepetit, L., & Gunashekar, S. (2017). Distributed Ledger Technologies/Blockchain:   Challenges,   opportunities   and    the    prospects    for standards. Overview report The British Standards Institution (BSI), 40, 40.
  • Dumortier, J. (2017). Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation). In EU Regulation of E-Commerce. Edward Elgar Publishing.
  • Fernandez, E. B., Monge, R., & Hashizume, K. (2016). Building security reference architecture for cloud systems. Requirements Engineering, 21(2), 225-249.
  • Fernandez, E. B., Yoshioka, N., Washizaki, H., & Syed, M. H. (2016). Modeling and security in cloud ecosystems. Future Internet, 8(2), 13.
  • Haffke, L., Fromberger, M., & Zimmermann, P. (2020). Cryptocurrencies and anti-money laundering: the shortcomings of the fifth AML Directive (EU) and how to address them. Journal of Banking Regulation, 21(2), 125-138.
  • Hasanova, H., Baek, U. J., Shin, M. G., Cho, K., & Kim, M. S. (2019). A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. International Journal of Network Management, 29(2), e2060.
  • Homoliak, I., Venugopalan, S., Reijsbergen, D., Hum, Q., Schumi, R., & Szalachowski, P. (2020). The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses. IEEE Communications Surveys & Tutorials, 23(1), 341-390.
  • Lie, X., Jiang, P., Chen, T., Xiapu, L., & Qiaoyan, W. (2017). A Survey on the Security of Blockchain Systems Future Generation Computer Systems.
  • Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection meets blockchain technology: a review. Ieee Access, 6, 10179-10188.
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
  • Nwaiwu, F. (2021). Digitalisation and sustainable energy transitions in Africa: assessing the impact of policy and regulatory environments on the energy sector in Nigeria and South Africa. Energy, Sustainability and Society, 11(1), 1-16.
  • Pankov, K. N. (2020, March). Testing, verification and validation of distributed ledger systems. In 2020 Systems of Signals Generating and Processing in the Field of on Board Communications (pp. 1-9). IEEE.
  • Pržulj, Đ., Radaković, N., Sladić, D., Radulović, A., & Govedarica, M. (2019). Domain model for cadastral systems with land use component. Survey review, 51(365), 135-146.
  • Raj, P. (2021). Industrial use cases at the cusp of the IoT and blockchain paradigms. In Advances in Computers (Vol. 121, pp. 355-385). Elsevier.
  • Ray, P.   P.,   Das,   B.,   & Das, A.   (2021). IoT-Blockchain Integration:   The   Way   Ahead. In Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing (pp. 749-763). Springer, Singapore.
  • Schwalm, S., & Alamillo-Domingo, I. (2021). Self-Sovereign-Identity & eIDAS: a Contradiction? Challenges and Chances of eIDAS 2.0. Wirtschaftsinformatik, 58, 247-270.
  • Sladić, G., Milosavljević, B., Nikolić, S., Sladić, D., & Radulović, A. (2021). A blockchain solution for securing real property transactions: a case study for Serbia. ISPRS International Journal of Geo-Information, 10(1), 35.
  • Sladić, G., Milosavljević, B., Nikolić, S., Sladić, D., & Radulović, A. (2021). A blockchain solution for securing real property transactions: a case study for Serbia. ISPRS International Journal of Geo-Information, 10(1), 35.
  • Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., … & Kim, D. I. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. Ieee Access, 7, 22328-22370.
  • Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2018). Nistir 8202 blockchain technology overview. National Institute of Standards and Technology, US Department of Commerce, Washington, USA.
  • Zaitsev, A. V., Gostev, S. S., Cherkashin, P. A., & Shcherbakov, A. Y. (2017). Regarding the technology of distributed storage of confidential information in centers of general-purpose data processing. Automatic Documentation and Mathematical Linguistics, 51(3), 117-119.