IEEE/ICACT20230046 Slide.13        [Big Slide]       [YouTube] Oral Presentation
The advantages of using Blockchain in this architecture are (a) The security policy-relevant information collected from each resource gets replicated in all the Blockchain nodes in a tamper-proof and time-stamped manner based on the underlying consensus mechanism (b) Reduces log processing load on the resource being monitored by delegating the data processing to the Blockchain platform. (c) Due to consensus based unique state representation of data across all Blockchain nodes, all stakeholders viz. service providers, consumers and auditors of a business entity would see the same data provenance or its analysis report at any given time without loss of generality. ess/retrieve data from the Blockchain nodes. In this system architecture, we defined three logical organizations namely Customer, Service Provider, and Information Security Auditor. Each logical organization can be assumed as a representation of real time entities of respective stakeholders. Since logical organizations have been defined based on the functionalities of respective stakeholders who are concerned about the security aspects of the business entity, and all stakeholders are ensured of unique state replication with tamper-proof capability the security assessment of the business entity can be regarded as a fool-proof, robust and trustworthy system.

[Go to Next Slide]
Select Voice: