A Blockchain-Based Tamper-Resistant Logging Framework

نویسندگان

چکیده

Abstract Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In role as an immutable ledger, it grown beyond initial use financial transactions used recording wide variety of other useful information. this paper, we explore application outside traditional decentralized, domain. We show how, even with only single “mining” node, proof-of-work can cornerstone tamper resistant logging framework. By attaching blocks messages, make increasingly difficult for attacker modify those logs after totally compromising system. Furthermore, discuss various strategies might take without detection and how effective evasion techniques are against statistical analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper-Resistant Mobile Health Using Blockchain Technology

BACKGROUND Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and c...

متن کامل

Secure Audit Logging with Tamper-Resistant Hardware

Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user’s actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey’s secure audit logging protocol [1], strengthening the p...

متن کامل

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote veri...

متن کامل

A Framework for Blockchain-Based Applications

Blockchains have recently generated explosive interest from both academia and industry, with many proposed applications. But descriptions of many these proposals are more visionary projections than realizable proposals, and even basic definitions are often missing. We define “blockchain” and “blockchain network”, and then discuss two very different, well known classes of blockchain networks: cr...

متن کامل

Continuous Tamper-Proof Logging Using TPM 2.0

Auditing system logs is an important means of ensuring systems’ security in situations where run-time security mechanisms are not sufficient to completely prevent potentially malicious activities. A fundamental requirement for reliable auditing is the integrity of the log entries. This paper presents an infrastructure for secure logging that is capable of detecting the tampering of logs by powe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications in computer and information science

سال: 2022

ISSN: ['1865-0937', '1865-0929']

DOI: https://doi.org/10.1007/978-3-031-24049-2_6