|
The advantages of using Blockchain in this architecture are
(a) The security policy-relevant information collected from
each resource gets replicated in all the Blockchain nodes in a
tamper-proof and time-stamped manner based on the
underlying consensus mechanism (b) Reduces log processing
load on the resource being monitored by delegating the data
processing to the Blockchain platform. (c) Due to consensus
based unique state representation of data across all Blockchain
nodes, all stakeholders viz. service providers, consumers and
auditors of a business entity would see the same data
provenance or its analysis report at any given time without
loss of generality.
ess/retrieve data from the Blockchain nodes.
In this system architecture, we defined three logical
organizations namely Customer, Service Provider, and
Information Security Auditor. Each logical organization can
be assumed as a representation of real time entities of
respective stakeholders.
Since logical organizations have been defined based on the
functionalities of respective stakeholders who are concerned
about the security aspects of the business entity, and all
stakeholders are ensured of unique state replication with
tamper-proof capability the security assessment of the
business entity can be regarded as a fool-proof, robust and
trustworthy system. |