A blockchain based framework for information system integrity

A blockchain based system integrity (BCSI) framework for assuring the integrity of information system processes is presented. BCSI is well suited for a broad class of large scale real-world information systems. Under the BCSI framework, the integrity of any information system I is assured by executing the finite state machine model for system I processes in a blockchain network. The BCSI framework is compared and contrasted with the Clark-Wilson (CW) system integrity model, and existing blockchain based frameworks like Ethereum.

[1]  Mahalingam Ramkumar,et al.  Executing large-scale processes in a blockchain , 2018, Journal of Capital Markets Studies.

[2]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[3]  Rummana Rahman,et al.  Study of the Dirty Copy on Write, a Linux Kernel memory allocation vulnerability , 2017, 2017 International Conference on Consumer Electronics and Devices (ICCED).

[4]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[5]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[6]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[7]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[8]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[9]  Mahalinagam Ramkumar,et al.  Scalable Computing in a Blockchain , 2018, 2018 IEEE 39th Sarnoff Symposium.

[10]  Mahalingam Ramkumar,et al.  OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS , 2016 .

[11]  Stefano Secci,et al.  A tutorial on blockchain and applications to secure network control-planes , 2016, 2016 3rd Smart Cloud Networks & Systems (SCNS).

[12]  Colin Percival CACHE MISSING FOR FUN AND PROFIT , 2005 .

[13]  Stefan Mangard,et al.  ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.

[14]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[15]  Josh Benaloh,et al.  One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.

[17]  Hong-Sheng Zhou,et al.  TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.

[18]  Mahalingam Ramkumar,et al.  Symmetric Cryptographic Protocols , 2014 .

[19]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .