inefficiency due to the low number of nodes in the
network. However, as mentioned in section 7.1, as the
system scales this will likely become an issue. The
solution in this case will be to use a faster and more
efficient consensus algorithm, such as Proof of Stake
(PoS) or Practical Byzantine Fault Tolerance (pBFT).
Related to this is the fact that PoW provides a
weaker difficulty level of hash generation, therefore
making the mining process less resilient to external
attack. Choosing a different consensus algorithm,
such as pBFT, would also have the effect of
increasing this difficulty level.
The ensatChain implementation overcomes most
threats as outlined in the STRIDE model. However,
threats like device authorization and elevation of
privilege are still potential vulnerabilities.
It is also vulnerable, as are most closed systems,
to internal or insider attacks, which are the most
dangerous yet difficult to protect against. The most
ensatChain can do to counter such a threat is to assert
authorization challenges using a “defence in depth”
modality, but these are mitigations, not complete
prevention.
Similarly, there are a family of blockchain-
specific attacks (e.g. 51% attack (51% Attack, 2014),
or Sybil attacks (Wikipedia, 2019c)) which are
difficult to protect against. ensatChain suffers from
these vulnerabilities as well. Developing further
mitigations against these attacks either within
ensatChain or at a higher application level will be the
focus of future work.
8 CONCLUSIONS
This paper has presented a description of an
implemented technology that attempts to provide
secure audit of the meta-data generated by an adrenal
cancer registry, where “secure” is defined by the four
characteristics of tamper-resistance, verifiability,
searchability and privacy. The potential applications
of such audit security are many and are particularly
relevant to the clinical and health domains, where vast
amounts of sensitive and important data are stored
and transmitted on a daily basis.
The use of blockchain technology has allowed an
exploration of the benefits of public features (e.g. a
Proof-of-Work consensus algorithm) versus private
features (e.g. permissioned access control) to attempt
to gain the benefits of both. Additionally, the
application was implemented on both log files
generated as ASCII text, and those stored in a NoSQL
database.
The overall system was tested against the
Microsoft STRIDE threat model and was found to
perform well on many of the aspects of security and
secure audit previously discussed but still had overall
security weaknesses when addressing device
authorization or privilege elevation vulnerabilities.
The implementation is now operating in
production on the ENSAT adrenal cancer registry and
with some improvements, will be applied to other
clinical registries developed by the Melbourne
eResearch Group (MeG) in the near future.
ACKNOWLEDGEMENTS
The work leading to this solution has received
funding from the European Union Seventh
Framework Programme (FP7/2007-2013) under grant
agreement n° 259735 and from the European Science
Foundation (ESF).
REFERENCES
ENSAT (2019), http://www.ensat.org/ [Online; accessed
19-May-2019]
FP7 (2019), https://ec.europa.eu/research/fp7/index_en.
cfm [Online (archived); accessed 22-Nov-2019]
Horizon 2020 (2019), https://ec.europa.eu/programmes/
horizon2020/en [Online; accessed 22-Nov-2019]
Nakamoto, Satoshi et al. (2008), “Bitcoin: A peer-to-peer
electronic cash system”, In: Working Paper
Else, Tobias (2019), “Providing Evidence: Step by Step – a
letter from associate editor, Tobias Else, MD”, In:
Hormones and Cancer, Feb 2019, vol 1:10, pp 1-2
Apache Log4j (2012), http://logging.apache.org/log4j/1.2/
manual.html, [Online; accessed 19-May-2019],
[Page updated; 13-May-2012]
MongoDB (2019), https://www.mongodb.com/, [Online;
accessed 19-May-2019]
Potter, Bruce (2009), “Microsoft SDL Threat Modelling
Tool”, In: Network Security, vol 1:2009, pp 15-18
Waters, Brent R et al. (2004), “Building an Encrypted and
Searchable Audit Log.”, In: NDSS. Vol. 4, pp. 5–6
Bitcoin (2019), “What’s the Difference Between Bitcoin
(BTC) and Ethereum (ETH)?”,
https://www.cryptocompare.com/coins/guides/what-s-
the-difference-betweenbitcoin-btc-and-ethereum-eth/
[Online; accessed 20-May-2019]
Bellare, Mihir and Bennet Yee (1997), “Forward integrity
for secure audit logs”, Technical report, Computer
Science and Engineering Department, University of
California at San Diego
Schneier, Bruce and John Kelsey (1999), “Secure audit
logs to support computer forensics”, In: ACM
Transactions on Information and System Security
(TISSEC) 2.2, pp. 159–176