Data manipulation is often named as a serious threat to data integrity. Data can be tampered with, and malicious actors could use this to their advantage. Data users in various application domains want to be ensured that the data they are consuming are accurate and have not been tampered with. To validate the integrity of these data, we describe a blockchain-based hash validation method. The method assumes that the actual data is stored separately from the blockchain, and then allows a data identifier and a hash of these data to be submitted to the blockchain. The actual data can be validated against the hash on the blockchain at any time. Several use cases are described for blockchain-based hash validation, and to validate the method it is implemented inside an application audit trail to validate the audit trail data. This implementation shows that blockchain-based hash validation is able to detect malicious and accidental changes that were made to the data.
[1]
Satoshi Nakamoto.
Bitcoin : A Peer-to-Peer Electronic Cash System
,
2009
.
[2]
Vitalik Buterin.
A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM
,
2015
.
[3]
Daniel Davis Wood,et al.
ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER
,
2014
.
[4]
Nick Szabo,et al.
Smart Contracts: Building Blocks for Digital Markets
,
2018
.
[5]
Andrew Sutton,et al.
Blockchain Enabled Privacy Audit Logs
,
2017,
International Semantic Web Conference.
[6]
Juan Benet,et al.
IPFS - Content Addressed, Versioned, P2P File System
,
2014,
ArXiv.
[7]
Bruce Schneier,et al.
Secure audit logs to support computer forensics
,
1999,
TSEC.
[8]
Igor A. Zikratov,et al.
Ensuring data integrity using blockchain technology
,
2017,
2017 20th Conference of Open Innovations Association (FRUCT).