Blockchain Technology - Applications and Challenges
Blockchain Technology - Applications and Challenges
Blockchain Technology - Applications and Challenges
Blockchain
Technology:
Applications
and Challenges
Intelligent Systems Reference Library
Volume 203
Series Editors
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
Lakhmi C. Jain, KES International, Shoreham-by-Sea, UK
The aim of this series is to publish a Reference Library, including novel
advances and developments in all aspects of Intelligent Systems in an easily
accessible and well structured form. The series includes reference works, handbooks,
compendia, textbooks, well-structured monographs, dictionaries, and encyclopedias.
It contains well integrated knowledge and current information in the field of
Intelligent Systems. The series covers the theory, applications, and design methods
of Intelligent Systems. Virtually all disciplines such as engineering, computer
science, avionics, business, e-commerce, environment, healthcare, physics and
life science are included. The list of topics spans all the areas of modern
intelligent systems such as: Ambient intelligence, Computational intelligence,
Social intelligence, Computational neuroscience, Artificial life, Virtual society,
Cognitive systems, DNA and immunity-based systems, e-Learning and teaching,
Human-centred computing and Machine ethics, Intelligent control, Intelligent data
analysis, Knowledge-based paradigms, Knowledge management, Intelligent agents,
Intelligent decision making, Intelligent network security, Interactive entertainment,
Learning paradigms, Recommender systems, Robotics and Mechatronics including
human-machine teaming, Self-organizing and adaptive systems, Soft computing
including Neural systems, Fuzzy systems, Evolutionary computing and the Fusion
of these paradigms, Perception and Vision, Web intelligence and Multimedia.
Indexed by SCOPUS, DBLP, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
Blockchain Technology:
Applications and Challenges
Editors
Sandeep Kumar Panda Ajay Kumar Jena
Department of Data Science and Artificial School of Computer Engineering
Intelligence KIIT University
IcfaiTech (Faculty of Science Bhubaneswar, Odisha, India
and Technology)
ICFAI Foundation for Higher Education Suresh Chandra Satapathy
Hyderabad, Telangana, India School of Computer Engineering
KIIT University
Santosh Kumar Swain Bhubaneswar, Odisha, India
School of Computer Engineering
KIIT University
Bhubaneswar, Odisha, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Contents
v
vi Contents
1.1 Introduction
For the past few decades, there had been a rise of many applications over the
internet that solves real time problems in a collaborative and decentralized manner.
A numerous such applications are popular and common universally. However, the
concept of digital currencies exists since 1980s, but it took more than two decades
to make a decentralized solution possible. Over the past, digital currencies used a
central authority to store and maintain the transaction records. B-Money [1], Bitgold
[2], RPOW [3] are some of the examples of a centralized approach. Later, distributed
solutions to store the transactions of currencies were developed to eliminate the need
A. K. Jena (B)
School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India
S. P. Dash
Department of Management, Birla Institute of Technology, Mesra, Ranchi, India
e-mail: [email protected]
for central authorities like bank. However, these currencies had a risk of double
spending. In other words, it is possible to make two different transactions with same
coins which are not possible in centralized approach. Moreover, to get an agreement
on distributed information and maintaining a consistent state in distributed envi-
ronment led to Byzantine Generals Problem [4]. Therefore, Quorum systems are
developed where malicious users and faulty information are accepted by the system.
But the concept of voting in quorum systems i.e. an information will be accepted if
majority of the users have voted for it have led to Sybil attacks [5]. Quorum systems
also gave rise to temporary inconsistencies.
In 2008, Satoshi Nakamoto developed a bitcoin design [6] which overcomes all
the above mentioned difficulties. Bitcoin becomes widespread immediately due to its
combined contributions from previous research works. Bitcoin uses a unique feature
named Proof-of-Work to restrict the number of votes per entity thereby making a
decentralized approach real. The nodes of a decentralized bitcoin network is called
miner. The miner collects all transactions of the network in blocks. A collection
of such blocks linked via some cryptographic mechanism is called Blockchain.
Blockchain Technology is a distributed, decentralized, peer-peer network to store
transactions of the network without any third party. This technology came to limelight
with the introduction of Bitcoin network. It allows the bitcoin users to transmit their
rights to information to another bitcoin user publicly over the network. Blockchain
allows the nodes to verify and manage the network. The cryptographic hashing mech-
anism used in blockchain lets the data in blocks to be tamper-proof and secure. In
bitcoin blockchain the users are enabled to be pseudonymous which means the trans-
actions are available public but their identities are not. Some of the key characteristics
are mentioned below.
Ledger: An open, append only ledger is used by blockchain to record the transaction
history. The data in this ledger cannot be modified unlike the traditional databases.
Secure: Blocks in blockchain are cryptographically linked and does not let the data
to be tampered thereby assuring the security of information over blockchain.
Shared: The public ledger can be shared among the users of the network thus assuring
the transparency among the users.
Distributed: The blockchain is distributed among the users of the network which
makes it strong against the attacks. By increasing the number of nodes in the network
the security of the information on blockchain is high.
Based on the permissions strategy, the blockchain is categorized as permission-
less and permissioned. Permission less are public blockchain where anyone who are
part of the network can publish blocks whereas permissioned are private blockchain
where only authorised users can publish the blocks. Permissioned blockchain are
usually implemented for group of organizations and permission less does not have
such restrictions. The summary of distinction between permission and permission-
less blockchain is given in Table 1.1.
1 Blockchain Technology: Introduction, Applications, Challenges 3
1.1.3 Transactions
of the transaction digitally signs it by using his private key and can be verified by
anyone using the sender’s public key.
Addresses are usually a short alphanumeric characters used as a sender and receiver’s
transaction point. A hash function is used to derive user’s public key. Different
blockchain implementation uses different ways to derive the addresses. And the
users of blockchain network have to store their private keys in a secure place. Instead
of storing them manually, software is used to store them. The software used to store
the private keys is called as wallets. Apart from private keys the wallets can store the
user’s addresses and public keys as well. Wallets are used to calculate the number of
digital assets owns by a particular trusted user.
1.1.6 Blocks
The transactions made by the blockchain users are submitted to the network via
software like web services, mobile applications and so on. Once a transaction is
submitted, the software sends it to a particular node or to a set of nodes. This does
not mean that the transaction is added to the blockchain. The transactions would
6 A. K. Jena and S. P. Dash
be in queue of the publishing node and will be added in blockchain after the node
publishes a block. A block includes a block header where the metadata of the block
is available and a block body where all valid transactions will be included [10]. The
metadata of the block varies based on the blockchain implementation. A general
structure of a block can be referred in Fig. 1.1. These blocks are chained together
through the hash of the previous block and form a blockchain. For instance, any data
change in any of the block will result in a different hash and will be reflected in the
subsequent blocks. Hence it is easy to identify whether a block has been tampered
or not [11].
Key feature behind the technology of blockchain is to determine the user to publish
the blocks. As the network node publishes a block they would be rewarded with
cryptocurrency. Due to this, it is possible for many nodes to compete for publishing
nodes. This problem can be solved using consensus mechanisms. This allows a group
of users who don’t trust each other to work together. There are several consensus
models being used such as Proof of Work (PoW), Proof of Stake (PoS), Proof of
Authority (PoA), Proof of Elapsed Time (PoET) etc.
The consensus mechanism is a process of decision making where the network
users agree and support a decision for the betterment of the network. In consensus
model, in order to add a block in blockchain a miner (node) has to solve a crypto-
graphic puzzle. The process of solving the puzzle requires huge computation and
is hard to solve. Once the puzzle is solved it’ll be broadcasted to the network for
verification. Once verification is successful, the block will be added to the blockchain
[10].
blockchain models can execute smart contracts. Bitcoin blockchain do not support
smart contracts but uses some scripting languages to offer limited programmability.
Whereas, Ethereum [13] and Hyperledger [14] run smart contracts built over them.
The programming language used to write smart contracts are Serpent and Solidity.
However, the most widespread language is solidity.
Over the years, blockchain has evolved rapidly that it provides many more solutions
than just the decentralization of cryptocurrency. While Bitcoin Blockchain is consid-
ered as a first generation blockchain, Ethereum and Smart contracts forms the second
generation blockchain and the development of Decentralized Apps (DApps) are the
third generation blockchain models. Bitcoin blockchain enables the financial trans-
action in a decentralized way and eliminates the need for trusted third parties. The
transactions are based on public key cryptography and digital signatures. The nodes
that validate the transactions uses a PoW mechanism based on Hashcash and SHA-
256 hashing algorithms. Though it is claimed that the users of bitcoin blockchain can
remain anonymous but, it is possible to trace back the transaction and find the iden-
tity of the users. Hence the users are pseudonymous. The users were rewarded with
incentives i.e. bitcoins for publishing the blocks. However scalability played a major
drawback in bitcoin blockchain. Moreover, it is not well suited for general purpose
applications due to its limitations. Thus in 2013, Ethereum [15] a general purpose
blockchain platform was developed. Ethereum addresses most of the scripting and
transaction limitations of bitcoin blockchain. Therefore Ethereum led to the develop-
ment of smart contracts a small programmed application to be stored and execute over
the blockchain network. Smart contracts enable automatic execution of conditions
while validating the transactions. Therefore it reduces the cost involved in verifica-
tion, fraud prevention and many more and ensures transparency. Though it provides
lot of advantages, Ethereum smart contracts does have some limitations like, complex
programming languages to write smart contracts, difficult to modify or end the smart
contracts once executed and so on. However, with the growing economic demand,
Ethereum could not support huge volumes of transactions. Therefore, Blockchain
is increasingly heading to decentralized web, incorporating systems for data collec-
tion, smart contracts, communication networks and open standards. This paved the
way for DApps which means Decentralized Applications whose backend runs on
a Blockchain network and its front end has a user interface of any programming
language [16]. DApp is open source and uses decentralized consensus mechanisms.
With growing popularity of DApps it is integrated with many industrial applica-
tions thereby enabling a cross chain communication [17]. This allows consumers
from various systems to function together as one team, making Industry 4.0’s market
demands and specifications easily merged [18].
8 A. K. Jena and S. P. Dash
Due to its salient features blockchain is applied not only in decentralized cryp-
tocurrencies but much beyond that. Blockchain can change the business transactions
models and protocols of managing assets [18], E-voting [19], renting a car, watching
a movie and many more. It widens its applications in major sectors like FinTech
[20], Healthcare [21], Governance, Supply chain [22], Manufacturing Industries,
Insurance, Education, IoT [23], Big Data systems and Machine Learning [24] etc.
FinTech: Application of Blockchain in various financial services include Financial
transactions, Asset management, etc. It avoids any trusted third parties and enables
faster and reliable transactional services. Insurance: In insurance domain, the need
to detect the fraudulent claims, abandoned policies can be streamlined by using
blockchain and making a risk free and transparent system. Insurers can get a hold of
ownership of assets that are to be insured by the encryption properties of blockchain.
IoT: Any object connected to the Internet becomes Internet of Things. Application of
Blockchain in IoT is enormous. Like Smart Home applications, smart cities, Cloud
Integration [25] and so on. Healthcare: Healthcare is one such domain where a
huge amount of data is generated. For instance, daily reports of patient monitoring,
clinical research management, processing medical insurance claims and storing the
medical records. Applying blockchain in healthcare includes the decentralization of
the mentioned activities with patients, doctors, insurance companies being the users
and managing the records. Education: Blockchain in education is still at the pilot level
and can extend its potential in Identity management, Digital certificates, Blockchain
enabled certificates etc. It enables the users to share their academic achievements with
chosen users who want to verify the credentials. Similarly, E-voting: Enabling the
users to cast their vote in a secure way. Since the data on blockchain is secure tamper-
proof, it is possible to avoid any counterfeit of votes. Another major sector where
blockchain has a greater potential for growth is Supply chain: The whole process of
supply chain can be carried over the blockchain network like transmission of goods,
traceability of items, customer refund in case of faulty delivery, and faster transaction
at reduced cost. Blockchain can transform the way the supply chain works.
The above mentioned areas are some of the applications where blockchain is
revolutionizing but not limited only to those domains. There are many more areas
where researchers are trying to fit in blockchain in order to utilize its entire potential
[26].
Even though Blockchain Technology has numerous potential in it there are certain
challenges that limit the application of blockchain on a wider range. Few major
challenges can be as follows.
1 Blockchain Technology: Introduction, Applications, Challenges 9
1.4.1 Scalability
Due to the increase in the number of transaction every now and then, the size and
volume of lockchain also getting large day by day. Every node has to collect all
the transactions and validate them on the blockchain. Besides this, blockchain has
a restriction on block size and the amount of time taken to publish the blocks only
7 transactions per second can take place. This may not suffice the requirement of
processing a large amount of data in real-time. And moreover since the size of the
block is small miners tend to prefer validating transaction with higher fee due to
which smaller transactions gets delayed. Some developments to resolve these issues
are storage optimization and redesigning of blockchain.
Blockchain is more prone to attacks like this. Selfish Mining is a strategy where
an over ambitious miner secretly keeps his blocks without publishing it. It would
be revealed to the public only if some conditions are satisfied. This secretly mined
private chains which are longer than the current openly available chain, all other
miners would agree to it. As a result honest miners would have wasted their resources
on a chain that is going to be abandoned. In this way selfish miners may be rewarded
with higher incentives. Likewise blockchain is susceptible for many attacks like Sybil
attacks, Double spending [27, 20], 51% attacks and so on.
Nevertheless, Blockchain has been transforming both the industry and the
academia with its distinct properties like decentralization, anonymity, integrity and
transparency. The applications of blockchain have gone beyond cryptocurrencies
and transactions. The decentralization nature of blockchain over the already existing
internet is very interesting in terms of data redundancy and survivability. Out of
some solutions blockchain is the perfect solution for problems where trust is of key
concern. Even though blockchain has not reached its maturity it still continues to
suit applications of different domains globally.
10 A. K. Jena and S. P. Dash
References
24. Abdullah, N., Håkansson, A., Moradian, E.: Blockchain based approach to enhance big data
authentication in distributed environment. In: International Conference on Ubiquitous and
Future Networks. ICUFN, pp. 887–892 (2017)
25. Ali, M., Miraz, M.H.: Cloud computing applications. In: Proceedings of the International
Conference on Cloud Computing and eGovernance—ICCCEG 2013, Internet City, Dubai,
United Arab Emirates, pp. 1–8 (2013). Available: https://www.edlib.asdf.res.in/2013/iccceg/
paper001.pdf
26. Gartner: Top Trends in the Gartner Hype Cycle for Emerging Technologies. Gartner, Inc.,
Gartner Hype Cycle 2017, August 2017. Available: https://www.gartner.com/smarterwithgart
ner/top-trends-in-the-gartner-hype-cycle-for-emerging-technologies-2017/
27. Tapscott, D., Tapscott, A., Revolution, B.: How the Technology Behind Bitcoin Is Changing
Money, Business, and the World, 1st edn. Penguin Publishing Group, New York, USA (2016)
Chapter 2
Bitcoin: A Digital Cryptocurrency
Abstract Bitcoin is the largest cryptocurrency ever created and traded using a decen-
tralized ledger known as the blockchain. Altogether, Bitcoin is a network in which
every computing node is responsible to service the others and allows shared access to
the data, known peer to peer (P2P) network, and provides an adaption of electronic-
cash that supports e-payments. Such payments are transferred directly from trans-
acting parties to the receiver without the requirement of any intermediary monetary
body. Satoshi Nakamoto introduced bitcoin in 2009 and since then it has emerged
as the most thriving cryptocurrency. Bitcoin is a globally accepted and immutable e-
payment system of digital currency. All the electronic transactions performed using
bitcoin are verified by the intermediate nodes called miners and then added as a
block in the distributed ledger. Bitcoin blockchains are maintained by the miners
running Bitcoin software. Bitcoin depends on Proof-of-Work (PoW) to confront
double-spending by a distributed timestamping service. To ensure the operations
and security of Bitcoin, all the transactions and their execution order must be avail-
able to all Bitcoin users. In addition to its security robustness, anonymity is the key
attribute for its success. There are several factors like market-cap, the marketplace,
miners-revenue, etc. which causes the rise and fall of the price of Bitcoin. This chapter
focus on the factors that are responsible for the rise and fall of Bitcoin Price with a
comparison with other Cryptocurrencies.
2.1 Introduction
A bitcoin block is a container that amasses transactions arranged linearly over a period
in the globally distributed ledger, blockchain. Transaction’s data is persistently stored
in files known as blocks. It is data structure just like individual pages similar to the
pages of the record book or bank’s transaction ledger. A bitcoin block has a header
and list of transactions. The transaction list takes the maximum size of the block.
Various fields, their description and size of a block are depicted in Table 2.1.
Block’s Header
The header of a block consists of three sets of information [4]. They are:
(a) references to the immediately previous block connecting to the current block.
(b) metadata set to relate the mining competition, i.e., difficulty, timestamp, and
nonce
(c) the data structure, Merkle root, to describe all the transactions in the block.
The cryptographic hash is main identifier which is also considered as digital
fingerprint. The block header is hashed twice by SHA-256 hashing algorithm to
compute the cryptographic hash. This results in block hash which is a 32-byte hash
or more precisely block’s header hash because it is calculated using the block header.
For instance, the hash of the very first block header created for bitcoin blockchain is
000000000019d6689c085ae163431e934ff763ae46a2a6c172b3f1b60a8ce26f. Hash
value of the header is utilized to identify the bitcoin block unambiguously and more
importantly it is the unique identifier for a block. Hash of the header can be derived
autonomously by any node by hashing the header of the block. Every node calculates
the hash of the new block as it is received It is then stored in a separate autonomous
table as a metadata of that block. This facilitates indexing and speedy retrieval of the
blocks from the disk. This hash is neither encapsulated in the data structure of the
block nor transmitted in the network along with the block, nor stored as persistence
storage of the block.
The most crucial part of the bitcoin system is a transaction. These are data structures
used to cipher the funds transfer from the source of the fund, known as the input, to
a destination known as an output in the bitcoin system. Every transaction is needed
to be created, validated, propagated, and incorporated to the public balance sheet of
the transaction and then entered in the bitcoin’s blockchain. There are various fields
of the transaction. These are shown in Table 2.2.
One of the elementary components of the bitcoin transaction is Unspent Trans-
action Output (UTXO). They are inseparable blocks of bitcoin locked to a specified
proprietor and reorganized as units of currency by the unified network. The bitcoin’s
network keeps track of the ready-to-use UTXO. The amount is saved in blockchain
in the form of UTXO whenever any user receives bitcoin and might be outspread
as UTXO among a large number of transactions. The concept of bitcoin balance
is deduced by wallet application. The blockchain is scanned and all the UTXO
belonging to the users are aggregated by the wallet to calculate the users’ balance.
The value of the UTXO can be arbitrarily designated as multiple of satoshis. Bitcoin
is divided into 8-decimal places similar to the dollars which is divided into 2-decimal
places. Once UTXO is created, it cannot be divided. Therefore, if it is larger than its
required value, it must be consumed completely, and changes must be reflected in
the transaction. That is if there are 30 bitcoin UTXO and only 2 UTXO are needed
to be spent then the transaction must completely eat up the 30 bitcoin UTXO and
produce the following two output: (a) payment of 2 bitcoin to the desired recipient
and (b) payment of 28 bitcoin as the change back to the wallet which is at hand for
the transactions to come.
UTXO that are exhausted for a particular transaction are known as transaction
inputs and the UTXO that are constructed through the transaction are called trans-
action output. In this manner, the clusters of the values of the bitcoin travel forward
from one owner to the other to form a series of transactions that consume and create
UTXOs. Signature of the current user is used by the transactions to unlock the UTXO
and then consuming it. Transactions create UTXOs and lock them to next owner’s
bitcoin address.
Transaction Outputs
Transaction outputs are created and recorded on the ledger of the bitcoin. These
transaction outputs create spendable clusters of bitcoins known as Unspent Trans-
action Output (UTXO). Entire network identifies the UTXOs and are at hand for
transacting in the time to come. Transacting bitcoin is creating a UTXO registered to
the address of the owner and available for spending. UTXO can be tracked by bitcoin
client in a database known as the UTXO pool or UTXO set. Every transaction output
comprises of following two things.
(a) total amount of bitcoins denominated as satoshis, also the smallest bit.
(b) locking script, also known as “encumbrance”, locks the amount by designating
the state that is to be satisfied for spending the output.
Transaction Input
The pointers to the UTXO are called transaction input. These are transaction hash
and sequence number of the a UTXO in the bitcoin blockchain. It includes the
scripts for unlocking for spending UTXO. These scripts must meet the requirements
of the spending conditions that the UTXOs has set. This is a signature that proves
the possession of the bitcoin address in locking script. The wallet of the user selects
from the pool of the remaining UTXOs and creates transaction. For an instance, if the
payment to made is of 0.020 bitcoin, the wallet app selects 0.010 UTXO and adding
them up for the payment. After UTXO selection, unlocking scripts are produced by
the wallet and making the UTXO eligible for spending by satisfying the locking
script conditions. The unlocking scripts contain the signatures for every UTXO. The
wallet then adds unlocking scripts and UTXO references as input to the transactions3
Bitcoin Mining.
In blockchain, mining is appending a new block at the end. In bitcoin network,
mining process adds a new bitcoin to the electronic fund supply. Mining nodes are
the specialized nodes on the bitcoin network. Such nodes listen for the new block
that is propagated on the bitcoin network.
It also helps to safeguard the bitcoin network against dishonest transactions more-
over preventing transactions from paying out the same amount of bitcoin again and
again which is commonly known as double-spending. In turn, the miners get rewarded
for providing the processing power to the bitcoin network. They play a vital role in
validating new transactions and documenting them on the distributed ledger. After
18 R. Saxena et al.
every 10 min, a newly mined block that contains the transaction that occurred since
the last block is mined, i.e., the most recent transaction. These transactions are incor-
porated inside the block after which they are added to the blockchain as confirmed
transactions allowing the possessor of the bitcoin to spend whatever they have gained
in those transactions [4].
The mining nodes participate and compete for working out a difficult-to-solve
cryptographic hash algorithm based mathematical puzzle. In turn, they earn two
types of rewards: (a) new coin that is generated after each block has been mined
and, (b) fees for all the validating and recording the transaction. The solution to
such mathematical puzzles is called PoW i.e., Proof-of-Work. The battle of solving
the PoW algorithm form the basis for the security model of bitcoin. The process of
mining facilitates the monetary supply for Bitcoin which is similar to the banks that
issues the new money by printing currency notes. The number of bitcoins that can
be added by the miner drops roughly after every four years which is almost every
210,000 blocks. Initially, the number of bitcoins that can be added per block were
50 in January 2009 which declined to 6.25 bitcoin every block on May 11, 2020 [6].
In this manner, there is an exponential decrease in the reward of the miner and until
2140 approximately all the bitcoin i.e. 20.99999998 million will be issued and no
new bitcoins will be issued.
Every transaction includes a transaction fee. This fee is an overabundant bitcoin
between inputs and outputs of the transaction. The miner winning PoW challenge gets
it as reward. As the time is increasing, the reward earned by the miner is decreasing
while the total number of transactions per block are increasing and the larger propor-
tion of miners’ earning will be from the transaction fees. Mining process accredit
the network-wide consensus in decentralized environment and safeguards the bitcoin
network from attacks.
The traditional payment systems depend upon the trust model having centralized
authority that provides the clearinghouse services by verifying and clearing the trans-
actions. On the other hand, the bitcoin blockchain has no central authority, blocks
in a blockchain are assembled separately in the network and have an entire replica
of the public ledger that can be a trusted authoritative log. Decentralized consensus
in bitcoin comes to the light through the interaction of four processes occurring
separately on the mining nodes in the network:
(a) Every transaction is verified independently based on an extensive criteria list.
The verification is done by the full node.
(b) The mining nodes aggregate the transactions independently into new blocks
that is coupled with demonstrated computation through the PoW algorithm.
(c) Every node independently verifies and assembles recent blocks into blockchain.
(d) The chain with massive cumulative calculations shown by PoW are selected
by every node independently.
Wallet software generates transactions by collecting Unspent Transaction Output,
furnishing relevant scripts for unlocking, and creating recent outputs being allocated
to new owners. Transaction is then forwarded to adjacent nodes for network-wide
propagation. Every node verifies the transaction and forwards the valid transaction
2 Bitcoin: A Digital Cryptocurrency 19
to their adjacent nodes. The verification ensures that only the valid transactions are
propagated across the entire network and invalid transactions are discarded at the
first node that confronts them.
The crucial concepts which cannot be easily differentiated are anonymity and privacy.
While anonymity is hiding the owner’s identity, privacy means hiding of the back-
ground [7]. In a real-life scenario, the user’s privacy more desirable than anonymity
because the protection of personal data is required for its proper usage. For example,
personal email account information may be known to many, but the restricted content
can only access by the account owner using a password. Hence, privacy is neces-
sary for almost all systems and applications [6, 8]. While anonymity is the property
that the criminals look for. It becomes impossible to hold criminals accountable for
the crime they have committed [9]. There are application areas other than crim-
inal activities where anonymity is required. The best-suited example is the ballot
system. Being untraceable and unidentifiable is the key objective for anonymity
[10]. True anonymity cannot be ensured as many applications that claim to be anony-
mous have flaws due to which identity information is leaked. Mixing services [11],
commonly known as mixing networks or mixnets are being employed to avert tracing
acts of messages through a network. Such mixing services may be unreliable and
lead to overheads in terms of computation and communication [12]. Anonymization
employing onion routing [13] is extensively used to hide the personal information
by unveiling the problem of tracking the IP. TOR [14], the most outstanding and
prosperous anonymity network has flaws [7, 15].
Anonymity and privacy do not come for free. To maintain privacy and anonymity,
extra efforts and work is needed which in turn requires more resources in terms of
space, time, or computation power [16]. Moreover, users may have to pay extra to
maintain privacy and anonymity. According to [17], in an incident that happened to
occur in Turkey, a passenger who used local mobile applications was purportedly
assaulted by a cruel cab driver who was underrated by the passenger. To avenge for
the incident, the driver waited at the place of picking and dropping that passenger for
two days and lastly located the passenger. All this happened because the anonymity
and privacy were compromised.
Fundamentally, for achieving deanonymization and extracting the information,
analysis of privacy and anonymity is performed by the spending effort that would
weaken the privacy of the users.
After analysis, outcomes are the potential aims to be achieved. Outcomes of
analyzing privacy and anonymity are as follows:
20 R. Saxena et al.
(a) Bitcoin Addresses Discovery: All the possible bitcoin addresses of an entity
are discovered including the name of the person or the company.
(b) Identity Discovery: All the potential distinguishing information, for instance,
the name of the company or the person is procured that starts with a bitcoin
address.
(c) Mapping of IP Address with Bitcoin Address: Mapping of possible IP
Addresses where the transaction was generated is done with the Bitcoin
addresses.
(d) Bitcoin Address Linking: New bitcoin addresses are suggested for use by the
bitcoin users every time they get the new payment [18]. Due to this reason,
each user has multiple bitcoin addresses. In this outcome, address belonging
to the users are linked.
(e) Mapping of Geo-locations with Bitcoin Address: Using the bitcoin address
geographical location of the user can be obtained.
There may be a transition among the outcomes discussed above. For example,
the bitcoin address that belongs to user can be discovered which can be linked to the
other bitcoin addresses of the user. In the similar manner, mapping of bitcoin address
can be done so that it is easier to obtain the identity or the geographical position of
the user who possesses that address.
There are various ways to serve this purpose. Research shows that there some
studies that use the ways while there may be numerous studies that just mention the
methods but do not use them. The following are the studies that have either mentioned
or applied the methods respectively:
(a) Transacting: The address of bitcoin can be learned by performing transaction
with other users to purchase goods, etc. For such transactions, the seller’s
bitcoin address must be known to the buyer. Therefore, if the seller wants to
receive the payment, he/she must compulsorily provide his/her bitcoin address
with the buyer. Therefore, it is easier for an entity to learn the bitcoin address
of any entity or a person just by acting as a buyer assuming that such parties
are in sales business. Transacting methods means active participation in the
network. Reid and Harrigan [19] stated that transaction methods include active
participation in the network and operating in money laundry services. In [20]
Meiklejohn et al. named the transacting method as re-identification attack. In
re-identification attacks, accounts are opened, and purchases are made from
infamous Bitcoin merchants and services providers such as Mt. Gox and Silk
Road.
(b) Utilizing the Off-network Knowledge: All the Off-network data-sources which
are publicly available can be used discover bitcoin addresses belonging some
user entities or conversely. The websites used for donation that brings out the
IP and key information were utilized by Reid and Harrigan [19]. In this process,
identification of entities related theft of 25,000 BTC was done by employing
off-network information. Ortega [21] collected around 4,000 bitcoin address
from a well-known wired forum where the bitcoin addresses and the real-
world locations can be declared by the bitcoin users. Ortega provided scripts
2 Bitcoin: A Digital Cryptocurrency 21
to link bitcoin addresses with the identities from the information provided
by users and 1,825 different users were assigned to 4,000 Bitcoin addresses
while some of the users include certain different addresses in their posts. From
blockchain.info, an online forum that collects address specified in the signa-
tures of the users in bitcoin forums such as bitcointalk, Meiklejohn et al. [20]
collected more than 4,500 bitcoin addresses from the address tags and declared
that this method is not desicive if compared to direct transacting. Fleder et al.
[22] inspected that the bitcoin addresses from the forum bitcointalk signatures
and tried for identifying around 2,320 users with a 2,404 address in less than
30 h. Spagnuolo et al. [23] introduced a framework for open blockchain anal-
ysis widely known as called BitIodine that utilizes the signatures and database
knowledge from forums such as bitcointalk, bitcoin-OTC market, etc. Along
with this, they utilized the knowledge on the physical currency that was orig-
inated by Casascius. They also utilized the knowledge of the infamous scam-
mers for implicit detection of bitcoin users whose feedback is considerably
unfavourable on bitcoin forums. Shareholders in BitFunder, a closed stock
exchange was another source of information used by them. Bitnodes, a source
from which the knowledge of the users that do not use hosting services can be
fetched, was utilized by Biryukov et al. [24] to produce the list of active bitcoin
servers for estimating the probability of the entry nodes going offline. Lische
and Fabian [24] accumulated more than 223,000 distinctive IP addresses from
ipinfo.io which were allotted for almost 15.8 million transactions. They also
tried various other sources for IP addresses such as torstatus.blutmagie.de, etc.
Google Trends views and concluded that these factors can be utilized as predictors.
The study came with a limitation that the same used was only 60 days and the
sentiments were considered as variable. In another study, Matta et al. [38] carried
out the similar technique to predict the trading volume instead of predicting the price
of bitcoin and concluded that views on Google Trends’ were strongly correlated
with the Bitcoin price. The sample collection covered a duration of just less than one
year and data source was used for implementation purpose. Some researchers have
applied wavelets to find similar results [39]. Kristoufek used the wavelet coherence
analysis on bitcoin price and conclude that there is a positive correlation between
search engine views, network hash rate, and mining difficulty with the bitcoin price.
Greaves et al. [40] examined the bitcoin for price prediction employing Artificial
Neural Network (ANN) and SVM and claimed an accuracy of 55%. They found that
limited forecasting in the blockchain data since the price is governed by exchanges
and the behavior is placed outside of the extent of the blockchain. Similarly, Madan
et al. [41] implemented ML techniques like random forest, SVM, and Binomial
GLM on the blockchain data and forecasted the bitcoin price with an accuracy of
more than 97% with the limitation that the results were not cross validated. Due
to which, the data may be overfitted and it cannot be guaranteed that model will
generalize. The two prediction models have been presented by McNally et al. [27]
and compared the model built on long short-term memory (LSTM) and recurrent
neural network (RNN) with an autoregressive integrated moving average (ARIMA)
model [41], which is widely used time-series forecasting model. The model for
classification was developed which utilized bitcoin price information that predicts
that the price of the bitcoin climbs up and down based on the history of previous
bitcoin price. The authors of [27] demonstrated that model based on ARIMA does
not stand against the models based on RNN and LSTM. Saad and Mohaisen [28]
used the price information and the information from bitcoin blockchain like mining
difficulty, total count of wallets, hash rate, unique addresses, etc., and utilized the
highly correlated attributes for building the forecasting models. They also considered
and studied various models developed on random forests, linear regression, neural
networks, and gradient boosting. In addition to the blockchain information, Jang and
Lee [32] gave thought to the blockchain information and macroeconomic attributes
such as the exchange rates between major flat currencies, NASDAQ, S & P 500, Euro
Stoxx 50, etc. Jang et al. [29], in their follow-up researches, put forward LSTM model
with rolling window and manifested that the LSTM based model overshadowed the
forecasting models based on SVM, linear regression, LSTM, and neural network.
Likewise, Shintate and Pichl [33] showed that deep learning-based random sampling
model proposed by them has overshadowed LSTM-based models.
Network infrastructure has existed since many decades. So as the malicious users
referred to as malignant [42] exist in the network system. Such malignant users carry
2 Bitcoin: A Digital Cryptocurrency 23
out mendacious transactions in the network system which carries financial transac-
tions. The main objective is to stop and such malicious users from carrying out illicit
acts [42] in the network so that the financial and transactional activities run properly. It
is crucial to disclose suspicious conduct in bitcoin network because of the extremely
fast-growing nature of the fraud. Attempts made by the client in participating in
more than two transactions over the same bitcoin or the same number of bitcoins
leads to double-spending attack. This is genuine due to propagation delay in broad-
casting the pending payments across the bitcoin network, which results nodes being
given non-validated transactions at different times [43]. Many research solutions and
studies have been presented in the recent times to overcome anomaly detection. Such
attempts present a broad range of techniques that includes ML methods as well. For
instance, Smith, et al. in [44] utilized clustering methods so that malicious acts are
seized in the network and classify licit users from malignant users.
In past, several studies have utilized ML techniques for addressing the secu-
rity threats such as [45, 46]. In their research, Pham et al. [42], investigated the
Bitcoin network for detecting the such users and the transactions which seems to be
disreputable and used the methods of unsupervised learning including Mahalanobis
distance, Unsupervised SV Machine and k-means clustering on the graphs generated
by Bitcoin Network. Again, Pham et al. [45] by using machine learning based superior
method to detected anomalies in bitcoin system by analysing clients and their trans-
actions which is most dubious where a destructive behaviour is considered as a proxy
for ambiguous activities. Monamo et al. [47] used kd-trees and trimmed k-means for
detection of fraud over the bitcoin blockchain network. Also, Monamo et al. [46] in
another research explored the application of trimmed k-means in the identification
of fraudulent activities in transactions performed using Bitcoin and claims to detect
more fraudulent transactions than the researches of same type and on same dataset.
While Zambre et al. [48] identified potential rogue users in the Bitcoin network
on the basis real reported robberies using k-means classification. Bartoletti et al.
[49] proposed an automated exploration of Ponzi schemes on bitcoin, a classic fraud
masqueraded, based on supervised learning algorithms. Zhdanova et al. [50] revealed
fraud-chains by developing a strategy for detecting fraud chains in Mobile Money
Transfer using machine learning based micro structuring techniques. Harlev et al.
[51] presented the first-ever approach to reduce the anonymous behaviour of Bitcoin
by using Supervised ML for prediction of the type of undetected entities while Yin
et al. [52] analysed the Bitcoin ecosystem and presented the first-ever approxima-
tion of the dimension of cybercriminal entities by applying Supervised ML on 854
observations that are classified into 12 classes and out of which 5 classes were found
to be related to cybercriminal acts and around of 100,000 unclassified observations.
Hirshman et al. [53] applied Unsupervised ML algorithms for exploring anonymity
in bitcoin transaction by clustering the dataset. Liu et al. [54] presented an approach
based on ML to capture the double-spending attacks in transaction performed using
bitcoin consisting of different immune-based blockchain nodes that deals with identi-
fication component. Bogner et al. [55] adopted machine learning for graphical threat
detection and presented the human operators with a perceptive way to develop an
understanding of blockchain through gathering the features of the system into group
24 R. Saxena et al.
of attributes that are depicted graphically. Remy et al. [56] tracked the acts of clients
in bitcoin ecosystem using the community identification on low intensity network
signals employing machine learning network analysis techniques. Kurtulmus et al.
[57] proposed a by-product protocol that employs the globally dispersed behaviour
of smart contracts along with ML based artificially intelligent problem solving to find
the crowd-sourcing funds for research and to effectively present new marketplace
without the requirement of mediator. Shaukat et al. [58] presented a ML based solu-
tion for an exhaustive investigation of ransomware dataset for providing a layered
defence mechanism against the cryptographic ransomwares in Bitcoin & other cryp-
tocurrencies. Baqer et al. [59] performed empirical analysis where a stress test based
on clustering is deployed for detecting spam transaction in the Bitcoin cryptocurrency
network. Holub et al. [60] proposed an NLP and ML based phishing ring DNS style
identification scheme where the identification strategy relies on the observations of
freshly launched and/or registered domains. Ermilov et al. [61] introduced an off-
chain knowledge solution along with the knowledge for bitcoin address separation
and categorisation for detecting and filtering errors in users’ input data and therefore
avoiding an unreliable Bitcoin usage model. Dey et al. [62] provided and method-
ology based on the intelligent software agents which handles stakeholders’ activi-
ties in Bitcoin ecosystem for detecting anomalous behaviours employing the Super
Machine Learning Algorithm along with algorithmic game theory. Portnoff et al.
[63] designed a machine learning based classifiers for differentiating between adver-
tisement posted by the same author and the several other authors along with a linking
technique that utilizes leakages from the Bitcoin systems and sex advertisement onto
Bitcoin transactions and public wallets.
2.6 Conclusion
This chapter introduces Bitcoin and the cryptographic mechanism ECDSA used in it.
It then described the structure of Bitcoin Block which has block size, block header,
transaction counter, and list of the transaction as fields, followed by the structure of the
Bitcoin transaction which includes the fields for the version of the transaction, total
inputs, and the outputs comprised in the transactions, transaction outputs & inputs and
locktime. Adding a new Bitcoin for the electronic fund supply an important task of the
mining process and hence the chapter also describes the mining process in which the
mining nodes participate and compete to work for the difficult-to-solve cryptographic
hash algorithm based mathematical puzzle and earns the transaction fees for all the
transactions they have validated as a reward. The verification of a transaction is done
against the criteria defined in a checklist which includes, data structure and syntax
of the transaction, list of input and output, limitation in size of the transactions, etc.
Machine learning and deep learning forms the important tools and techniques for
solving classification and prediction problems and can be used specifically for the
forecasting the price of Bitcoin. For the prediction, LSTM outperforms the other
models like Deep Neural Network, Deep Residual Network, SVM, etc. Anonymity
2 Bitcoin: A Digital Cryptocurrency 25
and Privacy are the two faces of the same coin and are very crucial for transacting
over the Bitcoin network. Lastly, this chapter lists most common security menace
and their abnormal behaviors in bitcoin network with their solution employing ML
techniques.
In future, deanonymization of bitcoin may be taken a step forward to prevent illicit
acts like robbery, ransomwares, etc. Also, ML and DL techniques can be utilized for
estimating the price of bitcoin and classifying the possible threats on the bitcoin
network.
References
1. Dhulavvagol, P., Bhajantri, V., Totad, S.: Blockchain ethereum clients performance analysis
considering e-voting application. Procedia Comput. Sci. 167. 2506–2515 (2020). https://doi.
org/10.1016/j.procs.2020.03.303
2. Rahouti, M., Xiong, K., Ghani, N.: Bitcoin concepts, threats, and machine-learning security
solutions. IEEE Access, 1–1 (2018). https://doi.org/10.1109/ACCESS.2018.2874539
3. Herrera-Joancomartí, J.: Research and Challenges on Bitcoin Anonymity. 8872. https://doi.
org/10.1007/978-3-319-17016-9_1. (2014)
4. Mastering Bitcoin. Andreas M. Antonopoulos
5. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain Technology Overview (2019)
6. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15,
843–859 (2013). https://doi.org/10.1109/SURV.2012.060912.00182
7. Bradbury, D.: Anonymity and privacy: a guide for the perplexed. Network Security (2014).
https://doi.org/10.1016/S1353-4858(14)70102-3
8. Eckhoff, D., Wagner, I.: Privacy in the smart city—applications, technologies, challenges and
solutions. IEEE Commun. Surv. Tutor., 1–1 (2019). https://doi.org/10.1109/COMST.2017.274
8998
9. Ferrag, M.A., Maglaras, L., Ahmim: A privacy-preserving schemes for ad hoc social networks:
a survey. IEEE Commun. Surv. Tutor., 1–1 (2017). https://doi.org/10.1109/COMST.2017.271
8178
10. Davenport, D.: Anonymity on the internet: why the price may be too high. Commun. ACM 45
(2002). https://doi.org/10.1145/505248.505267
11. Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging
issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE
Commun. Surv. Tutor. 14. 1–28.https://doi.org/10.1109/SURV.2011.042011.00080
12. Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Commun.
ACM 24, 84–88 (1981). https://doi.org/10.1145/358549.358563
13. Chaum, D.: cMix: anonymization by high-performance scalable mixing. IACR Cryptol. ePrint
Archive, Rep. 2016/008 (2016)
14. Syverson, P., Goldschlag, D., Reed, M.: Anonymous connections and onion routing. In:
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,
pp. 44–54 (1997). https://doi.org/10.1109/SECPRI.1997.601314
15. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the secondgeneration onion router. In:
Proceedings of 13th Conference on USENIX Security Symposium (SSYM), vol. 13, pp. 21–37,
San Diego, CA, USA (2004)
16. Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin
ecosystem, pp. 1–14 (2013). https://doi.org/10.1109/eCRS.2013.6805780
17. Erdin, E., Zachor, C., Gunes, M.: How to find hidden users: a survey of attacks on anonymity
networks. IEEE Commun. Surv. Tutor. 17, 1–1 (2015). https://doi.org/10.1109/COMST.2015.
2453434
26 R. Saxena et al.
18. A Taxi Driver Registered in ‘Bitaksi’ Application Plans to Murder a Passenger After Very
Deserved Bad Review, Reddit: The Front Page of the Internet (2017). Accessed: 23 Jan 2018.
[Online]. Available: https://redd.it/61zczy
19. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. Secur. Privacy Soc.
Netw. 3 (2011). https://doi.org/10.1109/PASSAT/SocialCom.2011.79
20. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mccoy, D., Voelker, G., Savage, S.:
A fistful of bitcoins: characterizing payments among men with no names, pp. 127–140 (2013).
https://doi.org/10.1145/2504730.2504747
21. Ortega, M.S.: The Bitcoin transaction graph anonymity. M.S. thesis, Security of Information
and Communication Technologies, Universitat Autònoma de Barcelona, Barcelona, Spain,
2013. Accessed: 14 Sept 2016 (2016)
22. Fleder, M., Kester, M., Pillai, S.: Bitcoin Transaction Graph Analysis (2015)
23. Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: Extracting Intelligence from the Bitcoin
Network, vol. 8437, pp. 457–468 (2014). https://doi.org/10.1007/978-3-662-45472-5_29
24. Lischke, M., Fabian, B.: Analyzing the Bitcoin Network: The First Four Years. Future Internet,
vol. 8 (2016). https://doi.org/10.3390/fi8010007
25. Alessandretti, L., Elbahrawy, A., Luca, M., Baronchelli, A.: Anticipating cryptocurrency prices
using machine learning. Complexity 2018, 1–16 (2018). https://doi.org/10.1155/2018/8983590
26. Corbet, S., Lucey, B., Urquhart, A., Yarovaya, L.: Cryptocurrencies as a financial asset: a
systematic analysis. Int. Rev. Fin. Anal. 62 (2018). https://doi.org/10.1016/j.irfa.2018.09.003
27. McNally, S., Roche, J., Caton, S.: Predicting the Price of Bitcoin Using Machine Learning,
pp. 339–343 (2018). https://doi.org/10.1109/PDP2018.2018.00060
28. Saad, M., Choi, J., Nyang, D., Kim, J., Mohaisen, A.: Toward characterizing blockchain-based
cryptocurrencies for highly accurate predictions. IEEE Syst. J., 1–12 (2019). https://doi.org/
10.1109/JSYST.2019.2927707
29. Jang, H., Lee, J.: An empirical study on modeling and prediction of bitcoin prices with bayesian
neural networks based on blockchain information. IEEE Access, 1–1 (2017). https://doi.org/
10.1109/ACCESS.2017.2779181
30. Nakano, M., Takahashi, A., Takahashi, S.: Bitcoin technical trading with artificial neural
network. Phys. A Stat. Mech. Its Appl. 510, 587–609 (2018). https://doi.org/10.1016/j.physa.
2018.07.017
31. Rebane, J., Karlsson, I., Denic, S., Papapetrou, P.: Seq2Seq RNNs and ARIMA models for
Cryptocurrency Prediction: A Comparative Study (2018)
32. Huisu, J., Lee, J., Ko, H., Lee, W.: Predicting bitcoin prices by using rolling window LSTM
model. In: Proceedings of the KDD Data Science in Fintech Workshop, London, UK (2018)
33. Shintate, T., Pichl, L.: Trend prediction classification for high frequency bitcoin time series
with deep learning. J. Risk and Fin. Manage. 12, 17 (2019). https://doi.org/10.3390/jrfm12
010017
34. Chen, G., Nikolov, S., Shah, D.: A latent source model for nonparametric time series
classification. Advances in Neural Information Processing Systems (2013)
35. Shah, D., Zhang, K.: Bayesian regression and Bitcoin. In: 2014 52nd Annual Allerton Confer-
ence on Communication, Control, and Computing, Allerton (2014). https://doi.org/10.1109/
ALLERTON.2014.7028484
36. Giaglis, G., Georgoula, I., Pournarakis, D., Bilanakos, C., Sotiropoulos, D.: Using time-series
and sentiment analysis to detect the determinants of bitcoin prices. SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.2607167(2015).
37. Matta, M., Lunesu, Maria I., Marchesi, M.: Bitcoin Spread Prediction Using Social and Web
Search Media (2015)
38. Matta, M., Lunesu, M.I., Marchesi, M.: The Predictor Impact of Web Search Media on Bitcoin
Trading Volumes.https://doi.org/10.5220/0005618606200626
39. Kristoufek, L.: What are the main drivers of the bitcoin price? Evidence from wavelet coherence
analysis. PLoS ONE (2014). https://doi.org/10.1371/journal.pone.0123923
40. Alex, G., Au, B.: Using the bitcoin transaction graph to predict the price of bitcoin (2015)
2 Bitcoin: A Digital Cryptocurrency 27
41. Madan, I., Saluja, S., Zhao, A.: Automated bitcoin trading via machine learning algorithms
(2015)
42. Pham, T., Lee, S.: Anomaly Detection in the Bitcoin System—A Network Perspective (2016)
43. Xu, J.: Are blockchains immune to all malicious attacks? Financial Innovation 2 (2016). https://
doi.org/10.1186/s40854-016-0046-5
44. Smith, R., Bivens, A., Embrechts, M., Palagiri, C., Szymanski, B.: Clustering approaches
for anomaly-based intrusion detection. In: Proceedings of Intelligent Engineering Systems
Through Artificial Neural Networks, pp. 579–584 (2002)
45. Pham, T., Lee, S.: Anomaly Detection in Bitcoin Network Using Unsupervised Learning
Methods (2016)
46. Monamo, P., Marivate, V., Twala, B.: Unsupervised learning for robust Bitcoin fraud detection,
pp. 129–134 (2016). https://doi.org/10.1109/ISSA.2016.7802939
47. Monamo, P., Marivate, V., Twala, B.: A Multifaceted Approach to Bitcoin Fraud Detection:
Global and Local Outliers, pp. 188–194 (2016). https://doi.org/10.1109/ICMLA.2016.0039
48. Zambre, D., Shah, A.: Analysis of bitcoin network dataset for fraud. Unpublished Report (2013)
49. Bartoletti, M., Pes, B., Serusi, S.: Data Mining for Detecting Bitcoin Ponzi Schemes, pp. 75–84
(2018). https://doi.org/10.1109/CVCBT.2018.00014
50. Zhdanova, M., Repp, J., Rieke, R., Gaber, C., Hemery, B.: No Smurfs: Revealing Fraud Chains
in Mobile Money Transfers (2014). https://doi.org/10.1109/ARES.2014.10
51. Harlev, M., Yin, H., Langenheldt, K., Mukkamala, R. R., Vatrapu, R.: Breaking Bad: De-
Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning
(2018). https://doi.org/10.24251/HICSS.2018.443
52. Yin, H., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the bitcoin
ecosystem using supervised machine learning, pp. 3690–3699 (2017). https://doi.org/10.1109/
BigData.2017.8258365
53. Hirshman, J., Huang, Y., Macke, S.: Unsupervised approaches to detecting anomalous behavior
in the bitcoin transaction network, Technical report, Technical report, Stanford University
(2013)
54. Liu, Z., Zhao, H., Chen, W., Cao, X., Peng, H., Yang, J., Yang, T., Lin, P.: Double-Spending
Detection for Fast Bitcoin Payment Based on Artificial Immune, pp. 133–143 (2017). https://
doi.org/10.1007/978-981-10-6893-5_10
55. Bogner, A.: Seeing is understanding anomaly detection in blockchains with visualized features.
In: Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing
and Proceedings of the International Symposium on Wearable Computers, pp. 5–8. ACM (2017)
56. Cazabet, R., Rym, B., Latapy, M.: Tracking Bitcoin Users Activity Using Community Detection
on a Network of Weak Signals, pp. 166–177 (2018). https://doi.org/10.1007/978-3-319-72150-
7_14
57. Kurtulmus, A., Daniel, K.: Trustless Machine Learning Contracts; Evaluating and Exchanging
Machine Learning Models on the Ethereum Blockchain (2018)
58. Shaukat, S., Ribeiro, V.: RansomWall: A layered defense system against cryptographic
ransomware attacks using machine learning, pp. 356–363 (2018). https://doi.org/10.1109/COM
SNETS.2018.8328219
59. Baqer, K., Huang, D., Mccoy, D., Weaver, N.: Stressing Out: Bitcoin “Stress Testing”, vol.
9604, pp. 3–18 (2016). https://doi.org/10.1007/978-3-662-53357-4_1
60. Holub, A., O’Connor, J.: Coinhoarder: Tracking a Ukrainian Bitcoin phishing ring DNS style.
In: APWG Symposium on Electronic Crime Research (eCrime), 2018, pp. 1–5. IEEE (2018)
61. Ermilov, D., Panov, M., Yanovich, Y.: Automatic Bitcoin Address Clustering, pp. 461–466
(2017). https://doi.org/10.1109/ICMLA.2017.0-118
62. Dey, S.: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic
Game Theory: A Proof of Work, pp. 7–10 (2018). https://doi.org/10.1109/CEEC.2018.867
4185
63. Portnoff, R., Huang, D., Doerfler, P., Afroz, S., Mccoy, D: Backpage and Bitcoin: Uncovering
Human Traffickers, pp. 1595–1604 (2017). https://doi.org/10.1145/3097983.3098082
28 R. Saxena et al.
64. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P
network. In: Proceedings of the ACM Conference on Computer and Communications Security
(2014). https://doi.org/10.1145/2660267.2660379
65. Box, G., E., P., Jenkins, G., Reinsel, G., Ljung, G.: Time Series Analysis: Forecasting and
Control (2016). https://doi.org/10.2307/2284112
Chapter 3
Blockchain 1.0 to Blockchain 4.0—The
Evolutionary Transformation
of Blockchain Technology
3.1 Introduction
The related work section first delves into the historical background of Blockchain
Technology. It then puts forward the important terminologies related to it. The struc-
ture of a block is described in detail. Next the types of Blockchain are elaborated.
The nitty-gritty of successive generations of Blockchain Technology are discussed
in separate sections along with the works of several researchers in brief.
successfully pass these clauses he cannot interfere into a blockchain thus, making it
safe and private.
The structure of a block can be assumed to be divided into two sections, one
comprising of the header with all metadata and the other consisting of all the
transaction details. Figure 3.2 illustrates the stricture of block.
First of all, the metadata consists of Previous Hash which is used to chain the
current block with its preceding block in the blockchain.
The second set of meta data comprises of the information pertaining to mining
competitions such as Timestamp, Difficulty and Nonce. Mining [36] in Blockchain
is performed by high end computers that solve complex mathematical problems to
receive rewards in return, thus completing the verification procedures. Timestamp
gives the creation time details for a particular block thus eliminating the denial of
service scenarios. Difficulty gives the complexity that was used to create this block.
In cryptography, nonce [37] is an arbitrary number that can be used only once in the
entire communication. In Blockchain, nonce is the number that miners are competing
for. Successfully mining means that the winning miner was the first to guess the
nonce, which is a string of random numbers affixed to the hashed contents of the
block, which is again rehashed.
The final metadata includes the Merkle Tree root which a data structure to
summarize all the transaction details in the corresponding block in an efficient
manner.
In order to identify a block, users can either use the block hash or the block
height [38]. Block height is described as the number of blocks before it. Thus it can
be calculated as the length of the block minus one. The block height of the entire
blockchain is obtained from the height of the most recent block or the highest block
in the chain.
Every first and unique transaction carried out by a miner is termed as the “Coinbase
Transaction”. The miners utilize it to collect their rewards for every correct solutions.
Other transaction fees collected by them are also added to this Coinbase Transaction.
The different types of Blockchain are categorized on the basis of their applications.
Primarily the two broad types of Blockchain are Public and Private Blockchain. Two
variation also exist like the Consortium and Hybrid Blockchain. Figure 3.3 illustrates
Table 3.1 highlights the comparison amidst these three prominent types of
Blockchain.
Hybrid Blockchains [47–49] are combination of Public and Private Blockchains.
It incorporates the privacy and permissioned facilities of Private Blockchain and
the simplicity, flexibility and transparency of Public Blockchains. Participants of a
Hybrid Blockchain can control the authority and accessibility of the data stored in
it. Dragonchain is the most common example of a Hybrid Blockchain.
Till date Blockchain Technology has undergone four major evolutions and each of
these has been discussed in the following sections.
The first generation of Blockchain, Blockchain 1.0, originated from the concept of
Distributed Ledger Technology (DLT) [50–52]. Distributed ledger is a database that
is consensually shared amongst several participants thus enabling public witnesses
to eliminate double spending scenarios. The most prominent application of DLT was
cryptocurrency where Bitcoin [53] played a pivotal role. Bitcoin thus became the
“cash for the internet” and paved way for “Internet of Money [54]”. After its launch
in 2009, Bitcoin proved its stability, reliability, efficiency, simplicity, independency
and security to keep a track of transaction records and transfer authority of these
records from one user to another directly. It essentially utilizes consensus and mining
mechanisms to exchange cryptocurrencies. Figure 3.7 gives the overall working with
Bitcoins. A real life scenario where Alice wants to send 1 Bitcoin (BTC) to Bob is
portrayed in Fig. 3.8.
38 P. Mukherjee and C. Pradhan
comparison to the energy consumed while mining and suggested special hardware
modifications to achieve maximum profits.
Antonopoulos [61] explained in detail how Bitcoin works and its detailed imple-
mentation along with the mining and consensus mechanisms. Velde [62] backed the
technical and conceptual accomplishments of Bitcoin to be inculcated in existing
financial sectors because of its freedom from any central authority intervention. The
fact that anonymity and decentralization of Bitcoin makes it a potential game changer
in micropayments and virtual worlds e-commerce was suggested by Grinberg [63].
Blockchain 1.0 thus has myriads of advantages over the traditional payment
mechanisms such as low transactional costs and relative anonymity in transactions.
Bitcoins will never be out of market as there have an adequate supply. Bitcoins apart
from eliminating double spending, also remove counterfeiting by enabling secure
trackable and transparent transactions.
Amidst all its achievements, Bitcoins also have some major setbacks. The first
generation of Blockchain essentially utilizes the Proof of Work (PoW) consensus
mechanism that necessitates the computation of complex mathematical puzzles. Due
to the complexity involved, PoW is time-consuming and uses colossal amounts of
energy comparable to the overall profits earned. In this, the approval of transaction
is also pretty slow than electronic channels. Research shows that Blockchain 1.0
can handle at most seven transactions per second thus having a substantially slow
throughput. Conti et al. [64] studied the security and privacy issues of Bitcoin in
details. Eyal and Sirer [65] highlighted that Bitcoin is extensively vulnerable to
Selfish Mining that is practiced by colluding miners to earn more revenues than their
mining capabilities. Thus ultimately Bitcoin proceeds towards a centralized scheme
fully under the control of these selfish miners. Androulaki et al. [66] claimed that
behavior-based clustering techniques can unravel the real identities of the otherwise
anonymous Bitcoin users up to 40%. Another vital drawback of Satoshi’s idea of
Blockchain 1.0 is that it utilizes only 1 megabyte (MB) blocks of information on
bitcoin transactions. The last and most notable shortcomings of Blockchain 1.0 are
their inability to support Smart Contracts and other application sectors instead of
financial utilities.
The wasteful mining and poor scalability of the first generation Blockchain prompted
Buterin [67] to extend the concept of Blockchain beyond currency. This led to the
advent of second generation of Blockchain i.e. Ethereum which is based on new
concepts of smart contracts along with Proof of Work consensus mechanisms.
Smart Contracts [68] are autonomous self-managing computer programs that
execute automatically on the basis of predefined clauses between two parties. These
contracts are impossible to be hacked or tampered with. So Smart Contracts [69]
largely reduce the cost of verification, execution, and fraud prevention and enable
transparent contract definition.
40 P. Mukherjee and C. Pradhan
Figure 3.9 shows how smart contracts works. The first step is formulation of
the contract between two parties. It involves the terms, rules and conditions of the
agreement has to be accepted by the two counterparts and translated into a code. No
changes can be made into the contract without the consent of the involved parties. The
smart contract is then deployed into the blockchain. As soon as the events mentioned
in the contract occur, the code automatically executes. Practical example of such
events can be expiration of an insurance policy or delivery of goods. Once the code
execution is over, the contract will automatically transfer the value to the pertinent
receiver. The settlement is thus completed instantly, securely and efficiently. This
transfer is also recorded into the blockchain.
Ethereum [67, 70] utilizes the implementation of smart contracts into Blockchain.
It’s a community-built technology behind another cryptocurrency Ether (ETH) [71]
having an array of applications in almost every field such as electronic voting, real
estate and trading. In the Ethereum, instead of contesting for bitcoins, miners compete
for Ether [72]. There is a another type of token involved in Ethereum which is utilized
to reward miners for including transactions in their block, termed as gas. Every smart
contract execution necessitates a particular amount of gas to be sent along for alluring
miners to incorporate it into the blockchain.
Good [73] discussed the protocol of Ethereum and fundamentals of smart contract
to autonomously enforces regulation for such interactions. Dannen [13] gave a thor-
ough insight into Solidity which is the high level programming language to implement
smart contracts. Antonopoulos and Wood [74] gave the step by step guide to build a
smart contract using Solidity. They explained how to chose the appropriate Solidity
version, downloading and installing it, writing the simplest smart contract, compiling
it with the Solidity Compiler and finally deploying it into the Blockchain.
Extensive research is being carried out to utilize Ethereum in several non-financial
sectors. Yavuz et al. [75] suggested a secure e-voting system by using the Ethereum
Blockchain. Ethereum wallet or simple android mobile phones are used by users to
cast their votes. After the election is held, Blockchain 2.0 is used to store the ballets
and votes. Their proposal proved to be more efficient, reliable, cheap and transparent
to conduct e-voting. Rooksby and Dimitrov [76] proposed a Blockchain system based
on Ethereum that can be used by a university to evaluate the performance of students,
store and manage their grades and reward them cryptocurrencies if performance is
3 Blockchain 1.0 to Blockchain 4.0—The Evolutionary … 41
up to the mark. Internet of things (IoT) has tremendous utility in designing Smart
Homes which are fully automated to provide highest comfort to the residents. Aung
and Tantidham [77] implemented an Ethereum based Smart Home Scheme to control
access policies, data storage and flow to eliminate imposters impersonating actual
residents and stealing secretive information. Adhikari [78] proffered a Smart Health-
care system that incorporates the concepts of Ethereum to provide a secure, flexible
and more reliable schemes than traditional ones. Shih et al. [79] proposed production
and marketing of organic vegetables by using Ethereum. This methodology ensures
the authenticity of the production quality as well as the sales record.
Since Ethereum is largely based on smart contracts, they have an array of advan-
tages. Smart contacts are quite accurate and store each clauses explicitly thus
Ethereum is very minutely defined. The contract is fully transparent to all involved
parties. The execution speed of smart contracts is very fast up to 15 transactions per
second and eliminates several middle men in any kind of application.
However, smart contracts also pose several difficulty on the users because they
are extremely tricky to write [80]. Any mistakes while writing the contract can lead
to unintended adverse effects [81]. Once a mistake in the code begins to be exploited,
there is no efficient way to stop it other than obtaining a consensus and rewriting the
entire underlying code [82]. Thus to achieve maximum benefits of Ethereum, it is
essential to formulate and deploy the smart contract correctly.
The major setback of Blockchains 1.0 and 2.0 are that they are not scalable at all,
mostly based on Proof of Work and take hours to confirm transactions. All this
let to the birth of the current generation of Blockchain called Blockchain 3.0 that
aims to make cryptocurrencies globally viable. Apart from smart contracts, the third
generation of Blockchain mainly involves Decentralized Apps (dApps) [83]. They
are digital programs that run on a Blockchain network of computers instead of a single
computer and thus are beyond the purview of any central authority. This generation
is hence capable of promoting inter chain transactions with aid of techniques such
as sharding [84]. Sharding implies each node of Blockchain contains only a part of
the data on it and not the complete information. This spreads the load and makes
the system for efficient and intrusion proof. Blockchain 3.0 also utilizes Proof of
Stake and Proof of Authority [85] consensus mechanisms to enable enhanced speed
and computing power for smart contracts with no separate transaction fees. Although
Blockchain 3.0 is in its inception but aims to improve the scalability, interoperability,
privacy and sustainability of previous generations because they are designed on the
“FFM” concept which is the acronym for Fast, Feeless and Minerless. Blockchain 3.0
hence eliminates the dependency on Miners to verify and authenticate transactions
and instead use inbuilt mechanisms for the same. They are thus extremely fast to
allow thousands of transactions per second unlike their preceding generations.
42 P. Mukherjee and C. Pradhan
Blockchain 3.0 paved way for several platforms each with their unique advan-
tage to encourage Blockchain usage in every-day life. ICON projects [86] aims
to connect separate Blockchains together such that every transaction between these
blockchains is verified by a ledger itself. Thus it tries to provide a high usability, scal-
ability and reliability by eliminating any central authority or need of any transaction
fees. Another third generation Blockchain was established using DAG (Directed
Acyclic Graph) protocols [87, 88] to design no block, no chain and no miner yet
public distributed ledger platform such as IOTA [89]. Another popular Blockchain
3.0 platforms are Cardano [90] which has its own cryptocurrency ADA and aims
to improve all problems with Ethereum. Aion [91] is another third generation
Blockchain network that aims to support basic blockchain architectures along with
cross chain interoperability.
The merits of Blockchain 3.0 include no single controlling authority thereby no
single point of failure. dApps don’t reside on a particular IP address hence adversaries
cannot tamper with the data and security is enhanced. The have extremely high
transaction speed.
However, the thirds generation of Blockchain also has several disadvantages like
bug fixing or updating due to their decentralized nature. The consensus mechanisms
applied are comparatively complicated.
• The Supplier, Manufacturer and Distributer also track their relevant information
and selling of goods to manage their services accordingly.
Incorporation of Blockchain introduces more transparency into the supply chain.
Every entity can back track the information once uploaded into the Blockchain. Also
the data becomes immutable therefore nobody can upload it without the consent of
other entities. Any kinds of fraud or counterfeiting is also eliminated by the usage
of Blockchain. Thus Blockchain has the potential to transform any other business
domain like Supply Chain Management to greater extents.
3.6 Conclusion
in only financial sector, further advancements were made to adopt Blockchain for
other domains as well. Ethereum, the second generation technology has immense
application for crowdsourcing through its trustworthy smart contact clauses. A smart
contract is a self-asserting contract where the decision between buyer and seller
are directly written as lines of codes across a distributed, decentralized blockchain
network. The third generation Blockchain has inbuilt verification mechanism and
more efficient faster and cheaper than previous versions. Combining Artificial Intel-
ligence with Blockchain Technology has already paved way for the fourth generation
of blockchain as well.
This chapter begins by describing the historical background of this expeditious
technology. It then proffers a description of the basic terminologies in blockchain,
it’s types, basic structure of block and different consensus models popularly known.
The fundamental aim of this chapter was to provide a comprehensive study of the
successive evolutions in Blockchain Technology by highlighting the nitty-gritty of
each generation in detail. It also illustrates a parameter wise differences amidst the
several generations in terms of their principle areas, consensus models used, utility
of smart contracts, the energy and cost requirements and execution speed and scala-
bility. In the end, a Blockchain in Supply Chain Management test case has also been
elaborated in this chapter.
The future scope of this book chapter involves designing a two party secure
message exchange protocol by utilizing the fundamental offerings of the relevant
version of Blockchain. Which generation will be most suitable, the formulation of
smart contract if applicable followed by its deployment and other essentials has been
left for our future endeavors.
References
1. Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V.: Blockchain technology: beyond
bitcoin. Appl. Innov. 2(6–10), 71 (2016)
2. Pilkington, M.: Blockchain technology: principles and applications. In: Research Handbook
on Digital Transformations. Edward Elgar Publishing (2016)
3. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology:
architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data
(BigData Congress), pp. 557–564. IEEE (2017)
4. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. arXiv preprint
arXiv:1906.11078 (2019)
5. Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183–187
(2017)
6. Preneel, B.: Cryptographic hash functions. Eur. Trans. Telecommun. 5(4), 431–448 (1994)
7. Bakhtiari, S., Safavi-Naini, R., Pieprzyk, J.: Cryptographic hash functions: a survey, vol. 4.
Technical Report 95-09, Department of Computer Science, University of Wollongong (1995)
8. Carlozo, L.: What is blockchain? J. Account. 224(1), 29 (2017)
9. Nakamoto, S.: Bitcoin: peer-to-peer electronic cash system (2008)
10. Underwood, S.: Blockchain beyond bitcoin (2016)
11. Urquhart, A.: The inefficiency of Bitcoin. Econ. Lett. 148, 80–82 (2016)
12. Baliga, A.: Understanding blockchain consensus models. Persistent 2017(4), 1–14 (2017)
3 Blockchain 1.0 to Blockchain 4.0—The Evolutionary … 47
13. Dannen, C.: Introducing Ethereum and Solidity, vol. 1. Apress, Berkeley (2017)
14. Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in
blockchain technology. In: 2018 9th International Conference on Computing, Communication
and Networking Technologies (ICCCNT), pp. 1–4. IEEE (2018)
15. Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed
Cryptocurrencies and Consensus Ledgers, vol. 310, no. 4 (2016)
16. Abrar, W.: Untraceable electronic cash with Digicash (1900)
17. Friis, J.B.: Digicash Implementation. University of Aarhus (2003)
18. Haber, S., Stornetta, W.S.: How to time-stamp a digital document. In: Conference on the Theory
and Application of Cryptography, pp. 437–455. Springer, Berlin, Heidelberg (1990)
19. Bayer, D., Haber, S., Stornetta, W.S.: Improving the efficiency and reliability of digital time-
stamping. In: Sequences Ii, pp. 329–334. Springer, New York, NY (1993)
20. Haber, S.A., Stornetta Jr, W.S.: U.S. Patent No. 5,781,629. U.S. Patent and Trademark Office,
Washington, DC (1998)
21. https://en.wikipedia.org/wiki/Digital_currency
22. Szabo, N.: Bit gold, unenumerated.blogspot.com (Mar. 29, 2006) Internet Archive
23. Szabo, N.: Bit gold. Website/Blog (2008)
24. Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Secure Information
Networks, pp. 258–272. Springer, Boston, MA (1999)
25. Finney, H.: Rpow-reusable proofs of work (2004). Internet: https://cryptome.org/rpow.htm
26. Back, A.: Hashcash-a denial of service counter-measure (2002)
27. https://en.wikipedia.org/wiki/Ledger
28. https://en.bitcoin.it/wiki/Block
29. https://en.bitcoin.it/wiki/Genesis_block
30. https://en.wikipedia.org/wiki/Hash_function
31. https://en.bitcoin.it/wiki/Mining
32. Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.J.:
Blockchain contract: a complete consensus using blockchain. In: 2015 IEEE 4th global
conference on consumer electronics (GCCE), pp. 577–578. IEEE (2015)
33. Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., Qijun, C.: A review on consensus algorithm
of blockchain. In 2017 IEEE International Conference on Systems, Man, and Cybernetics
(SMC), pp. 2567–2572. IEEE (2017)
34. Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. IJ Netw. Secur.
19(5), 653–659 (2017)
35. Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake
blockchain protocol. In: Annual International Cryptology Conference, pp. 357–388. Springer,
Cham (2017)
36. Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games.
In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 365–382
(2016)
37. https://en.bitcoin.it/wiki/Nonce
38. https://www.investopedia.com/terms/b/block-height.asp
39. Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities:
a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
40. Norman, M.D., Karavas, Y.G., Reed, H.: The emergence of trust and value in public blockchain
networks. In: IX International Conference on Complex Systems, p. 22 (2018)
41. https://www.blockchain-council.org/blockchain/public-vs-private-blockchain-a-comprehen
sive-comparison/
42. Pongnumkul, S., Siripanpornchana, C., Thajchayapong, S.: Performance analysis of private
blockchain platforms in varying workloads. In: 2017 26th International Conference on
Computer Communication and Networks (ICCCN), pp. 1–6. IEEE (2017)
43. https://www.euromoney.com/learning/blockchain-explained/the-rise-of-private-blockchains
44. https://openledger.info/insights/consortium-blockchains/
45. https://blockchain.intellectsoft.net/blog/how-the-consortium-blockchain-works/
48 P. Mukherjee and C. Pradhan
46. https://www.oreilly.com/library/view/building-blockchain-projects/9781787122147/d04
4fa02-29f4-4e24-88b2-a41641efdcf8.xhtml
47. Manian, Z.N., Krishnan, R., Sriram, S.: U.S. Patent Application No. 15/212,018 (2017)
48. Wu, L., Meng, K., Xu, S., Li, S., Ding, M., Suo, Y.: Democratic centralism: a hybrid blockchain
architecture and its applications in energy internet. In: 2017 IEEE International Conference on
Energy Internet (ICEI), pp. 176–181. IEEE (2017)
49. Ateniese, G., Chiaramonte, M.T., Treat, D., Magri, B., Venturi, D.: U.S. Patent No. 9,959,065.
U.S. Patent and Trademark Office, Washington, DC (2018)
50. Mills, D.C., Wang, K., Malone, B., Ravi, A., Marquardt, J., Badev, A.I., Brezinski, T., Fahy, L.,
Liao, K., Kargenian, V., Ellithorpe, M.: Distributed ledger technology in payments, clearing,
and settlement (2016)
51. Maull, R., Godsiff, P., Mulligan, C., Brown, A., Kewell, B.: Distributed ledger technology:
applications and implications. Strateg. Chang. 26(5), 481–489 (2017)
52. Ølnes, S., Ubacht, J., Janssen, M.: Blockchain in government: benefits and implications of
distributed ledger technology for information sharing (2017)
53. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media,
Inc. (2014)
54. Antonopoulos, A.M.: The Internet of Money, vol. 1. Merkle Bloom LLC, Columbia, MD (2016)
55. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)
56. Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and
governance. J. Econ. Perspect. 29(2), 213–238 (2015)
57. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction. Princeton University Press (2016)
58. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P
2013 Proceedings, pp. 1–10. IEEE (2013)
59. https://en.wikipedia.org/wiki/Fork_(blockchain)
60. O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint (2014)
61. Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O’Reilly Media,
Inc. (2017)
62. Velde, F.: Bitcoin: A Primer (2013)
63. Grinberg, R.: Bitcoin: an innovative alternative digital currency. Hastings Sci. Tech. LJ 4, 159
(2012)
64. Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin.
IEEE Commun. Surv. Tutor. 20(4), 3416–3452 (2018)
65. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International
Conference on Financial Cryptography and Data Security, pp. 436–454. Springer, Berlin,
Heidelberg (2014)
66. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy
in bitcoin. In: International Conference on Financial Cryptography and Data Security, pp. 34–
51. Springer, Berlin, Heidelberg (2013
67. Buterin, V.: A next-generation smart contract and decentralized application platform. White
Paper 3(37) (2014)
68. https://en.wikipedia.org/wiki/Smart_contract
69. Macrinici, D., Cartofeanu, C., Gao, S.: Smart contract applications within blockchain
technology: a systematic mapping study. Telematics Inform. 35(8), 2337–2354 (2018)
70. Buterin, V.: Ethereum: Platform Review. Opportunities and Challenges for Private and
Consortium Blockchains (2016)
71. Katsiampa, P.: Volatility co-movement between Bitcoin and Ether. Fin. Res. Lett. 30, 221–227
(2019)
72. Bouoiyour, J., Selmi, R.: Ether: Bitcoin’s competitor or ally? arXiv preprint arXiv:1707.07977
(2017)
73. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project
Yellow Paper 151(2014), 1–32 (2014)
3 Blockchain 1.0 to Blockchain 4.0—The Evolutionary … 49
74. Antonopoulos, A.M., Wood, G.: Mastering Ethereum: Building Smart Contracts and dapps.
O’reilly Media (2018)
75. Yavuz, E., Koç, A.K., Çabuk, U.C., Dalkılıç, G.: Towards secure e-voting using ethereum
blockchain. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS),
pp. 1–7. IEEE (2018)
76. Rooksby, J., Dimitrov, K.: Trustless education? A blockchain system for university grades1.
Ubiquity J. Pervasive Media 6(1), 83–88 (2019)
77. Aung, Y.N., Tantidham, T.: Review of Ethereum: smart home case study. In: 2017 2nd
International Conference on Information Technology (INCIT) (pp. 1–4). IEEE (2017)
78. Adhikari, C.: Secure framework for healthcare data management using ethereum-based
blockchain technology (2017)
79. Shih, D.H., Lu, K.C., Shih, Y.T., Shih, P.Y.: A simulated organic vegetable production and
marketing environment by using ethereum. Electronics 8(11), 1341 (2019)
80. Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe
smart contract: Lessons and insights from a cryptocurrency lab. In: International Conference
on Financial Cryptography and Data Security, pp. 79–94. Springer, Berlin, Heidelberg (2016)
81. Chen, T., Li, X., Luo, X., Zhang, X.: Under-optimized smart contracts devour your money. In:
2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering
(SANER), pp. 442–446. IEEE (2017)
82. Marino, B., Juels, A.: Setting standards for altering and undoing smart contracts. In: Interna-
tional Symposium on Rules and Rule Markup Languages for the Semantic Web, pp. 151–166.
Springer (2016)
83. https://www.investopedia.com/terms/d/decentralized-applications-dapps.asp
84. https://medium.com/edchain/what-is-sharding-in-blockchain-8afd9ed4cff0#
85. De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: Pbft vs
proof-of-authority: applying the cap theorem to permissioned blockchain (2018)
86. https://icon.foundation/contents/icon/introduce?lang=en
87. Agarwal, N., Vasseur, J.P., Achar, V.N.: U.S. Patent Application No. 12/790,028 (2011)
88. Vasseur, J.P., Agarwal, N., Thubert, P., Wetterwald, P.: U.S. Patent No. 8,489,765. U.S. Patent
and Trademark Office, Washington, DC (2013)
89. Divya, M., Biradar, N.B.: IOTA-next generation block chain. Int. J. Eng. Comput. Sci. 7(04),
23823–23826 (2018)
90. https://tradingstrategyguides.com/cardano-cryptocurrency-strategy/
91. Spoke, M.: Aion: The third-generation blockchain network. Whitepaper (2017)
92. Schmidt, S., Jung, M., Schmidt, T., Sterzinger, I., Schmidt, G., Gomm, M., Tschirschke, K.,
Reisinger, T., Schlarb, F., Benkenstein, D., Emig, B.: Unibright-the unified framework for
blockchain based business integration. White paper, April (2018)
93. https://icodrops.com/seele/
Chapter 4
Anatomy of Blockchain Implementation
in Healthcare
Abstract Blockchain is one of the leading technologies that have a huge number
of implications in solving real time problems, especially in sectors like Health-
care, Banking, Aviation, Telecommunication, and so forth. Blockchain is known
for its features like interoperability, improved information security, Data integrity,
immutability, distributed database, Peer to Peer transaction Network, traceability,
and transparency along with a trustworthy environment that makes it more secure
and reliable. It is enormously known for decentralizing data, easy accessibility, and
management of operations, which makes blockchain a better technology to work
on. Currently, the big sectors like healthcare that have a huge number of implica-
tions in comparison to others, need to make their activities effective and efficient
on a real time basis. Unlike other technologies that are presently available in the
healthcare industry, Blockchain technology facilitates many things such as drug
supply chain management by making it counterfeit-free, providing interoperability
in patient health records, allowing data operations to be safe and precise, enhancing
medical insurance security, assistance in disease predications, etc. Ensuring absolute
encryption security by way of cryptographic algorithms with healthcare taking plea-
sure in the stack of benefits. Blockchain can solve numerous problems in healthcare
and adapting it, will not only boost the working productivity but also enhances the
quality of outcomes with a progressive approach. This chapter focuses on blockchain
introduction followed by its implementations in the healthcare industry and issues
that could be solved using blockchain technology.
S. V. Urkude (B)
Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, India
e-mail: [email protected]
H. Sharma
Department of Computer Science and Engineering, IcfaiTech (Faculty of Science and
Technology), ICFAI Foundation for Higher Education, Hyderabad, India
S. U. Kumar
Adsana Corp USA (Canine Cancer Centre), San Francisco, USA
V. R. Urkude
Vignan’s Institute of Management and Technology for Women, Ghatkesar, Hyderabad, India
e-mail: [email protected]
4.1 Introduction
Immutability Each block in the blockchain is connected to other blocks with cryp-
tographic hash functions. Transactions are recorded in a chronological order that
makes blockchain tamper-proof [6].
Transparency Changes in the network are publicly available. Transactions are vali-
dated by authorized nodes on the network, so that any change could be detected at
any instance of time, making Blockchain a compatible platform to work with.
Traceability Timestamp feature in Blockchain helps in recording transactions at
each point of time by tracking every movement with hash functions adding up more
functionality to their succession, and making the process efficient and secure.
Decentralization A distributed database that allows multiple platforms to have
authoritative access on the database. It helps in reducing mediatory expenses and
make sure that the data is stored inside a secure environment [3].
4 Anatomy of Blockchain Implementation in Healthcare 53
Trust factor Trust is the principal factor that plays a major role while performing a
transaction. Blockchain allows unknown entities to have secure transactions without
any externalities and interruptions, offers a trustworthy environment for transferring
assets to build trust [7].
Symmetric Algorithms that use the same cryptographic keys to encrypt as well as
decrypt the transactions, both the parties have access to the same key that gives rise
to distress in maintaining user’s privacy and security [3, 4].
Asymmetric Public-key cryptography is the system that employs a pair of keys in
encrypting and decrypting of data. In which public key is open to the network and
the private key is known only to the owner. In this system, the sender encrypts the
4 Anatomy of Blockchain Implementation in Healthcare 55
transaction with the receiver’s public key, which can be only decrypted using the
receiver’s private key. Bitcoin transaction utilizes public-key cryptography [3, 4].
Figure 4.2 shows the arrangement of data blocks in the blockchain. As mentioned in
the figure every block is associated with the block’s hash value and a hash value for
the previous block. It forms a chain like structure. The first block in Blockchain is
called Genesis Block, which doesn’t have any previous hash value.
4.1.5 Cryptocurrency
ICOs are looked at as a way to host finances, a company looking for funds to create
applications, coins, or services, etc. It can use Initial coin offering, so to enhance
resources as well as give long term benefits to consumers, who are fascinated in
buying them. ICOs are a popular fundraiser method, which is a preferable option
for startups that are looking to provide their products and services. To participate
in ICOs an entity or investor should have a proper understanding of the working
of cryptocurrency wallets and transactions. When a cryptocurrency startup wants
to raise capital through ICOs they typically create a whitepaper to showcase their
project outlines and benefits, to convince the investors. These coins are assigned as
tokens that can act as shares of the company, similar to the company selling shares
in Initial public offerings (IPO) and investors buying those shares [14].
4 Anatomy of Blockchain Implementation in Healthcare 57
Digital tokens are the virtual tokens that have the features of ‘security’ under financial
services and markets (FSMR) 2015. They may be referred to as ‘Digital securities’
that displays characteristics of a Debenture, share, or units in finance. Crypto asset is
digital representations of values that are virtually traded as a medium of exchange,
part of the account, and expand of worth, but it does not have any lawful tender
standing in a jurisdiction [15].
The Operating a Crypto Asset Business (OCAB) framework introduced two types
of digital assets.
Utility tokens The tokens, which can be exchanged for access to specific merchandise
or service, usually supplied via a digital ledger technology (DLT) platform, these
tokens, do not demonstrate any traits and personality of a synchronized venture
[15]. For example, to store data online they are different framework like Amazon
web services, Dropbox, etc. in which a consumer have to reserve the server and is
charged for the same. Unlike previous frameworks, the Filecoin network allows the
client to store data in an encrypted/ decentralized form that will automatically track
utilized storage and charge accordingly [16].
Security tokens They are often called ‘tokenized security’ symbolizing possession in
a fundamental real-world asset with decentralized network tracking. Security tokens
make it easy for the customer to access investments on multiple platforms [17].
They are many more frameworks, which have classified tokens based on their utiliza-
tion by distinct authorities and multiple platforms in the world. Table 4.1a, b shows
the different frameworks used in blockchain.
Blockchain has a wider scope in the healthcare industry, from storing and managing
patient’s health data to supply chain management & drug security, disease predic-
tions, drug traceability, and insurance claims, etc. Blockchain technology has
completely changed the way how things used to be implemented by automating all
the processes, which were previously done manually with unfortunate configuration
and time-draining functions. Blockchain provides efficient outcomes that create trust
among entities via a reliable environment and user-friendly network. The patient’s
data management is playing a dominant role in building trust among entities resem-
bling doctors, patients, and institutions, etc. Lack of standards and awareness among
the entities is hampering the enlargement of blockchain technology [10]. According
to Global Blockchain Survey, 40% of executives’ sight blockchain as a ‘top-5’ inten-
tional priority, BIS Research estimates that blockchain will grow over $5.6 billion
by the end of 2025 and healthcare industry can save up to $150 billion per year by
2025 [18].
The Healthcare industry suffers from a lot of security breaches and blockchain
promises to fill all the loopholes. Blockchain is receiving immense attention in health-
care in resolving data challenges that in turn give pharma industries enormous benefits
sustaining sanity among individuals and their priorities. Pharmaceutical companies
approximately losses over $200 billion per year due to the counterfeiting of drugs.
Blockchain can replace the current system with a transparent drug supply chain. This
includes end to end traceability features that will be the exceptional resolution for
enhancing data provenance, reliability, and security of the pharma supply chain [5].
Peer-to-Peer transactions in Blockchain will help the healthcare industry to
preserve network infrastructure security. Whereas a smart contract plays a crucial
role in giving permissioned access to patient data that allows third parties to have
agreements on data access. The decentralized structure of the network maintains data
integrity and provides interoperability to facilitate data transfers in the atmosphere,
where cryptography makes patient access encrypted and confined. Secure health
data creates a trust factor among participating nodes that makes health information
exchange effective with eradicating mediator transactional costs [13].
Blockchain framework works for mounting healthcare applications that must
execute robust validation attributes and a well-suited access control mechanism to
manage how participants can interrelate with the network and the correlated data.
4 Anatomy of Blockchain Implementation in Healthcare 59
Transaction throughput is scaled based on speed and efficiency like in other use cases.
e.g. Remote monitoring systems, Blockchain framework transactions throughput
depends on the scalability factor of the participating nodes and kind of infrastructure
used by the system [12].
McKinsey publication, lavish work processes add over $400 billion every year in
surplus spending in the healthcare services industry. Smart contracts can add value
to the work which was done manually by automating the workflow and allowing
the transactions to be self-executed based on various parameters. When it comes
to assistance, occupying a blockchain-based network throughout billing documents
and associating catalogs, employees can search for trusted information in seconds.
It is greatly valuable in health insurance policies which are securing the data and
for the compensations also [6]. Blockchain technology also presents potential use
cases for insurers that include innovating insurance products and services for growth,
increasing effectiveness in scam detection and pricing, and reducing administrative
costs [13, 20].
Guardtime reinstate Trust with Truth and is well known for providing Healthcare
Data Infrastructure, Blockchain-as-a-Service [25]. Guardtime health bridges the
gap between various entities across numerous platforms to sustain data integrity.
Patient—report outcomes—Guardtime HSX guarantees that patient detailed results
are conveyed progressively based on their clinical trials. It can distinguish and resolve
cases where patient results and hazard is documented imprecisely. The Platform
keeps updating the clients regarding their personalized treatment plans ensuring
continuous valuation process and all of this is done via a Smartphone application
programming interface (APIs). Guardtime HSX can be utilized to enroll patients
for clinical preliminaries about interfacing openly to the patients ingesting explicit
medications [26].
Dental System at the moment from Diagnosis and X-Rays to patient receipts and
prescriptions, everything is completely manual. It indicates the patient’s data is open
for any manipulations. The movement of the current medical data is silent inade-
quate, with patients having less knowledge about their data. In a Blockchain dental
embed framework, the applicable information of the block or dental implant can’t
be discretionarily altered, so that keeping the culmination and security of the clinical
records. It includes two ends a doctor end and patient end, the specialist end stores
dental embed patient’s clinical records in the blockchain. It also offers inventive
assistance, and improves the commitment to clinical characteristics. Patient’s end
has the responsibility for own clinical records, fit for acquiring their clinical record
information explicitly through system connection, and being better for self-health
management [27].
62 S. V. Urkude et al.
As per an overview led by Klynveld Peat Marwick Goerdeler (KPMG), 38% of top
healthcare services chief information officers (CIOs) state better administration of
electronic health records (EHR) is head of their plan and planning needs [5]. MedRec
provides a Distributed access and validation structure that prioritizes patient activity,
giving apparent and accessible surv%eillance of medical records [8]. MedRec is built
on the Ethereum blockchain, which uses smart contracts that allows diverse transac-
tions to be executed on the blockchain. It includes work adjoining on agreements to
execute some set of conditions. It doesn’t store EHR legitimately, however, encodes
metadata that permits records to be gotten to immovably by patients on Ethereum
Blockchain. By employing savvy agreements to encode pointers, it may be utilized
to find and validate the record areas. MedRec allows patient-provider relationships
using a summary contract that gives full control to patients for acceptance, rejec-
tion and cutting off relationships. In MedRec whenever a patient wants to access a
particular medical record, permission is needed from the provider. He will check the
legitimacy of the identity and allows the client to have access to the requested param-
eter. When it comes to privacy, MedRec proposes the addition of encryption in the
off-blockchain synchronization steps, safeguarding against accidental or malicious
content access.
Mining in Medrec blockchain is a computationally exhaustive hashing exercise
that is performed by medical researchers. In this process, when a block is mined,
the block’s miner in appended as the author of inquiry, allowing them to collect the
data as part of the transaction. Then the block’s minor will get access to anonymised
data that could help them in their researches. This proposal raises a concern on data
security and privacy as nodes with common interests can group up and perform
unprofessional conduct. It may also affect the dignity of the blockchain as well as
the integrity of clients’ data.
Personal health record management uses a different approach to this by storing
patients’ encrypted data copies on three nodes. One at IYRO cloud node, second
at their clinic storage and third on consumer’s device, making data storage process
more transparent and reliable and all of this is done through API’s [24]. IYRO
uses the EOSIO network—the most authoritative infrastructure for decentralized
applications that offer shards (Blockchain apps). EOSIO consensus protocol includes
Delegated proof of stake (DPoS) + asynchronous byzantine fault tolerant (aBFT),
which makes it more secure than others. This platform incorporates working on
patient’s data using artificial intelligence (AI) and Blockchain for making predictions
using EOSIO blockchain implementation and algorithm called Umbral algorithm.
This algorithm allows the patient to issue re-encryption keys. An end-user can issue
signed permissions like sharing EHR with the personal doctor, cancellation of access
to EHR, sharing limited PHR with a time limit, and permissions to read/write.
4 Anatomy of Blockchain Implementation in Healthcare 63
Casado-Vara, Prieto proposed a model that uses digital agreement contracts with
multi operator frameworks planned for expanding productivity in logistics configu-
ration management, which can be applied in the pharmaceutical supply chain [13,
28]. FarmaTrust uses Blockchain technology for preventing the counterfeiting of
pharmaceuticals and ensure drug safety by the end-to-end tracking of medical prod-
ucts [21]. FarmaTrust Zoi System, a blockchain-based Zoi supply chain information
exchange stage to safely confirm and permits the supply of authentic items over
an assorted system of pharmaceutical brands. It provides a secure, interoperable,
and immutable source of data, which allows tracking of successive products across
an uninterrupted chain of supervision throughout the supply chain. By integrating
blockchain technology, big data and machine learning with smart dealing logic help
Zoi systems to prevent falsified medicines effortlessly entering the consumer market.
The system does it, through a digital token referencing each consecutive product key
from manufacture to end-user ensuring transparency at every point.
Scalability is one of the major disquiets in Blockchain which is solved by the Zoi
system that is designed to handle millions of transactions using various techniques
such as caching, data allocation, multi-processing, parallel scaling, high aptitude
servers, etc. without negotiating performance and data safety. It uses a permissioned
blockchain network—Ethereum and Proof-of-authority as consensus protocol, which
makes it highly secured and compatible than other systems. Zoi system issues tokens
called FTT tokens i.e., ERC20 standard tokens that allow the clients to take part in the
Zoi ecosystem in means of transferring assets, which can be used by pharmaceutical
companies, government, consumers, and FTT token holders, etc.
The Healthcare sector is moving towards a decentralized database from storing data
to performing operations on them and utilizing it to grant personal benefits. Medi-
Bloc is an open-source healthcare data platform built on blockchain that can secure
and integrate diffused data from numerous organizations. It can track a person’s daily
movement via smartphones, fit bands, smartwatches, and so forth [22]. Characteris-
tics like high security, reliability, compatibility, and transparency make this platform
a well-known preference for unknown entities. Interoperability is the feature that
allows all third party entities to play a part in the exchanging of data. MediBloc
issues Medi tokens (MED), used on this platform for appreciating their participation
by getting tokens in the reward that is not only for participants but also for healthcare
professionals too. Tokens can also be used while transferring assets, for example, a
third party institution need to take permission from the user to have access to their
data so that users can generate revenues in terms of token transfers.
64 S. V. Urkude et al.
This platform contains 3 layers, first is core layer known as MediBloc core that
allows encryption using user’s private key on a blockchain network assuring data
security. Second layer grant services passing through Ethereum smart contracts that
permits the exchange of data between two layers—MediBloc core and Applica-
tion. The third layer as Application Programming Interfaces (API’s) to connect the
platform through supervision of protocols. Consensus protocol used by MediBloc
is tendermint consensus (Developer friendly and low-level protocol, a combination
of Consensus protocol and Application Blockchain interface [29]) that is based on
Delegated Proof of Stake (DPoS) and Practical Byzantine Fault Tolerance (PBFT).
MediBloc uses blockchain technology to make its platform customer-centric, which
provides data switch over services and creates a reliable personal health record (PHR)
by allowing the patient to have total control over their data that can enhance data
convenience with absolute transparency.
Genomic refers to Deoxyribose Nucleic Acid (DNA), which helps in uniquely iden-
tify entities all over the world. In genomics data sets requires huge computation
exhaustive and high sequencing processes. There is a need for a secure data platform
that could assist during data allocation and provide high-level information supremacy
[13, 30]. Genomic data is used by the researchers for Drug discovery, preventing
viruses, disease prediction improved diagnosis, etc., but poor genomic data quality
and inefficient data acquirement is becoming a major concern presently. Nebula
Genomics provides a platform that enhances the data sharing, storing, enabling buyers
to have easy access while surfing through the arrangement, this will not only improve
the efficiency but will also make information secure and precise [23].
The Nebula network is built on the Blockstack platform (an open-source and
developer pleasant network for building decentralized apps and smart contracts)
and Ethereum blockchain. It reduces effective sequencing costs and enhances the
protection of personal genomic data. By eradicating stress on third parties, data
owners can obtain their genomic data from Nebula sequencing facilities that connect
them to data buyers in a peer-peer cryptographically encrypted network. Nebula
smart contract-based appraisal tool will facilitate data buyers to plan surveys that
consist of mutually supporting inquiries and bring out accurate responses. Nebula
token is the currency used in this network that can be used in paying for services and
data purchases. Decentralized sequencing will help individuals to purchase DNA
sequencing machines and perform sequence on their samples so that privacy risks
can be detected.
The blockchain implementation proposed by different researchers such as Peilong,
Asaph Azaria, and so on is shown in Table 4.3.
Peilong Li et al. proposed a software-defined infrastructure, ChainSDI to address
the issue of sharing and computing the data of sensitive patients [31]. They addressed
data interoperability issues by deploying in the cloud environment of heterogeneous
4 Anatomy of Blockchain Implementation in Healthcare 65
provider will update the status variable. System node in MedRec consists of Backend
library, Ethereum client, Database gatekeeper, and EMR manager.
Satoshi Nakamoto proposed Bitcoin, direct money transform from one node to
another without a third party interface [1]. He used proof-of-work to follow the
majority decision and represented by the longest chain. To modify the block in the
chain attacker has to modify all the previous blocks and proof-of-work. With the entire
valid transaction, the block is accepted by the node. To process every transaction,
some charges are taken as an incentive that will help nodes to stay connected with the
chain. The attacker having more CPU power than a new coin is generated. In Bitcoin
privacy is achieved by releasing anonymous public keys without telling whom it is
addressing.
Daraghm et al. proposed MedChain, to manage medical health records [33]. Secu-
rity and access control are achieved by encryption and authentication mechanism.
Privacy is achieved by implementing a time-based smart contract for all the transac-
tions. Separate logs are maintained to achieve data interoperability and accessibility.
To transfer digital currency between a pair of nodes and recreating a new block new
incentive mechanism is proposed. Medchain is implemented by various software
components such as records evaluation Manager (REM). it will extract, manage, and
classify heterogeneous data. The degree of health provider node is computed for
each node and stored in Nodes Consensus Contract (NCC) to create a new block.
DB manager creates a hash value for the link, the patient’s medical record, and logs
that are stored in the blockchain. For the client access permission blockchain is used.
It had a web interface to view and retrieve information from patients. It uses NCC
for registering new user, mining, and identifying the role of each participant in the
blockchain.
Liu et al. proposed a mechanism to store medical and historical data [34]. They
implemented a symptoms-matching mechanism by creating mutual communication
between patients with similar symptoms communication in the future. It is consists of
three components system manager, patients, and hospital. The system manager (SM)
is a trusted authority. It is responsible for all communication between the patient,
hospital, and stored data in blockchain for further reference. They used a delegated
proof-of-stake (DPOS) consensus mechanism. In DPOS supernode will get the coin
to generate a new block. In case of failure new supernode is selected to generate the
block. They used private blockchain for medical data sharing and protection. This
mechanism is having low computation and communication costs.
Eli Ben-Sasson et.al proposed Zerocash, a decentralized anonymous payment
scheme (DAP) [35]. DAP is an unnamed payment application designed from Bitcoin.
DAP is very efficient for the small transaction of less than 1 KB. DAP implemented
a special base currency called base coin having parameters such as coin value, serial
number, and address. They also defined other transactions as Mint transaction and
Pour transaction. All transaction in zerocash is verified by proof-of-work and it
will take time to spread on the network. They developed two algorithms, the Mint
algorithm to generate a coin and the Pour algorithm to consume the generated coin
and performing transaction.
4 Anatomy of Blockchain Implementation in Healthcare 67
4.4.1 Scalability
One of the major concerns in public blockchain is scalability. It arises when the
network participants become more due to public blockchain openness. It increases
the number of transactions and participant nodes making the whole network not
much scalable [7]. Blockchain transfer also includes a node validation process in
which the transaction is been shared among different nodes for verification. Once
the authentication is completed a ledger entry takes place at each node that makes
it tamper-proof, but on the other side, data becomes prone to potential and security
risks [36]. To recover blockchain scalability divides the nodes into sub-groups called
shards. A shard helps a compartment of transactions to process at a time, making the
whole process faster and scalable. After that these transactions are added to the new
block i.e., dedicated to the Blockchain [37].
The significant deterrents to the selection of the innovation are intricacy of building
and deploying a private blockchain network and the connected cost. Amazon and
IBM are providing Cloud-based Blockchain models that can help in making the
68 S. V. Urkude et al.
In a public blockchain, there is a lack of authorities that can govern the whole process
with appropriate protocols and policies, as any sought negligence happening cannot
be detected. In a solution to this, institutes and corporations are moving towards
private blockchain wherein merely authorized nodes are permitted, which means
only certified entities can join the Blockchain Network to engage in any kind of
actions inside the network [7].
Public blockchain has data privacy as one of the major concerns when it comes to
network security. The nodes can view the transactions that are happening inside the
blockchain. Therefore, organizations are going for private or consortium blockchain
that allows only certified entities to participate in the Blockchain network [7].
Healthcare deals with a huge amount of data that is generated through clinical trials,
research data, diagnosis reports, and patient records, etc. It is demanding a secure
platform to store data and perform operations with features like interoperability.
Unlike the central database, blockchain provides a distributed database that allows
4 Anatomy of Blockchain Implementation in Healthcare 69
secure data operations and interoperability. Enormous data can increase the size
of the database that could result in low processing speed and poor functioning,
consequently, the blockchain system needs to be contingent and scalable [36].
There are many loopholes in healthcare which can be solved by blockchain tech-
nology. In healthcare sector the most promising issue is to maintain the health record
of the patient, to track drug delivery etc. is discussed in this section.
Blockchain in healthcare is one that makes the transactions faster and securer. The
features like interoperability make blockchain an easily accessible platform to store
data and provide a sheltered atmosphere when working with distinct operations.
Smart contracts are programmable contracts, which syntactically deal with a set of
conditions to be verified before having a transaction executed. This structure can
fulfill the requirements of insurance policies given by the companies including some
agreements to be signed by the end-user to accept their guidelines i.e., terms and
conditions, and it is only possible using blockchain like from gathering of data to
interpretation and then storing it safely in a decentralized platform have completely
renovated the authenticity of transferring assets. It can detect false claims made by the
entities and can easily confirm them with an unassailable registry which is extremely
transparent so that no mediator could interfere and argue about data security concerns.
The main purpose of blockchain in healthcare insurance is to uphold accuracy and
lucidity in surroundings to withstand on client requirements that is possible using
digital ledger technology (DLT) to make it a customer-centric system [40].
IBM Blockchain uses smart contracts to allow automatic payment execution for
insurance claims and reimbursement processes to resolve the major harms faced
by the insurance industry like an imprecise directory data. Distributed ledger tech-
nology can make the insurance claims time-stamped and automate collection with
modernizing of data by significantly eradicating stress on the third party and manual
paperwork. It would automatically make the whole scenario lucrative. The Health-
care industry lost over $6 Billion in security breaches concerning data privacy, so
security should be the main concern when introducing Blockchain-Based systems.
The interoperability should not result in data allocation without patient acquiescence.
It should be exclusively shared on patient assent and obtainable privacy regulations
[41].
70 S. V. Urkude et al.
The current multimedia system does not include the time-stamping of performed
transactions and the history of alteration details. Multimedia deals with documen-
tation, images, and videos so on. They are often manipulated when showcased in
public like exhibitions, galleries, etc. preparing creative content by tampering with the
original document to spread off beam misinformation on social media. Blockchain
can play a major role in developing the watermark based Multimedia Blockchain
framework which is built on the testnet of the Ethereum that fundamentally focuses
on a unique hash of every transaction executed. It could be time-stamped anytime
from anywhere when it is required. Since blockchain follows a node systems valida-
tion process and a signature feature, which was introduced to detect the originality
of the media content. The process goes like a self-embedded watermark is hidden
inside original media using Discrete Wavelet Transform (DWT). The watermarking
string consists of 8-bit values, which illustrates media’s authenticity. It is done using
a watermarking algorithm that can sense any wrong means happening, so it can
retrieve the original content of the specific media that can defend its inventiveness.
This way the multimedia could be encrypted using blockchain technology health-
care marketing should always be precise and secure, so that negligence happening
inside the system can be easily detected and resolved [42]. The main purpose of
blockchain in healthcare is to resolve concerns on data security and platform reli-
ability. It is severely needed in the current healthcare system, where employing
Distributed ledger technology (DLT) is coming out as a better solution.
Personal health records in the current scenario are bounded within a specific organi-
zation as any organization will not be ready to share their Electronic Health Records
in fear of competency in the market that can pull them down. The data is stored in the
hospital’s database i.e., a centralized database and they can even generate revenues
by selling your data to third parties like institutions, researchers, etc. Due to such
issues, people are getting affected because every time a person goes to a medical
center with no access to his past medical history. It will take a long for the doctor
to process it again and make patient ready for the treatment which is completely
waste of time and money. Instead of that they can use a database which is acces-
sible to all i.e., blockchain. Blockchain provides a distributed database which can be
easily accessed among multiple organizations using a permission-based blockchain
network. It can allow the patient to own their data and can make sure that without
their authorization nobody could access the data. This makes the whole process trans-
parent and trustworthy. Timicoin uses the concept of interoperability that can secure
health information within Health Information Exchange (HIE). It can be defined
4 Anatomy of Blockchain Implementation in Healthcare 71
as a reliable platform for data sharing that embraces sharing the information of
patients, physicians, pharmacists, etc. between unknown entities. When combined
with blockchain the Blockchain-based HIE could eradicate avoidable services and
checks, enhancing data integrity. It makes data sharing efficient, secure, and tamper-
proof thereby cutting transfer costs. Nowadays, mobile applications are developed
to store data, includes authorized access to others on their data for a time-stamp to
generate revenues and other possessions like getting tokens in reward by keeping
track of their health activities, which could keep them fit and healthy [43].
The electronic Health record is playing a crucial role in the healthcare industry, which
can make patient-Doctor Interaction completely online like medical prescriptions,
diets, etc. This process has to be followed by the patient, and is done using a simple
mobile/web Application which uses blockchain technology. It provides security,
anonymity and a distributed system of records. It will also help doctors to get imme-
diate access to overall patient history with keeping a track on their everyday activities.
72 S. V. Urkude et al.
Genomic data refers to the DNA of the person representing the most confidential
information of an individual’s present, past, and future. Currently, the big DNA
testing corporations are generating revenues by selling consumer’s data to the third
party without even asking the authorized person or providing any compensation to
them. This way the most sensitive data of the consumer is open for exploitation.
EncrypGen -World’s first blockchain-based genomic data market uses a consumer-
based system in which consumers can have control over their personal DNA data
using blockchain security. It has an option of sharing with the authorized/ registered
third parties on the EncrypGen platform resembling researchers, institutions, etc. For
a time limit to generate revenues that in turn will help them in adding value to their
work and also the person who is sharing the information [46].
4 Anatomy of Blockchain Implementation in Healthcare 73
Patient data sharing is the prior concern when it comes to challenges faced by gigantic
healthcare firms for clinical research and trial management. Blockchain can mech-
anize clinical trials using smart contracts that permit the data to be self-executed
when the set of constraints are verified. The manual assistance is completely eradi-
cated and the working flow will get well-organized by changing priorities. Ensuring
data privacy is the major distress that blockchain can solve effortlessly. The features
like lucidity in-process and tracking data entries to managing tasks. This technology
has solved many indiscretions ever since from its evolution eradicating subjects in
the vein of falsification of data, muddled etiquette classification, unavailability of
records. These issues are the foremost cause of why clinical trial management is
sheathing behind. They can be resolved by introducing Blockchain in the system.
Research always needs to be accurate, so that the results could be the reflex of the
work. But when talking about data utilization from a centralized database there is no
guarantee that the data is entirely authentic. There can be any sort of malpractices
that can run the whole research. In another way, Blockchain permits data sharing
between unknown entities by creating a peer-peer immutable link in which data is
encrypted and decrypted by authorized users in a trustworthy environment [47].
References
1. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). Available online at https://
www.ildgroup.si/uploads/product/20/bitcoin.pdf
2. Dhir, S.S., Hooda, M.: Possibilities at the intersection of AI and blockchain technology. Int. J.
Innov. Technol. Explor. Eng. (IJITEE) 9(1S), 2278–3075 (2019)
3. Zhang, R., Xue, R., Liu, L.: Security and Privacy on Blockchain. ACM Comput. Surv. 1, Article
1 (2019)
4. What is blockchain is available online at: https://dragonchain.com/blog/what-is-blockchain
5. Blockchain in healthcare guide is available online at: https://healthcareweekly.com/blockchain-
in-healthcare-guide/
6. Different types of blockchain is available online at: https://dragonchain.com/blog/differences-
between-public-private-blockchains
7. Ismail, L., Materwala, H.: A review of blockchain architecture and consensus protocols: use
cases, challenges, and solutions. Symmetry 11(10), 1198 (2019)
8. MedRec Technical Documentation is available online at: https://medrec.media.mit.edu/ima
ges/medrec_technical_documentation.pdf
9. Healthcare projects are available online at: https://blog.lumiwallet.com/the-most-promising-
blockchain-healthcare-projects-2020/
10. Overview of blockchain technology in the healthcare industry is available online at: https://
www.medgadget.com/2019/12/blockchain-technology-in-healthcare-industry-overview-
2020-global-size-estimation-regional-analysis-technology-trends-business-challenges-opport
unities-company-profile-market-growth-at-71-8-cag.html
4 Anatomy of Blockchain Implementation in Healthcare 75
11. Dubovitskaya A., et al.: Secure and trustable electronic medical records sharing using
blockchain. In: AMIA Annual Symposium Proceedings, pp. 650–659 (2017)
12. Agbo, C.C., Mahmoud, Q.H.: Comparison of Blockchain Frameworks for Healthcare Appli-
cations. Online Library Wiley Publication (2019)
13. Justinia, T.: Blockchain technologies: opportunities for solving real-world problems in
healthcare and biomedical sciences. Acta Inf. Med. 27(4), 284–291 (2019)
14. Initial coin offering is available online at: https://www.investopedia.com/terms/i/initial-coin-
offering-ico.asp#:~:text=An%20Initial%20Coin%20Offering%20(ICO)%20is%20the%20c
ryptocurrency%20industry’s%20equivalent,or%20service%20launches%20an%20ICO.
15. Comparative Analysis of Crypto Assets Frameworks is available online at: https://www.unl
ock-bc.com/sites/default/files/attachments/Comparative%20Crypto%20Assets%20Regulat
ory%20Framework%20Report%20Final.pdf
16. About filecoin is available online at: https://filecoin.io/
17. What is blockchain token is available online at: https://theconversation.com/what-is-a-blockc
hain-token-98916#:~:text=A%20security%20token%2C%20sometimes%20called,an%20u
nderlying%20real%2Dworld%20asset.&text=Security%20tokens%20use%20a%20blockch
ain,of%20who%20owns%20which%20assets.
18. Digital disruption of blockchain in healthcare is available online at: https://healthcareweekly.
com/digital-disruption-blockchain-in-healthcare/
19. Artificial intelligence in healthcare is available online at: Website: https://healthcareweekly.
com/artificial-intelligence-in-healthcare/
20. Lorenz, J.T.: Blockchain in Insurance—Opportunity or Threat? McKinsey & Company (2016)
21. FarmaTrust Whitepaper is available online at: https://neironix.io/documents/whitepaper/949
f441102b21eaf2b5a0244e8f06a5d.pdf
22. MediBloc Whitepaper is available online at: https://whitepaper.io/document/176/medibloc-whi
tepaper
23. Grishin, D., Obbad, K., Estep, P., Cifric, M., Zhao, Y., Church, C.: Nebula genomics.
Blockchain-Enabled Genomic Data Sharing and Analysis Platform, Vol 4, Issue 52, 2018.
https://arep.med.harvard.edu/pdf/Grishin_Church_v4.52_2018.pdf
24. IYRO network is available online at: https://iryo.network/iryo_whitepaper.pdf
25. Website: https://guardtime.com/technology
26. Website: https://guardtime.com/health/patient-engagement-for-clinical-trials-and-follow-up
27. Lin, C.-M.: Blockchain dental implant system. US 2020/0021570 A1, 16 Jan 2020
28. Casado-Vara, R., Prieto, J., De la Prieta, F., Corchado, J.M.: How blockchain improves the
supply chain: case study alimentary supply chain. Procedia Comput. Sci. 134, 393–398 (2018)
29. What is tendermint is available online at: https://docs.tendermint.com/master/introduction/
what-is-tendermint.html
30. Ozercan, H.I., Ileri, A.M., Ayday, E., Genome, A.C.: Realizing the potential of blockchain
technologies in genomics. Genome Res. 28(9), 1255–1263 (2018)
31. Li, P., Xu, C., Jin, H., Hu, C., Luo, Y., Cao, Y., Mathew, J., Ma, Y.: ChainSDI: a software-defined
infrastructure for regulation-compliant home-based healthcare services secured by blockchains.
IEEE Syst. J. (2019)
32. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data
access and permission management. In: IEEE 2nd International Conference on Open and Big
Data, pp. 25–30 (2016)
33. Daraghmi, E.-Y., Daraghmi, Y.-A., Yuan, S.-M.: MedChain: a design of blockchain-based
system for medical records access and permissions management. IEEE Access 7, 164595–
164613 (2019)
34. Liu, X., Wang, Z., Jin, C., Li, F., Li, G.: A blockchain-based medical data sharing and protection
scheme. IEEE Access 4 (2016)
35. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zero-
cash: Decentralized Anonymous Payments from Bitcoin. In: Proceedings of the 2014 IEEE
Symposium on Security and Privacy, pp. 459–474 (2014)
76 S. V. Urkude et al.
36. Siyal, A.A., Junejo, A.Z., Zawish, M., Ahmed, K., Khalil, A., Soursou, G.: Applications
of blockchain technology in medicine and healthcare: challenges and future perspectives.
Cryptography 3(1) (2019)
37. Zilliqa. Available online: https://docs.zilliqa.com/positionpaper.pdf 31 Dec 2018
38. INTEL corporation Available online at: https://appft.uspto.gov/netacgi/nph-Parser?Sect1=
PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&p=1&f=G&l=
50&d=PG01&S1=20180089642.PGNR.&OS=dn/20180089642&RS=DN/20180089642
39. Blockstream is Available online at: https://elementsproject.org/
40. Website: https://www.reddit.com/r/BlockchainStartups/comments/hqx2qw/how_does_bloc
kchain_technology_help_in_health/?utm_source=share&utm_me%2520dium=web2x
41. Website: https://cointelegraph.com/news/blockchain-in-health-insurance-more-accuracy-
more-transparency-and-more-efficiency
42. Bhowmik, D., Feng, T.: The multimedia blockchain: a distributed and tamper-proof media
transaction framework. In: 22nd International Conference on Digital Signal Processing (DSP)
(2017)
43. Timicoin Whitepaper: https://timihealth.com/timicoinwhitePaper.pdf
44. Sylim, P., Liu, F., Marcelo, A., Fontelo, P.: Blockchain technology for detecting falsified
and substandard drugs in distribution: pharmaceutical supply chain intervention. JMIR Res.
Protocol 7(9) (2018)
45. Medicalchain whitepaper is available online at: https://medicalchain.com/en/whitepaper/
46. EncrypGen Whitepaper is available online at: https://query.prod.cms.rt.microsoft.com/cms/
api/am/binary/RE4woQm
47. Benchoufi, M., Ravaud, P.: Blockchain technology for improving clinical research quality. Natl.
Center Biotechnol. Inf. 18, 335 (2017)
48. Himss blockchain healthcare is available online at: https://www.ledgerinsights.com/himss-blo
ckchain-healtchare/
Chapter 5
A Blockchain Framework for Healthcare
Data Management Using Consensus
Based Selective Mirror Test Approach
5.1 Introduction
Recently, Electronic medical records (EMR) are crucial and extremely sensitive
to some private data for prediction and treatment in healthcare industries. This may
require constant distribution and sharing of data among various sectors like healthcare
providers, pharmacies, insurance companies, patients’ families, and researchers and
so on [1]. This leads to the foremost confront in maintaining patients’ medical history
to be more updated [2]. Sharing and storing data among multiple entities may preserve
access control towards enormous content that may complicate patients’ treatment
processes [3]. However, when a patient suffers from a diverse medical condition like
HIV, cancer has to hold its history of treatment and post-treatment monitoring and
rehabilitation [4]. With constant access to entire medical history may consider being
more crucial for patients treatment. For instance, understanding delivered laboratory
doses, and the radiation-based outcome is essential for ongoing treatment [5].
Some patients have the habit of visiting various medical institutions for consulta-
tion purposes and may be moved from one hospital locality to another one [6]. Based
on this legislation, patients are provided with rights over health information and may
set specific rules and limitations towards health information retrieval [7]. If patients
have to share their clinical data for an investigational purpose or to transform it from
one hospital to another is most needed for consent signature, which may represent
what kind of data to be shared, recipient information, and period of data that has to
be accessed by recipients [8]. This leads to too complicated factors for coordinating
specifically when patients move data to another country, region, or city and may not
know information regarding hospitals or caregivers where the patients are provided
with better care.
Although, if some consent is offered, the data transferring process may be time-
consuming, specifically, it is transferred via post [9]. Transferring patients’ infor-
mation via electronic mail through the internet is not considered by most hospi-
tals as it may encounter security risks where patients’ healthcare information is in
transit. Health Information Exchange (HIE) for ecosystems like common good health
alliance attempts to fulfill data from patient’s electronic health records more effec-
tually, securely, and appropriately shared between worldwide [9]. This may occur
when providers receive a patient’s health information based on access. It is complex to
fulfill patients’ who receive independent opinions from diverse healthcare providers.
However, these ecosystems may not resolve basic requirements while transferring
data from one place to another.
For the investigational purpose, data aggregation may also need consent until
data is anonymized. Moreover, it is measured as an independent release over locally
anonymized medical data that is related to similar patients and derived from various
sources [10]. For instance, numerous healthcare institutions are visited by patients
may lead to patient de-identification, and henceforth privacy violation is consid-
ered. Based on a centralized entity that may manage and store patients’ data and
access control-based strategies shows a single failure point and bottleneck towards
the entire system. It also needs to perform either complete operation over data encryp-
tion (anonymization or search) or selecting a complete trust entity that may access
sensitivity information regarding patients [11]. Therefore, the former function needs
data management towards memory, and that may not be appropriate in the hospital
environment. Then, the latter function may consider it to be more complex to iden-
tify general practice [12]. As an example, a Google-based health wallet may provide
patients information that is concerned regarding awareness and privacy of potential
risk where sensitive data may be misused.
5 A Blockchain Framework for Healthcare Data Management … 79
With access to the shared ledger, transparent history and immutable actions of all
functions are considered as network participants (like patients with modified permis-
sions, uploading or accessing newer data, doctor or sharing information for research)
who may overcome issues related to the above factors. By offering a tool for achieving
consensus between distributed entities devoid of relying upon a single trusted party,
blockchain technology may fulfill data security, facilitate healthcare data manage-
ment, and control over sensitive information for various actors or patients in the
medical field [13]. In healthcare set up, transactions are defined as the process of
uploading, creating, or transferring EMR data that may perform connections among
peers. Some transaction set is clustered at a specific time which is accumulated in a
ledger that may record every transaction and henceforth specifies network state. The
primary objective of implementing blockchain technology towards healthcare appli-
cations is as follows: tampering resistance, immutable and verifiable transactions,
integrity, and transparency towards sensitive medical data distribution [14]. This is
significantly attained by using a consensus approach based on fault tolerance and
data management.
data using a client-server architecture [16, 17]. But in this type of healthcare data
management system, the hospitals are the primary custodians of the data. A few
cloud-based medical services information the executives’ frameworks have been
set up by the scholarly community and industry so as to permit a patient to follow
his/her clinical information from various associations [18, 19]. However, cloud-based
centralized database system stores patients health information suffers from a single
point of failure system disclosed to errors, cyber-attacks, and information loss.
This section discusses Personally Controlled health care records that may initiate a
patient-centric healthcare data sharing model dependent on role-based and discre-
tionary based access control approaches. In this model, patients may construct the
ultimate objective-based authority in demonstrating data access. Enigma is consid-
ered a decentralized computational platform that may determine privacy, along with
data and computation storage, to acquire scalability and privacy [20]. Data is parti-
tioned into unknown chunks, and every node must evaluate one data chunk, indeed
of blockchain data that are not computed and replicated by each node. Moreover, to
control the system, an external blockchain is used, handling access control and event
database with tamper-proof. This model utilizes blockchain to remove third-party
access to personal data. As an outcome, users may be competent to control accessing
to own data [21]. The system has been executed based on the merging of off-chain
storage and pointer for storing encrypted data on the bit-coin-based blockchain. This
system serving of blockchain may deal with querying and sharing of data.
The author in Fehrenbacher, Helfert [22] considers Medrec as an essential execu-
tion of an access control system that may utilize blockchain technology. It is executed
with Ethereum technology with specific modification of the mining procedure. It
offers reward-based mining techniques to attempt medical stakeholders to partici-
pate in the system and validate transactions as miners. The author in Knieke et al. [23]
anticipated a blockchain framework for accessing electronic medical data preserved
in cloud repositories. Some system is dependent on the permission-based blockchain;
henceforth authorized users only access system by validating cryptographic keys.
This testing performance is dependent on comparison with blockchain, and bitcoin-
based blockchain illustrates scalable and light-based design. In Zheng et al. [4], the
author offers an execution towards role-based access control with smart contracts and
confronts response protocol dependent on the Ethereum platform. The challenge-
response protocol is modeled to authenticate ownership roles and for user verifica-
tion. Some authors may concentrate on trans-organization for accessing control, user
service access for organizations dependent on a role in another organization.
In Zyskind and Nathan [24], the author uses the blockchain model for EHR
record validation using an attribute-based signature model through several author-
ities. Report evaluation demonstrates that this system may be strong against collu-
sion attacks along with privacy preservation. Even though there is enormous work
82 P. S. G. Aruna Sri and D. Lalitha Bhaskari
Although there are numerous healthcare institutions, the volume of data produced in
this era is continuously growing. However, privacy and security are avoided inten-
tionally. As an outcome, numerous organizations may experience huge reputation
loss and capital. Various users of healthcare may play diverse roles, and data access
has to be allocated. This access mode can be fulfilled by blockchain technologies.
MedRec is considered as a decentralized management system where data operation
and permission are recorded in a blockchain, and implementation is performed. It
has collaborated with medical information for data confidentiality, authentication,
auditing, and sharing. It may provide immutable data services. In some work, the
author may achieve controllable data management in the cloud environment to resolve
the user’s concerns regarding control lack. Here, it may be designed for trust authority
to facilitate users to prevent mal functioning during significant attacks. With the data
management system, the user may control entire health records using blockchain.
Moreover, there is no authorization design and access control during implementa-
tion. Based on this decentralized management system, a consensus mechanism has
been designed.
Generally, BC is generated and retained as a distributed ledger for any online trans-
action. Here two diverse blockchains transactional modeling: unspent transactions
and account-based transaction models.
Privacy degree 1. It is considered as a data structure that may hold several instances
devoid of combining them into one account. By handling these sorts of instances, the
holder needs to disclose to pay. This specifies that the payer may perform multiple
payments at the same time.
Scalability degree 2. This may eliminate certain constraints over the account-based
transactional model. Here, parallel transactions may be performed independently,
devoid of considering the order of transactions. This is because; it trusts on hash
functions to recognize its initial state. Therefore, it is difficult for mis-ordered trans-
actions. The transaction sequence number must be tracked in the case of distributed
systems.
Security degree 3. It maintains proof of ownership for all instances. Conflicts
are reduced to a double-spending problem; currency-based transactions may be
duplicated easily. It may resolve the spending problem by enforcing consensus
mechanisms for newer blocks to blockchain and maintains it as a universal ledger.
are constructed with data transfer more desirably. This resource may follow state
transfer principles and validates structural standard, and conformance statements
termed profiles. Transactions include the following characteristics,
Hashing: SHA algorithm can be used for resource payload. Resources may not
enter blockchain until hash provides verification to transactions.
Signature: node must hold the originator signature.
URL: refers to actual resource location.
Profiles: it is held for resource conformation.
Index: encrypted index may facilitate data discovery without information leakage.
Hashes of every transaction must contribute block header. It comprises of
metadata, which can be used to validate new data. Hash—a hashing algorithm
is provided to every block. Assume the root has two children C0 and C1 with
previous blocks, bn−1 . let hash is equal to the concatenation of bn−1 , C0 , C1 hashes.
Block hashing—hash of blocks are considered for validation. Signature—nodes are
contributed to blocking; a signature is needed based on the requirement. This may
86 P. S. G. Aruna Sri and D. Lalitha Bhaskari
fulfill blocks for validation after the miner assumption. Election—nodes have to
contribute a random number encrypted with the private key. This is utilized to choose
the next miner.
The data stored in this model is secured through the SHA hashing function, and it
will be protected against malicious attempts to unauthorized access, while users are
assigned private keys for signing and validation of every transaction. Signature and
encryptions are used in the network to fulfill stored healthcare records. Moreover, a
consensus algorithm may be controlled by at least 50% in the network for changing
healthcare data. For changing data, every copy of the global ledger has to be modified.
Here, every user block are hashed, and hashes of all transactions are maintained in
the blockchain. For example, SHA-512. The message blocks are processed one at
a time: Beginning with a fixed initial hash value H (0), sequentially compute H (i)
= H (i1) + C M(i)(H (i1)); where C is the SHA-512 compression function and +
means word-wise mod 264 addition. H (N ) is the hash of M.
5 A Blockchain Framework for Healthcare Data Management … 87
This may also fulfill system availability by eliminating any single point failure.
With this, it is complicated for all adversaries to launch DoS attacks over the registra-
tion system. Every transaction has to be validated from the network node by making
it complicated for fraudulent to initiate malicious connections. In the case of compu-
tational efficiency, users may run the lightweight client to store transactions indeed
of a complete copy of blockchains, which are storage expensive. This may be compu-
tationally powerful with efficiency storage capacity, and users may manage records
more effectually.
The basic idea behind fault tolerance is for implementing large scale data applications.
The input is data mapping from various tasks from sub-blocks to processors to
determine to schedule, and fault-tolerant output is attained. The objective is to
determine sub-tasks based on applications and schedules. The task key is determined
in healthcare applications. To have a better understanding of this function, slack time
and key sub-tasks has to be expanded. For a block is provided with a schedule, every
sub-task has been completed based on scheduled time. Specifically, some may fail
during the execution process. Then, the key block has to supply checkpoint files to
perform further operations.
88 P. S. G. Aruna Sri and D. Lalitha Bhaskari
However, delays encountered during this process may lead to sub-task failures
and may affect the blocks. If the failed sub-task has slack, it may be influenced in
the initial phase of computation. For performing block computation, the threshold
has to be fixed; this should be related to the makespan of healthcare applications.
This means that a higher threshold value may show more sub-tasks; when this value
is smaller, it causes longer makespan. The sub-task is adopted with a mirror task to
enhance fault tolerance performance. Finally, this mirrored task has to be deployed
over a copy of the sub-task key over another processor. Sub-task is specified as τiP ,
and its copy is provided as τiC both these may commence at an earlier stage and
generate a checkpoint interval 2ϕopt .
Practical makeapan
Delayrate = (5.1)
ideal makespan
The distance between both the tasks is measured for providing checkpoint inter-
vals. When failure occurs in one block, checkpoint interval if two sub-task may leads
to delay by dealing with failure. To determine optimal fault tolerance of blockchain
application, the delay has to be computed until the completion of the application,
i.e., makespan has to be evaluated.
(1) The public, consortium, and private blockchain. In public, it is open to read,
receive, and send transactions and facilitates participants to join consensus
procedure for making decisions over blocks for appropriate transactions and
added to the blockchain. Then, the consortium is based on constraints like
permissions that are pre-selected for some participants in the network, which
may be influenced and managed by a consensus process. Finally, private is
based on getting permission for strictly prohibiting single participants, although
read is accessible to openly for constraint set of participants. However, perfor-
mance and security may be different for consensus speed. This is also moni-
tored by a trusted authority. Therefore, it fulfills three characteristics: usage of
decentralized peer to peer network,
(2) Every transaction is digitally signed.
(3) Consensus is synchronized for network replication. Even though there is a vast
growth in the blockchain mechanism, it is exceptionally complex to fulfill data
management, security, and privacy.
Figure 5.3 depicts node creation, node connectivity, and node establishment in
the network. Initially, the node connection is established for having effectual data
broadcast and retrieval.
Table 5.1 determines the block data format with the number of bytes it holds
during every transaction.
Figure 5.4 shows the hash (SHA) functionality among nodes to ensure security
and avoid fraudulently.
Figure 5.5 illustrates the block size and transaction of healthcare data among those
blocks.
Figure 5.6 shows accuracy when data transmission is higher among nodes. This
method shows better accuracy and security by adopting SHA algorithm for hashing
and to generate puzzle solution. Therefore, “Proof of Word” works effectually in
blockchain management for accessing health care data with consensus mechanism.
Figure 5.7 depicts the fault tolerance value of the proposed model, where it is
based on the threshold value provided to every block to identify the delay during
overlap. When the value is smaller, it leads to a longer make span; when it is higher,
it leads to a smaller make span. Thereby, fault tolerance is measured.
5.5 Conclusion
The blockchain depicts solution for information sharing while handling security
issues and facilitating transparency over every transactional record. These advan-
tages are provided by constructing applications that facilitate data sharing and trust
while gaining more values. This may offer unique opportunities to model trusted and
secured data sharing and management system based on a consensus approach. This
blockchain technology may provide way for modular design merged with medical
providers of prevailing systems, local data storage-based solutions and facilitates
90 P. S. G. Aruna Sri and D. Lalitha Bhaskari
10
7 3
9 8 10
8 2
4
7
6 1
4 6 9
2
5
1
0 1 2 3 4 5 6 7 8 9 10
(a)
10
8 Block2
Block4
7
6 Block1
4 Node9
Block6
2
Block5
1
0 1 2 3 4 5 6 7 8 9 10
(b)
Fig. 5.3 a Node creation in-network, b block creation and c block connectivity
5 A Blockchain Framework for Healthcare Data Management … 91
10
8
6 9
7
5 5
0
0 1 2 3 4 5 6 7 8 9 10
(c)
developing and interoperability with ‘Proof of Word’ for the adaptable and conve-
nient system. This work is concluded by establishing interaction among the health-
care domain and blockchain-based technology, which may be inevitable with fault
tolerance mechanism, as technology may offer real solutions for sharing data while
measuring security properties. Nonetheless, the resources needed for implementation
have been projected to sustain developments towards long term solutions. Several
benefits of using the selective mirrored task method we can apply to other blockchain
application scenarios to improve the fault tolerance of multiple applications in the
future.
92 P. S. G. Aruna Sri and D. Lalitha Bhaskari
References
1. Bell, E.A., Ohno-Machado, L., Grando, M.A.: Sharing my health data: a survey of data
sharing preferences of healthy individuals. In: AMIA Annual Symposium Proceedings, p. 1699.
American Medical Informatics Association (2014)
2. Engelhardt, M.A.: Hitching healthcare to the chain: an introduction to blockchain technology
in the healthcare sector. Technol. Innov. Manage. Rev. 7(10)
3. Randall, D., Goel, P., Abujamra, R.: Blockchain applications and use cases in health information
technology. J. Health Med. Inf. 8(3), 8–11 (2017)
4. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology:
architecture, consensus, and future trends. In: 2017 IEEE international congress on big data
(BigData congress): IEEE; 2017. p. 557–564.
5. Tarasiewicz, M., Newman, A.: Cryptocurrencies as distributed community experiments. In:
Handbook of Digital Currency, pp. 201–222. Elsevier (2015)
94 P. S. G. Aruna Sri and D. Lalitha Bhaskari
6. McCarthy, J.: MedStar Attack Found to Be Ransomware. Hackers Demand Bitcoin, Health IT
News (2016)
7. Mainelli, M., Smith, M.: Sharing ledgers for sharing economies: an exploration of mutual
distributed ledgers (aka blockchain technology). J. Fin. Perspect. 3(3) (2015)
8. Mettler, M.: Applications and Services (Healthcom) (IEEE) Blockchain technology in health-
care: the revolution starts here. In: IEEE 18th International Conference on e-Health Networking,
pp. 1–3 (2016)
9. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare
intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)
10. McKernan, K.J.: The chloroplast genome hidden in plain sight, open access publishing and
anti-fragile distributed data sources. Mitochondrial DNA Part A 27(6), 4518–4519 (2016)
11. Linn, L.A., Koo, M.B.: Blockchain for health data and its potential use in health it and health
care related research. ONC/NIST Use of Blockchain for Healthcare and Research Workshop
Gaithersburg, Maryland, United States: ONC/NIST2016, pp. 1–10.
12. Ge, Y., Ahn, D.K., Unde, B., Gage, H.D., Carr, J.J.: Patient-controlled sharing of medical
imaging data across unaffiliated healthcare organizations. J. Am. Med. Inform. Assoc. 20(1),
157–163 (2013)
13. Vest, J.R., Gamm, L.D.: Health information exchange: persistent challenges and new strategies.
J. Am. Med. Inform. Assoc. 17(3), 288–294 (2010)
14. Cheng, R., Zhang, F., Kos, J., He, W., Hynes, N., Johnson, N., et al.: Ekiden: a platform
for confidentiality-preserving, trustworthy, and performant smart contracts. In: 2019 IEEE
European Symposium on Security and Privacy (EuroS&P), pp. 185–200. IEEE (2019)
15. Ismail, L., Materwala, H., Zeadally, S.: Lightweight blockchain for healthcare. IEEE Access
7, 149935–149951 (2019)
16. Rind, D.M., Kohane, I.S., Szolovits, P., Safran, C., Chueh, H.C., Barnett, G.O.: Maintaining
the confidentiality of medical records shared over the Internet and the World Wide Web. Ann.
Intern. Med. 127(2), 138–141 (1997)
17. Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health informa-
tion systems. Int. J. Med. Informatics 73(3), 305–309 (2004)
18. Bahga, A., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records
(EHRs). IEEE J. Biomed. Health Inf. 17(5), 894–906 (2013)
19. Zangara, G., Corso, P.P., Cangemi, F., Millonzi, F., Collova, F., Scarlatella, A.: A Cloud Based
Architecture to Support Electronic Health Record, vol. 207, pp. 380–389. IOS Press (2014)
20. Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technolo-
gies: future of transaction processing and smart contracts on the internet of money. In: Banking
Beyond Banks and Money, pp. 239–278. Springer (2016)
21. Ramachandran, G.S., Radhakrishnan, R., Krishnamachari, B.: Towards a decentralized data
marketplace for smart cities. In: 2018 IEEE International Smart Cities Conference (ISC2),
pp. 1–8. IEEE (2018)
22. Fehrenbacher, D.D., Helfert, M.: Contextual factors influencing perceived importance and
trade-offs of information quality. Commun. Assoc. Inf. Syst. 30, 111–126 (2012)
23. Knieke, C., Lawrenz, S., Fröhling, M., Goldmann, D., Rausch, A.: Predictive and flexible
Circular Economy approaches for highly integrated products and their materials as given in
E-Mobility and ICT, pp. 22–31. Trans Tech Publ, Materials Science Forum (2019)
24. Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In:
2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE (2015)
25. Xia, Q., Sifah, E.B., Smahi, A., Amofa, S., Zhang, X.: BBDS: Blockchain-based data sharing
for electronic medical records in cloud environments. Information 8(2), 44 (2017)
26. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data
access and permission management. In: 2016 2nd International Conference on Open and Big
Data (OBD), pp. 25–30. IEEE (2016)
27. Wachter, R.: Making IT work: harnessing the power of health information technology to
improve care in England. Department of Health, London, UK (2016)
5 A Blockchain Framework for Healthcare Data Management … 95
28. Michie, S., Yardley, L., West, R., Patrick, K., Greaves, F.: Developing and evaluating digital
interventions to promote behavior change in health and health care: recommendations resulting
from an international workshop. J. Med. Internet Res. 19(6), e232 (2017)
Chapter 6
Blockchain Technology in Healthcare:
Opportunities and Challenges
Abstract There are a few issues found because of the absence of traceability of
transactions in healthcare services. Healthcare information split across numerous
silos adversely influences research activities and administrations. There were no
reported cases of about half of the clinical preliminaries. The expense of medication
disclosure is ever-expanding, and unsatisfactory and fake medicines are as yet an
enormous issue. Blockchain has the potential to address such substantial problems.
Blockchain technology is a distributed and secure database organized by various
groups to store and offers a permanent online transaction record. Blockchain has
numerous medicinal services applications and can improve mobile health applica-
tions, preliminary clinical information, and insurance information storage. Each of
the blocks has an independent unit holding its report and a dependent link that makes
regulated by participants who store and share the data without third-party interven-
tion. The blockchain technology permits members to transfer information progres-
sively without presenting the channels to theft, malice, and forgery. In this work,
we review major blockchain healthcare applications in some areas of patient infor-
mation management, supply chain management of clinical goods, pharmaceutical
investigation, and telemedicine related to healthcare activities.
6.1 Introduction
The technology of blockchain (BC), with acquired attributes, for example anonymiza-
tion, transparency and decentralization was presented in the year 2008 in Bitcoin
cryptocurrency. By March 19, 2019, the Bitcoins with near about 400 million finished
transactions which speaks to strong use case of BC technology. This has prompted
conversations with recommendations that BC technology may be valuable in a scope
of different information domain [1].
As indicated by IBM, more than 70% of human services leaders have the predic-
tion that the best effect of BC inside the healthcare area will be an enhancement of
medical preliminary supervision, administrative consistence and giving a decentral-
ized system to contribute electronic health restrings (EHR) [2]. Also, the worldwide
BC technology promote in medicinal services trade is relied upon to cross USD 500
million by 2022 [3]. In spite of the fact that BC technology is consider to have prospec-
tive for genuine development of healthcare information frameworks [4], the ongoing
publicity of this technique likewise involves ridiculous proposition and thoughts and
current writing gives little outline of utilizations that have been created, tried and
additionally conveyed.
This is significant to examine if the present exploration meet the desires to BC
technique inside medicinal services, healthcare sciences and healthcare education
(from after this, alluded to as “the wellbeing do-fundamental”). This investigation
aims to deliberately survey, evaluate and synthesize distributed companion inspected
examines where BC has been used to get better process and service inside the health-
care domain. It is an exceptionally energizing time domain for healthcare sector and
IT sector. Because of enhancements in genetic research area and the advancement of
exactness medication, health care is seeing an imaginative way to deal with disease
prevention and treatment that joins an individual patient’s genetic cosmetics, way of
life and condition. At the same time, IT advancement has delivered enormous infor-
mation bases of health information, given devices to follow health information in
their health care. Joining this advancement in health care and information technology
would promote transitive changes in the IT sector of health.
The American Recovery and Reinvestment Act required all open and private health
care suppliers to adopt electronic clinical records (EMR) by January 1, 2014, to keep
up their current Medicaid and Medicare repayment levels. This EMR command
prodded huge development in the accessibility and use of EMRs. Be that as it may,
by far most of these frameworks can’t share their health information. BC technology
can address the challenges in present health IT frameworks and act as a specialized
standard that empowers people, health care suppliers, health care elements and clin-
ical researchers to share electronic health information securely. This paper portray a
BC-based admittance control administrator to health records that would advance the
business interoperability challenges communicated through the Office of the National
Coordinator for Health Information Technology’s. Interoperability is additionally a
basic segment of any framework supporting Patient Centered Outcomes Research
(PCOR) and the Precision Medicine Initiative (PMI). A public health IT foundation
dependent on BC has sweeping potential to advance the improvement of exactness
medication, advance clinical research and welcome patients to be more responsible
for their health. BC is considered as a record framework that helps with overseeing
and putting away information in various blocks which will work essentially decen-
tralized way above any processing systems and connecting utilizing cryptography.
The BC capacities have a capability of more extensive acknowledge [5].
6 Blockchain Technology in Healthcare: Opportunities and Challenges 99
The Blockchain can be depicted as a changeless record that logs information passages
in a decentralized way. It empowers substances to connect without the nearness of a
focal confided in an outsider. The BC keeps up a constantly developing arrangement
of information passages, bundle mutually into block of information. Such types of
blocks are connected to the past and future blocks with the cryptographic conventions
[7] after the acceptance to BC. In blockchain’s unique structure, these information
blocks are lucid, writable and sealed by all. For example, permits de-unified transac-
tions and information management. Because of these properties, BC has increased a
lot of consideration for different applications.
BC is a shared (P2P) dispersed record technology for another generation of trans-
actional applications that build up transparency and trust. BC is the basic texture
for Bitcoin and is a plan design comprising of three principal parts: a distributed
network, a shared ledger and digital transactions [8].
This technological arrangement works chiefly in a decentralized way to perma-
nently store computerized information. This plan makes a change of the informa-
tion incomprehensible [9], when record in block, the information can’t be adjusted
without modification of every subsequent block, requiring a consensus of the network
greater part. In contrast to conventional approaches to store information on one essen-
tial issue, the BC utilizes a distributed (P2) network include many duplicate of analo-
gous information that are put together in a range of areas and different gadgets [10]. A
friend permits a bit of figuring assets (for example, processing powers, circle stock-
piling, network bandwidth etc.), that to utilized for different participant, exclusive
of their prerequisite for inner management through workers. Similar type of hubs
may take various jobs during guaranteeing conservation of business information
exchanges within the network system [11].
100 S. Dash et al.
As delineated in Table 6.1, there are, for the most part, three sorts of blockchains:
open (permissionless) or public, consortium or grouping and private or confidential
[15]. They have various attributes concerning who can get to, compose and read the
information on the BC. All can see the information in an open chain, and anybody may
join and add to both consensus (in principle) and change to the centre programming
feature. The open BC is broadly utilized in cryptocurrencies. There are two major
cryptocurrencies which include Ethereum and Bitcoin, are sorted as open, permission
less chains. A consortium BC can be considered partially concentrated, with just a
predetermined number of selected gatherings of substances approaching perspective
and participate in the consensus convention. In a private BC, the network is dispersed
at this point frequently unified. Blockchain can be Public or Private relying upon the
6 Blockchain Technology in Healthcare: Opportunities and Challenges 101
consent level [16], however here we comprehensively group it to three distinct degrees
of granularity.
Open or public BC is permissionless, and anybody can undoubtedly participate
and approve the transactions. Transactions are open and unknown/pseudonymous.
The open network keeps up the blockchain, so there is the most significant level of
decentralized trust. Bitcoin is the pioneer open blockchain. Bitcoin, Ethereum.
Unified or Grouping BC, A united BC, is a permission BC working under the
leadership of a gathering regularly called the consortium. Predefined consortium
hubs control the consensus. The transactions could be open.
Private or confidential BC, A private BC, is a permission BC concentrated to
one administering organization. Transactions are approved inside and might be open
coherent. Private BCs generally have quicker block times and can process higher
transaction throughput. Nonetheless, these are defenceless against security breaks.
The estimation of private BC can be viewed as a trust transformer where trust depends
on a calculation instead of power.
2. From the recent consensus model, each participant claims an individual genesis
block and the consensus is just reached among the parties engaged with the trans-
actions. This nearby consensus minimizes the capacity necessities on singular
hubs and is generally more adaptable than worldwide consensus. The various
BCs models are Nano and TrustChain.
The majority of the current blockchains employ some form of the consensus
gathering of the Bitcoins called Nakamoto consensus [17]. The Nakamoto consensus
is a worldwide consensus model; it utilizes proof of work (PoW) for accepting the
new block and direct to choose the greatest chain if there ought to be an occurrence
of network partitions. The Proof of Stake (PoS), is a process to select an favorable
node that is determined in the BC. As per crypto-currency, the stake is the balances
of a given currency. Due to its advancement, several hybrid PoS models have been
proposed to select the approving node in BC. Nowadays, the ethereum is also setting
up to shift from PoW to PoS. Hyper-ledger Fabric currently uses the PBFT process.
The comparison of the above-said process is explained in the table (Table 6.2).
Regardless of the gigantic potential, there are restrictions as of the current condition of
the BC. The scaling issues that BCs need are to defeat for more extensive adoption
of overall businesses. Also, with the development in utilization, the size of BC is
expanding colossally, making it hard for ordinary clients to keep its full duplicate
6 Blockchain Technology in Healthcare: Opportunities and Challenges 103
copies. In addition to that, with the tremendous venture and research endeavors put
into BC [18], a superior, versatile BC may develop later on.
Healthcare sector is an issue-driven, data and faculty intensive domain where the
capability to get to, alter and trust the information rising. While working together
with educational institutions, the healthcare division must give admittance to patients
and give a field to preparing so understudies can create and refine the essential abil-
ities. Consequently, the educational foundations furnish the segment with a quali-
fied workforce. While working together with foundations and organizations with a
research and designing plan, health establishment ought to help with giving admit-
tance to experts, informants, tests and test people. Consequently, the investigation and
designing foundations furnish the healthcare with refreshed information, instruments
and strategies. Figure 6.1 depicts the different data mapping strategies in healthcare
sector.
The significance of the supply chain in the clinical business couldn’t be more critical.
Directly from the crude materials and creation, to various phases of capacity and
appropriation, legitimate observing and following are needed to guarantee ideal and
expected use. BC gives an entirely fitting answer for this requirement for following
and following, where this information kept up in an open yet protected and carefully
designed framework available to numerous parties.
Telemedicine is an additional zone in the healthcare sector which can make a profit
by the use of BC technology by presenting a trust layer among patients and healthcare
experts. BC-based telemedicine strategy can approve proficient personality and infor-
mation honesty, guarantee transparency and boost the participants to act reasonably
by giving intensive measurements. Inside telemedicine, the distant demonstrative
services might be at bleeding edge of BC adoption. It very well may be familiar
that demonstrative services exclusively dependent on the quantitative and subjective
translation of clinical information without a patient requires first to adopt BC tech-
nique [20] effectively. A large number of new businesses are focusing on the services
where the analysis of an ailment depends on the translation of patient-generated
imaging information, for example, dermatology.
An organized writing search on the point led in the accompanying bibliographic infor-
mation bases. We began the survey by gathering papers from two sources that includes
Google Scholar and academic information bases. Generally speaking, we play out
the pursuit in 14 diary information bases identified with information frameworks
and healthcare and remembered distributed papers. The inquiry system compro-
mised looking for liberated text conditions for the idea “BC” inside the health theme
information bases. Where as in different information bases, the idea “BC” joined
with the idea “health” utilizing logic AND. Inside the ideas, word variations and
other related conditions were secured and joined utilizing logic OR.
This total process is applied and considered when there is no availability of new
extra, essential paper. Through the data set inquiry, we have looked into more than
6 Blockchain Technology in Healthcare: Opportunities and Challenges 107
25 top healthcare, information frameworks and business diaries. The selected diaries
positioned as Q1 in the SCImago Ranked system that was our underlying premise
of incorporation in this survey report. All the references to the databases traded to
End Note for copy expulsion and last screening. The inquiry focused on distributed
research in academic diaries, meeting procedures that asses BC ideas inside the
health domain. To automate information assortment through information bases, we
built up content in R programming language that got to the diaries meta-information
utilizing Application Programming Interface (APIs) of the significant information
bases. The PRISMA structure indicates a proof-based least arrangement of things
for detailing in efficient surveys and meta-investigations. It broadly used in scholarly
examinations. The advantages of utilizing PRISMA for the examination permitted
to utilize rules to survey planned inquiries and utilize deliberate and unequivocal
strategies to find, select, and assess essential distributions to address the research
addresses recognized before.
Distributions are meeting the comprehensive standards, and those for which the prin-
cipal analyst was in question, were surveyed a second time by three extra commen-
tators. In instances of difference, a conversation between every one of the four
commentators decided inclusion or avoidance. The downloaded meta information
were examine freely by two autonomous additional researchers to investigate its
importance for the experiment. The articles those were not in English format were
barred. The selection technique is introduced in Fig. 6.3. The outcomes investi-
gated to deliver the last rundown of papers which incorporated 136 different full-text
manuscripts that met the inclusion criteria.
First of all, the related papers were includes in the information matrix, and from there,
the relevant data extracted. The extraction of data mainly done through 1st reviewer
and later they are re-examined by other reviewers. After that, these are summarized
and categorized in the information matrix. After that, these exported into tabular
and graphical representation format. Google Sheet is used for a fair work process
inside the research gathering and later sent out to Microsoft Excel for data storage.
Figure 6.4 depicts the proposed model for the analysis of patient’s health record.
of quality appraisal. The papers got a score with the range of 0 to 2 dependent on
the rules as per the information given in Table 6.3. The score was given as follows:
‘0’ is assigned for the NO or SCARCELY, ‘1’ is assigned for the MODERATELY
and the value ‘2’ is assigned for or ADEQUATELY or YES. The process of value
evaluation was finished by analyst one and later autonomously reassessed by other
reviewers.
6.5 Findings
the research zones generally obscured. The recognized three research zones propose
three parts of BC in healthcare life cycle, from thought generation dissemination and
execution. The study of the documents recognized the few significant themes that
current research confronts and openings for future and current advancement. The
utilization of structure of IPO permitted to arrange the discoveries to concentrate on
commercial issues, as opposed to the technological arrangement.
6.6 Conclusion
References
1. King, S., Nadal, S.: PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake (2012)
2. Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain
applications. In: 2017 4th International Conference on Advanced Computing and Communi-
cation Systems, ICACCS 2017 (2017). https://doi.org/10.1109/ICACCS.2017.8014672
3. Courtney, R.H.: Some informal comments about integrity and the integrity workshop. NIST
Special Publication 500 (1989)
4. Coiera, E.: Introduction and Course Organization (2015)
5. Levy, Y., Ellis, T.J.: A systems approach to conduct an effective literature review in support of
information systems research. Informing Sci. 9, 181–211 (2006). https://doi.org/10.28945/479
6. Hölbl, M., Kompara, M., Kamišali´c, A.K., Zlatolas, L.N.: A systematic review of the use of
blockchain in healthcare. mdpi.com (2018). https://doi.org/10.3390/sym10100470
7. Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T.: FHIRChain: applying
blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16,
267–278 (2018). https://doi.org/10.1016/j.csbj.2018.07.004
8. Zhang, A., Lin, X.: Towards secure and privacy-preserving data sharing in e-health systems via
consortium blockchain. J. Med. Syst. 42 (2018). https://doi.org/10.1007/s10916-018-0995-5
9. Rahman, M.A., Hassanain, E., Rashid, M.M., Barnes, S.J., Shamim Hossain, M.: Spatial
blockchain-based secure mass screening framework for children with dyslexia. IEEE Access
6, 61876–61885 (2018). https://doi.org/10.1109/ACCESS.2018.2875242
10. Guo, R., Shi, H., Zhao, Q., Zheng, D.: Secure attribute-based signature scheme with multiple
authorities for blockchain in electronic health records systems. IEEE Access 6, 11676–11686
(2018). https://doi.org/10.1109/ACCESS.2018.2801266
6 Blockchain Technology in Healthcare: Opportunities and Challenges 111
11. Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less medical
data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–14767
(2017). https://doi.org/10.1109/ACCESS.2017.2730843
12. Zhou, L., Wang, L., Sun, Y.: MIStore: a blockchain-based medical insurance storage system.
J. Med. Syst. 42 (2018). https://doi.org/10.1007/s10916-018-0996-4
13. Ekblaw, A., Azaria, A., Halamka, J.D., Lippman, A., Vieira, T.: A Case study for blockchain in
healthcare: “MedRec” prototype for electronic health records and medical research data White
Paper MedRec: Using Blockchain for Medical Data Access and Permission Management. IEEE
Original Author (2016)
14. Anjum, A., Sporny, M., Sill, A.: Blockchain standards for compliance and trust. IEEE Cloud
Comput. 4, 84–90 (2017). https://doi.org/10.1109/MCC.2017.3791019
15. Benchoufi, M., Ravaud, P.: Blockchain technology for improving clinical research quality.
Trials (2017). https://doi.org/10.1186/s13063-017-2035-z
16. Dagher, G.G., Mohler, J., Milojkovic, M., Marella, B.: Ancile: privacy-preserving framework
for access control and interoperability of electronic health records using blockchain technology.
Sustain. Cities Society (2018). https://doi.org/10.1016/j.scs.2018.02.014
17. Esposito, C., De Santis, A., Tortora, G., Chang, H., Choo, K.K.R.: Blockchain: a panacea
for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5, 31–37 (2018).
https://doi.org/10.1109/MCC.2018.011791712
18. Kruse, C.S., Goswamy, R., Raval, Y., Marawi, S.: Challenges and opportunities of big data in
health care: a systematic review. JMIR Med. Inf. 4, e38 (2016). https://doi.org/10.2196/medinf
orm.5359
19. Jahan Miah, S., Gammack, J., Hasan, N.: Accepted Manuscript extending the framework for
mobile health information systems research: a content analysis. Inf. Syst. (2017). https://doi.
org/10.1016/j.is.2017.04.001
20. Radanović, I., Likić, R.: Opportunities for use of blockchain technology in medicine. Appl.
Health Econ. Health Policy 16, 583–590 (2018). https://doi.org/10.1007/s40258-018-0412-8
Chapter 7
Blockchain in Healthcare System:
Security Issues, Attacks and Challenges
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 113
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_7
114 A. Sarkar et al.
7.1 Introduction
Within the economic system, the healthcare industry is the aggregation and inte-
gration of sectors that provide products and services for the treatment of patients,
including investigative, preventive, rehabilitation, and mitigates care. It involves the
generation and development of products and services that contribute to the mainte-
nance and rehabilitation of health. The modern healthcare industry has three essential
branches: (a) services, (b) products, and (c) finance. Different sectors and classes
rely on trained professionals and interdisciplinary teams in groups to meet the health
needs of people [1, 2]. The largest and fastest-growing industry in the world is the
healthcare industry [3]. Considering more than 10% of the gross domestic product
(GDP) of most developed countries, healthcare can become a big part of a country’s
economy.
In 2017, hospitals, physicians, nursing homes, diagnostic laboratories, pharma-
cies, medical device manufacturers, and other components of the healthcare system
accounted for 17.9% of the total gross domestic product (GDP) in the United States.
The health share of gross domestic product (GDP) is expected to reach 19.9% of GDP
by 2025 [4]. In 2001, OECD countries averaged 8.4%, followed by the United States
(13.9%), Switzerland (10.9%), and Germany (10.7%) [5]. The total health expen-
diture of U.S. healthcare in 2006 was 2.2 trillion [3]. According to the Department
of Health, in 2007 in the United States, for every woman, man, and child, expenses
US $ 7,498 was spent, which was 20% of all spending. Expenditure is projected to
increase to $ 12,782 by the year 2022 [6]. Blockchain is a type of distributed ledger
technology (DLT) and architecture platform launched in 2009 [7]. The concept was
first developed by Satoshi Nakamoto in 2008 [8]. Blockchain stores ledger informa-
tion as part of the infrastructure in a distributed and decentralized manner across all
participating devices [7]. Blockchain is a peer-to-peer based infrastructure, where
users participate in a network of transactions (participating in transactions) and miner
(facilitating transactions in distribution) [8]. In a decentralized network of nodes, the
ledger, which is created by cryptographic processes that compute all hash within
the network, is stored [7]. High-reliability storage capacity was also introduced by
the blockchain as it was built using a digital signature, hash chain and consensus
mechanism. It stores all information in a decentralized way [7]. Applications of
blockchain include banking, finance, real estate, and some areas related to govern-
ment, power, and energy, and IoT [9–11]. Some researchers have also been done to
the banking and finance sectors. Recently, the healthcare sector has been focusing
more on blockchain-enabled applications [11]. The ability to use blockchain tech-
nology to address current challenges in healthcare has been highlighted by many
researchers.
Nowadays healthcare involves lots of research in the blockchain. Google Trends
graph shows a recent interest in the field (see Fig. 7.1). It appears that many
researchers are interested in this field and it is growing day by day. Figure 7.2 shows
regional interest in blockchain in healthcare, where India is at the top of interested
countries.
7 Blockchain in Healthcare System: Security Issues … 115
Not only academic researches on blockchain in healthcare are going on but also
industries are very much interested to implement Blockchain in healthcare domain.
This chapter highlights a lists of industries which are involved to deploy the health-
care system using blockchain in practical world as follows: (a) Chronicled1 is a
Startup providing secure supply chain solutions, blockchain and the IoTs to power
1 https://www.chronicled.com/.
116 A. Sarkar et al.
The architecture of the blockchain is shown in Fig. 7.3 where every node is connected
in peer-peer manner and distributed way. Every node has the same ledger as the
network. In this network, some nodes may work as a member node and other nodes
as validator or works as both. In Fig. 7.3a, b, the public blockchain and the private
blockchain are shown respectively.
2 https://www.clinico.in/.
3 https://angel.co/company/coral-health-research-discovery-1.
4 https://www.curisium.com/.
5 https://isolve.io/.
6 https://medicalchain.com/en/.
7 https://patientory.com/.
8 https://pokitdok.com/.
7 Blockchain in Healthcare System: Security Issues … 117
There are four types of blockchain such as public blockchain, private blockchain,
consortium blockchain, and hybrid blockchain, are available. Bitcoin and Ethereium
are public blockchain, where as Hyperledger is private blockchain. In Table 7.1,
this section compares some well known Blockchain-Systems. Figure 7.4 shows the
architecture of Blockchain in Healthcare System where every hospital is connected
to each other. Every hospital also stores its local ledger. Authenticated data are
stored in cloud storage. Certifying Authority (CA) is used for authentication. In the
blockchain, cryptographic hash of the data is stored.
In the healthcare industry, there are specific requirements related to protection and
privacy due to additional legal requirements for the protection of patients’ medical
data. When medical records are shared in the Internet with the adoption of cloud
storage and mobile health devices, it compromises the risk of malicious attacks and
any personal information. Sharing and confidentiality of this information is a major
concern, including access to health information through smart devices and patients
visiting multiple physicians in many cities. Authentication, interoperability, data
sharing, treatment record transfer and considerations for mobile health are unique
requirements of the current healthcare industry.
118
The main protection requirements associated with health care and treatment data, are
access control, authentication, non-disclosure of records, ensuring the confidentiality,
integrity and availability of medical information [27, 28]. Treatment information is
treatment data such as patient files as well as treatment records that can be applied
and monitored. Access to health records requires strict access control to audit the
query and reduce the risk of duplication of those records (PHR- and personal health
records) used [29, 30].
There are many ways to secure patient data, but they are not proven to be as
accurate as they should be, and disseminating patient treatment data can lead to real
world significances (such as patients’ risk of confidentiality to malicious attacks)
[30, 31].
7.3.2 Interoperability
Data sharing and access are both safety issues and underlying health issues, including
health records [32]. Sharing healthcare records is sometimes difficult because a
person’s extensive records can be stored in different places [32]. Patients do not have
a unified view of these scattered records and are applied to healthcare providers, as
they do not have access to their patient data if these records are located elsewhere
[32]. Healthcare records are divided into individual hospitals, making it difficult to
distinguish between record connections that cannot be divided as entity-based enti-
ties because it is a common identifier [32, 33]. The main problem with data sharing
is interoperability.
7.3.4 Mobility
As patients become more mobile, mobility in the healthcare industry has emerged as
a necessity. Therefore patient records must be met with the same level of portability.
As smart devices, sensors and other Internet-enabled devices become more prevalent,
the ability to transmit that data becomes important. Furthermore, sharing data from
anywhere on any device raises the challenge of realistic sharing and ensuring that
data is protected by law for access. The concept of mobility is divided into three
different categories: mobile health, wireless and IoT.
For the above requirements, we need some solutions to protect our health informa-
tion and interoperability, data sharing and data mobility. The purpose of this chapter is
to discuss blockchain implementation and how it will benefit the healthcare industry,
as well as the challenges and problems that the industry faces. We also discuss some
research guidelines in the context of blockchain in healthcare.
7.4 Applications
Healthcare industry faces challenges in the form of patient data management in from
unprofessional medical knowledge transmit to personalized medical care. Blockchain
helps professionals better manage these circumstances. The most important problem
in this case is that the patient does not have full ownership of his own data. Medical
7 Blockchain in Healthcare System: Security Issues … 121
data may be used or shared without permission. Blockchain can solve this problem
by collecting patient records and by storing it in the organization’s internal database.
Blockchain addresses this issue via smart contracts for access to patient data regulated
by patients and their respective regulations. Thus, a patient can share his medical data
on his own terms. Records may be kept anonymous or completely transparent for
research purposes depending on the needs of the patient. Also, by adding particular
rules to these smart contacts, a patient could share health information and sensor
readings (from a smart watch) with physician to personalize long-term care and
achieve efficient and optimal results.
Medical sector needs to be able to fully track their supply chains from suppliers and
suppliers to their manufacturing facilities. A producer identifies a produced drug—
creates a “hash” and uploads the information the blockchain. Then, a merchant check
the product. A pharmacy worker can verify product proof at a later time before
selling it. Finally, any people purchasing a medicine can trustly examine its source
and production history. Short-term detection of counterfeit drugs or prescriptions
not only helps medicine manufacturers/sellers financially, but can actually save a
patient’s life. The scalability of this problem is astonishing, as the fake drug business
itself has become a $75 billion industry. So many initiatives has been taken to develop
Ethereum-based Mediliogar project, supported by industry leaders such as Genertech
and Pfizer, have launched a drug tracking solution aimed at optimizing medicine
supply chains and reducing fake products.
processing the request and the trigger responsible for translating tasks from the
smart-contract environment. The third level is the data structure and the progress
level, which consists of individual components that assist in the process of accessing
data from existing database infrastructure through multiple entities. These units are
the verification, processing and minimization nodes: smart contract, smart contract
permission database and blockchain network.
Database infrastructure layer is the last layer, which includes database systems
already installed by individual parties to perform precise tasks. Medicare [31] has
proven that it adds a level of protection to cloud-based communications through its
protection. However this increases delay as the number of requests for cloud-based
services (key limitation of the system) has increased.
Though, MeDshare was capable to make a level of trust and data prowess, but
there was a significant amount of delay and downside to adding or retrieving data.
The issue of content management and retrieval was also not addressed.
Smart Contracts in Medshare
A smart contract performs as a finite state machine that executes instructions to
activate an exploit based on examples. Smart contract is employed to report the
activity is performed by a requester on the information requested from a data propri-
etor’s system (See Algorithm 1). The data reported on the data proprietor’s system
is indexed, processed, and transmitted to a blockchain network. In some cases, the
report is used to save and request and use the Smart Contract Permission Database
where the data used by the requestor contains a set of data owner tasks. Data is
indexed based on the requested and used data id where the data owner’s set of tasks
is applied by the applicant. The main verbs used in the smart contract are set; Read,
delete, copy, write, and remove. These actions when performed on the data will
trigger a smart contract to send a report based on established rules for that particular
data. For Activity Monitoring, a contract is published in smart contract scripts by
getAction. Data sensitivity is classified into two levels; High and low. These levels of
sensitivity are processed by sensitivity reduction nodes based on the data set obtained
from the database infrastructure. Depending on the sensitivity of the package, some
of the steps taken in the data are either excluded from the infringement list or act as
7 Blockchain in Healthcare System: Security Issues … 125
infringements. The agreement requires that all actions performed in the data classi-
fied at the beginning of getAction should be reported for effective monitoring of the
activities performed so that data breaches can be detected. The identification required
to facilitate efficient identification of unique blocks is categorized into specific data
by a requestor, the data owner, and the transmitted data. The advantage of mentioning
these in the smart contract is to create an effective way of processing and matching
the sensor quantities and process nodes and verify specific blocks. Comments are
generated in the form of statements to describe the work done in the data. These
typically combine the retrieval statement with an antenna statement to remove an
encryption key, which will be reported to the data owner’s Smartphone database
to remove the encryption comments. An encrypted process is used to finalize this
process. In smart contract scripts, the act of reporting and sending comments to the
reporting subordinate nodes is quickly removed with a report statement. The function
represents the permissions set by the access control data owner that will be executed
simultaneously with the smart contract permissions database. In violation of the data
agreement, data access is revoked and the data owner has a pending review, with the
option to access the request or retrieve the data from the request.
11. Exit();
12.else if (Sensitivity = = Low) then
13. Action ← Action_get(); /* Not exemptions on data (violation) */
14. comment ← Comment_get(); /* Data violation concatenated with
DataID */
15. AccessControl(); /* Revokes access to data */
16. retrieve (Key.OwnerID);
17. comment ← Comment_get();
18. Encrypt(comment);
19. Genreport ← {comment || RequestorID || OwnerID};
20. Exit();
21. else /* i.e., Sensitivity = = High */
22. Action ← Action_get(); /* Violation */
23. comment ← Comment_get(); /* Data violation concatenated with
DataID */
24. AccessControl(); /* Revokes access to data */
25. retrieve (Key.OwnerID);
26. comment ← Comment_get();
27. Encrypt(comment);
28. Genreport ← {comment || RequestorID || OwnerID};
29. Exit();
30. end if
Other researches on healthcare system are enlisted in Table 7.2. Table 7.2 also
mentions the challenges and benefits of the respective applications.
nodes, it can capture the concept of the original malware and present its own variants
for the node.
Man in the middle attack—In this attack, the attacker is secretly related and warns of
possible communication between two parties who believe they are communicating
directly with each other.
Sybil attack—When the Eclipse attack is directed at the actual leader of the user, the
Sybil attack targets the whole network. In a Sybil attack, an attacker would try to
persuade the network by flooding the network with many nodes under a pseudonym.
Although these nodes are not related, the back appears to be operated by a single
operator. The purpose is not to target any user, but to have multiple nodes or networks
as a whole and, if possible, to allow the attacker to double the cost and carry out
other attacks making a fork.
The DAO attack: The “DAO hack” is the biggest exploit in the history of cryp-
tocurrency. The decentralized autonomous body Etherium had aspiring features. The
project called “The DAO” started gathering crowds by an organization called Slok.
This Crowdfunding, collecting 12.7 million ethers valued at $ 150 million (then $
2.2 billion), received a strange response. Then an attacker identifies susceptibility in
the code that allows repeated withdrawals to be performed without examining the
agreement of the ongoing transaction. As a result, the attacker started the attack by
giving a trivial amount and requesting a withdrawal with a repetitive task. This way
he was able to draw about $70 million dollars from crowdfunding. Then it turned
to an interesting event. The attacker was pressurized by the Ethereum Foundation
to stop the attack and give away the account. Then the attacker replied that he was
playing by agreement and would violate the intervention agreement with a soft or
128 A. Sarkar et al.
hard fork, which he could take to court (attacker’s open letter). At last he called off
the attack. Later money was raised by the Ethereum Foundation to restore, though
the decision raised so many concerns about the sovereignty of the smart contract.
This hard fork is the result of two Etherium coins—Etherium and Etherium Classic
and lots of controversy.
Parity-Multisig-Wallet Attack: It was also the case of openness, including the
attacker’s hacked parity customer’s wallet, as a result of holding 500,000 ethers
(today $ 77 million). Wallet deals are supplementary logic that can be made in
the customer’s purse for regular automatic payments. For reducing gas or transac-
tion fees, Parity Multisig Wallet uses a central library agreement to operate (like a
multisig wallet bank having multiple owners). He did, however, leave some impor-
tant work open, which led to the attacker using vulnerabilities by adding his account
as the owner to the attacker’s library agreement, so that the attacker became the joint
owner for all wallets applied after the due date. He then started a kill function, which
was deposited in a wallet in the coin. They originally locked in $155 million as of
the day, forever on cryptographically in accessible wallets.
Finney attack: One has the opportunity to spend money if one can mine a block and
steal it with any of one’s transactions. If a mercantile accepts an unspecified trans-
action, you can transfer it to the previous trading currency. After that, you released
a previously mined block that was secretly placed before your new transaction was
confirmed.
Race attack: The slight variation of Finney’s attack is Race attack. In this attack
the attacker does not need to pre-mine the block with his transaction, which he
wants to spend twice as much. During an attack, the attacker submits an unscheduled
transaction to a merchant (victim) as well as another transaction he transmits through
the network. If the attacker is directly connected to the merchant’s node, it is easy
to launch the attack. This will give the merchant the idea that his transaction is first,
but the attacker never submits to the blockchain network.
51% Attack: When a miner or mining group controls the mining power of a blockchain
network by 51% or more, then this type of attacks happened. While this is very
difficult for large networks, it is 51% more likely to occur in smaller networks. It can
foil certain transactions or even reverse old transactions if a group has majority have
power over transactions on a blockchain network.
Timejack attack: In some blockchain networks, the nodes rely on internal time
derived from median times, as indicated by their peer nodes such as bitcoins. For
example, you depend on your friends to find the time. We say that an attacker puts
lots of malevolent people on your friends list, and then he can handle your time. An
eclipse attack on the target node may be the first stage of this attack. After completion
of this attack on the target node, the target node will not receive the block from the
actual network because the timestamp of the block will not match its timestamp. This
allows the attacker to spend twice as much or transact with the target node because
these transactions cannot be stored on the original blockchain network.
7 Blockchain in Healthcare System: Security Issues … 129
Mining malware: The computing power of victims’ computers is used by the malware
to hack crypto currencies for the hackers. The malware infected more than a million
computers and assisted the attackers with 26 million tokens of a variety of crypt
currencies.
Selfish mining attack: It is considered that the longest chain is the latest version of
the ledger in many blockchain. Then a selfish miner might try to put the building
block in furtiveness mode over the existing chain, and when he can lead two or
more blocks in the network compared to the current chain, he reveals his personal
fork which will be accepted as a new truth because it is the longest chain. He can
transact on public networks before releasing his long stealth series as opposed to
newly transacted. This effectively gives the attacker a small window to do double
spending to make stealth chains by making enough blocks lead (Finney attack).
Blockchain technology is on the rise, it is not yet fully developed and it has many
potential challenges, which should be taken up for the healthcare industry.
Transparency and confidentiality: The first challenge is transparency and confiden-
tiality. All are visible to everyone on the blockchain network. Medical data needs to
be stored off-chain itself and only tag information in a blokchain.
Speed and Scalability: Speed and scalability is the second biggest challenge.
Blockchain transactions are much slower than credit card transactions. The number
of transactions in the healthcare industry is very high. So the blockchain revolution
has to endure this momentum.
In a blockchain-based system, node is a important component It is the basis
of technology that represents every entity connected to the network. Logarithmic-
associative, if more nodes are added to the network, the inter-node latency increases
with each additional node. In addition, the resources considered in the IoT envi-
ronment increase the number of nodes. As the number of members or patients
in the system increases, so does the difficulty of running blockchain-based appli-
cations. Subsequently, the perceived need for whole blockchain infrastructure has
increased.Thus, it is important for research and judgment to ensure that blockchain
applications are effective [19]. Light weight nodes known as partial nodes rely
on complete nodes to perform tasks. Although there is no need to save the entire
blockchain, the more number of light nodes can considerably increase the workload
on blockchain servers. As a result, flow of blockchain applications and the scalability
will be damaged. Blockchain involving a large participants or community has high
reliability and gives higher reliability and higher security. However, as the number of
organizations increases at each stage, this participation will decrease performance,
which requires multiple computer resources. In particular, although the definition of a
large population is a major problem, it has not yet been addressed or adequately tested.
130 A. Sarkar et al.
Finally, one of the most promising featured applications in the healthcare industry is
the blockchain technology. This is due to the most powerful mastery of the blockchain
technique in the area of healthcare, such as: security, integrity, decentralized nature,
readiness, and truly general account of infrastructure related to the blockchain. The
healthcare industry is facing of problems for a rising technology framework, focusing
on IoT, Internet-enabled, devices, sensing devices and smart devices. These technolo-
gies enable the healthcare industry to serve its patients in a growing world, malicious
actors can access and copy data on these technologies as well as exploit vulnerabilities
(as well as process and users), leading healthcare organizations to share information
harder. There may be outdated data that may result in misdiagnosis or health prob-
lems and also problems to verify patient’s identity. The healthcare sector has a clear
ability to use blockchain technology to solve many such current problems. Present
applications focus on issues of record sharing, authentication, usability, integrity,
IoT protection, patient empowerment and edge host protection. The objective is to
provide ownership and patient’s control of sharing their own treatment data. Though
7 Blockchain in Healthcare System: Security Issues … 131
so much progresses for smart phone applications and medical applications, there are
still clear security problems, because blockchain is not without possible challenges.
The industries including healthcare those who wants to use blockchain-oriented tools
may need to continue to study these areas and help to create an advanced ecosystem
to create better patient-oriented data empowerment. The possible future direction of
the research areas as follows:
Research is to be done to focus on precise blockchain-linked attacks and issues,
such as blockchain and the encouragement of blockchain mining. Research is to be
done in the area of blockchain-oriented scalable healthcare. It is a major problem
because healthcare industry is growing fast, especially as our society is growing. As
blockchain-oriented application systems grow, it will become increasingly difficult
to run when the number of members or patients grows with time. Further research
with real-world datasets is needed for allowing other researchers to check results and
disseminate results from open-source. Many should focus on experimental concepts
and explore opportunities that will help us to use real-world healthcare records to
assess proposed systems (for performance, safety, privacy-protection and scalability)
to help health organizations and researchers. More research should be done on protec-
tion and key management that will able to replace easily compromised or lost keys.
Also research should focus on identity verification opportunities. Many tests focus
on allowing the patient to be able to access the patient’s data in advance, but in
emergency there should be backup plans that can be used to allow doctor to access
data without permission. The blockchain has many advantages that can be applied
to solve various problems in the field of healthcare data sharing and protection. But
blockchain which is not a solution can be enforced under any circumstances. As an
alternative, we should focus on specific blockchain issues and an evaluation of how
they are affecting the healthcare industry. The mining incentives issue, which is the
central part of blockchain, has not been totally considered in the healthcare industry
and also there are some specific blockchain attacks that could dissuade the entire
system.
References
7. Zhao, H., Zhang, Y., Peng, Y., Xu, R.: Lightweight backup and efficient recovery scheme for
health blockchain keys. In: 2017 IEEE 13th International Symposium on Autonomous Decen-
tralized System (ISADS), Bangkok, pp. 229–234 (2017). https://doi.org/10.1109/ISADS.201
7.22
8. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
9. Ølnes, S., Ubacht, J., Janssen, M.: Blockchain in Government: Benefits and Implications of
Distributed Ledger Technology for Information Sharing. Elsevier (2017)
10. Sullivan, C., Burger, E.: E-residency and blockchain. Comput. Law Secur. Rep. 33(4), 470–481
(2017)
11. Beninger, P., Ibara, M.A.: Pharmacovigilance and biomedical informatics: a model for future
development. Clin. Ther. 38(12), 2514–2525 (2016)
12. “Ethereum,” Dec. 2017. [Online]. Available: https://www.ethereum.org/
13. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project
Yellow Paper 151, 1–32 (2014)
14. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart,
D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B.,
Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolic, M., Cocco, S.W.,
Yellick, J.: Hyperledger Fabric: a distributed operating system for permissioned blockchains.
In: Proceedings of ACM EuroSys’18, Porto, Portugal, pp. 30:1–30:15 (2018)
15. “Litecoin: An open source P2P digital currency,” June 2018. [Online]. Available: https://lit
ecoin.org/
16. Schwartz, D., Youngs, N., Britto, A.: The Ripple protocol consensus algorithm. Ripple Labs
Inc White Paper 5 (2014)
17. Goodman, L.: Tezos: A self-amending crypto-ledger position paper, Aug
18. Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash:
Decentralized anonymous payments from Bitcoin. In: Proceedings of IEEE SP’14, San Jose,
CA, USA, May 2014, pp. 459–474
19. “SawtoothLake”, June 2018. [Online]. Available: https://sawtooth.hyperledger.org/docs/core/
releases/1.0/introduction.html
20. Morgan, J.: Quorum, June 2018 [Online]. Available: https://www.jpmorgan.com/global/
Quorum
21. “Monax,” June 2018. [Online]. Available: https://monax.io/. 2014. [Online]. Available: https://
tezos.com/static/papers/positionpaper.pdf
22. Brown, R.: Introducing r3 cordatm: a distributed ledger designed for financial services. R3CEV
Blog (2016)
23. “kadena,” June 2018. [Online]. Available: https://kadena.io/
24. Martino, W.: Kadena: The first scalable, high performance private blockchain. White Paper
(2016)
25. Popov, S.: The tangle, Oct 2017. [Online]. Available: https://iotatoken.com/IOTAWhitepaper.
pdf
26. Churyumov, A.: Byteball: a decentralized system for storage and transfer of value (2016).
[Online]. Available: https://byteball.org/Byteball.pdf
27. Kshetri, N.: Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecom.
Pol. 41(10), 1027–1038 (2017)
28. Khan, S.I., Hoque, A.S.L.: Privacy and security problems of national health data warehouse: a
convenient solution for developing countries. In: 2016 International Conference on Networking
Systems and Security (NSysS) (2016). https://doi.org/10.1109/NSysS.2016.7400708
29. Suzuki, S., Murai, J.: Blockchain as an audit-able communication channel. In: 2017 IEEE 41st
Annual Computer Software and Applications Conference (COMPSAC) (2017). https://doi.org/
10.1109/COMPSAC.2017.72.
30. Xu, J.J.: Are blockchains immune to all malicious attacks? Financ. Innov. 2(1), 25 (2016)
31. Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less medical
data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–14767
(2017). https://doi.org/10.1109/ACCESS.2017.2730843
7 Blockchain in Healthcare System: Security Issues … 133
32. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data
access and permission management. In: 2016 2nd International Conference on Open and Big
Data (OBD), Vienna, pp. 25–30 (2016). https://doi.org/10.1109/OBD.2016.11
33. Roehrs, A., da Costa, C.A., da Rosa Righi, R.: OmniPHR: a distributed architecture model
to integrate personal health records. J. Biomed. Inf. (2017). https://doi.org/10.1016/j.jbi.2017.
05.012
34. Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: 2016 IEEE 18th
International Conference on e-Health Networking, Applications and Services (Healthcom),
Munich, pp. 1–3 (2016). https://doi.org/10.1109/HealthCom.2016.7749510
35. Zhang, J., Xue, N., Huang, X.: A secure system for pervasive social network-based healthcare.
IEEE Access 4, 9239–9250 (2016)
36. Samaniego, M., Deters, R.: Hosting virtual IoT resources on edge-hosts with blockchain. In:
2016 IEEE International Conference on Computer and Information Technology (CIT) (2016).
https://doi.org/10.1109/CIT.2016.71
37. Siddiqi, M., All, S.T., Sivaraman, V.: Secure lightweight context-driven data logging for body-
worn sensing devices. In: 2017 5th International Symposium on Digital Forensic and Security
(ISDFS) (2017). https://doi.org/10.1109/ISDFS.2017.7916500
38. Shae, Z., Tsai, J.J.: On the design of a blockchain platform for clinical trial and precision
medicine. In: 2017 IEEE 37th International Conference on Distributed Computing Systems
(ICDCS) (2017). https://doi.org/10.1109/ICDCS.2017.61
39. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare
intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016).
https://doi.org/10.1007/s10916-016-0574-6.Epub. 26 Aug 2016. PMID: 27565509
Chapter 8
Application of Blockchain as a Solution
to the Real-World Issues in Health Care
System
Abstract Blockchain technology now a day is becoming a more secure and effective
way for information sharing in various areas such as the financial sector, SCM in
different industries, and in the field of IoT as well. Along with these fields currently,
blockchain technology is playing a vital role in the field of Health Care System. This
technology brings the attention of the researcher toward the health care system as it
aims to solve various issues such as interoperability and information security during
the information sharing and data management. The interoperability and security
enable the HCS application to share the information flawlessly among the patients
and vendors. Lack of such characteristics finds out the difficulty for the patient in
accessing its own health status. Hence, implementing blockchain technology will
demolish such a disadvantage for making the HCS more effective and efficient.
Because of this kind of potential benefit, it can be applied to various aspects such as
patient data handling, SCM of medical equipment and pharmaceutical things, billing
and telemedicine systems, etc. In this book chapter, we have tried to focus on the
various issues present in the HCS along with the detailed study of potential benefits
that have been achieved while integrating the blockchain with the health care system.
Also, in this chapter represents the systematic review of various use case scenarios
for blockchain in healthcare practice.
A. Panigrahi (B)
ITER, SOA University, Bhubaneswar, Odisha, India
B. Sahu · S. S. Panigrahi
Department of CSE, Gandhi Institute for Technology, Bhubaneswar, Odisha, India
M. S. Khan
Department of IT, College of Engineering and Technology, Bhubaneswar, Odisha, India
A. K. Jena
School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 135
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_8
136 A. Panigrahi et al.
8.1 Introduction
IoT and health care system, etc. Blockchain along with DLT can contribute various
advantages to the medical industry. Blockchain innovation’s different highlights like
decentralization, security, protection, bitcoin, and smart contracts by means of cryp-
tographic calculations [7] have the ability to address the current issues of the clinical
and health care segment. It can ease dependence on a solitary incorporated position
which is more helpless against mistake and frailty. The interoperable framework of
blockchain will upgrade the information trade among different health care points to
improve coordination, QoC, advancements, and market rivalries emphatically [8].
This problematic innovation could possibly resolve the issues of fake medications and
billing systems as it gives chronicled data to follow the root of exchanges making
all the activities straightforward [9]. This innovation can change over the current
expensive frameworks to cost-saving or even cash creating frameworks [10] as the
clients are remunerated with advanced money as a motivating force for their commit-
ment. A blockchain-based foundation can be conceived for improved decentralized
maintenance of different patient and other health-related records, information trade.
Blockchain has a huge potential to change the current medical services foundation.
Be that as it may, there are a few difficulties that have been distinguished such as
security, confidentiality, and sustainability [11].
Table 8.1 will represent the detailed study of research work that has been done in the
blockchain in the health care system.
Blockchain consists of 3 main components such as Block, Node, and Miners. Block
will contain 3 things data, nonce, and hash value. Miners are responsible for creating
the new blocks in the network and the process is known as mining. While creating
the new block the hash value of the previous block needs to be taken care of and
referenced [15]. Along with the creation of new block miners also take part in solving
the NONCE to become the authority for sanctioning a transaction. Miners use dedi-
cated software for solving the NONCE problem. For modification in any block needs
remaining as all of the blocks that will come after the intended block. When a block
is being mined successfully then every node present in the network will agree on
the same value and the miner will be financially awarded [16]. Node is the most
important factor in blockchain technology. Nodes are the electronic device that will
maintain the DLT and keeps the network in functional mode. The nodes have their
copies of blockchain and the network must approve any kind of mining process that
is occurring inside the network. Since the blockchain is transparent so each operation
on the DLT has to be checked and viewed by every participant. Figure 8.2 describes
the working principle of the blockchain.
8 Application of Blockchain as a Solution … 141
When a miner or node wants to initiate a transaction then it creates a block that
contains the data, hash value along with the NONCE. After creating the block, it
immediately sends the block to the network for approval. Each participant will mine
the block and will try to solve the NONCE puzzle by using some dedicated software.
The node which will obtain the solution for the NONCE provided in the block will
have the authority for the current transaction. After approval from every participant,
the node which has created the block will forward it to the destination by including
the hash of the previous transaction [17, 18].
Traditional health institutes are utilizing outdated ways to handle health-related data.
The data includes patient health records, drug reports, patient insurance information,
etc. This outdated data handling will put an impact on patient treatment. Most of the
health care organization has its ways to deal with the health-related data which will
reduce the degree of transparency in between the patient and organization. Patient
health-related data are just like a puzzle that will lose its integrity and accuracy while
misconfiguring the data. A small change in the data will intend in improper treatment.
142 A. Panigrahi et al.
With the presence of a large number of patients, it is very difficult to handle those
data [19].
The use of blockchain will make a huge change in the data management system
which will enable the health care system to share the patient-related data more effec-
tively and securely. Blockchain can help to build up Blockchain clinical records.
This cuts away superfluous managerial expenses and furthermore takes into account
legitimate health information usage. Furthermore, the utilization of the blockchain
can lessen the need to go to the third party to administer the trading of indispensable
health information. Distributed Ledger Technology or DLT will be used in blockchain
for storage purposes [20].
DLT which stores the information in a permanent way and updates the data
progressively has been reshaping the health care area in entirety. The conventional
models in this scene end up being profoundly wasteful as far as conveying quality
medical services which are reasonable in nature by the people [21]. Blockchain-
based medical services applications are fit to be utilized and change the health care
establishments over the world. Blockchain works for improvising the transparency
and effectiveness, different groups are related to the health care framework, and
patients get profited. The administrative process is now a day simpler to oversee.
Improvement can be found in the business tasks utilizing the inventive innovation.
The customary medical service framework is moderate and costly and furthermore
includes different delegates into the framework; all such issues get settled with the
assistance of the blockchain technology [22]. The health care industry is generally
energized for changing to blockchain method. Change to a blockchain upheld health
care framework would reduce expenses and improve the security and interoper-
ability of wellbeing reports. The blockchain medical services genuine models and
cases utilize keen agreements which they could use so as to handle the medical proce-
dure receipts effectively and productively, and development of emergency clinic bills
among the medical clinic, understanding, and the protection supplier. A patient can
cooperate with a blockchain-based medical services framework so as to see every
one of his cases, clinical history, and past due installments effectively and in a supe-
rior way. With the assistance of smart contracts, the people can likewise utilize the
blockchain to plan and book appointments and commitment with their staff, which
can be begun when the enrollment sum is paid, and the specialist affirms accessibility
[23].
Proper clinical information management is one of the key points of interest to
Blockchain and medical care. Numerous issues influencing the medical services
industry, for example, interoperability, information fruition, misrepresentation, and
even information loss during a debacle, can be removed. Blockchain can do ponders
regarding the recovery process. Since health information wouldn’t be put away in a
solitary area, there wouldn’t be a primary failure point. In the event that any given clin-
ical office crumples because of some catastrophic event—health information would
be protected [24]. The capacity to guarantee that health information is right is basic
for the arrangement of suitable clinical administrations. Admittance to appropriate
clinical information guarantees that medical services suppliers can give legitimate
8 Application of Blockchain as a Solution … 143
diagnostics. This is additionally reinforced by the way that, when any informa-
tion hits a Blockchain, any modifications to it become almost inconceivable. It is
significant that clinical information can be put away in a Blockchain from different
sources like computers, wearable devices, mobile, etc. that can help in reducing the
expenses of clinical organizations. Another incredible territory in the medical care
part where Blockchain and medical services can see use is drug recognizability—
remedy detectability, however fake medications also. All information went into a
Blockchain that is unchanging and time stepped. This diminishes the opportuni-
ties for fake medications to hit the underground market, notwithstanding remedy
misusing [12, 25, 26].
This section will focus on all possible health care use cases where the blockchain
can be implemented (Fig. 8.3).
Electronic Medical Record (EMR) is the most important use case of the health
care system. As a unique and safe record of a patient is maintainable by using the
DLT. This DLT will contain all types of data such as test results, a list of medications
used during the treatment, prescription details, etc. for an individual patient which
is being stored in a decentralized network from where it can be accessed anywhere
anytime [27].
Prescription Compliance: Medicine provided to each different patient is costly and
millions of patients are being hospitalized. After treatment, the patient can visit the
hospital for a follow-up process. At that time the cost can be reduced to medicine.
Motivation can be accommodated any improvement in medicine through application
program interfaces (APIs) which will gamify the clinical solution taking cycle. Data
that can put away on the blockchain will be available to the two specialists and
patients [28].
Health Insurance: The patients are spending millions on the treatment. Health insur-
ance plays a vital role in bill settlement. By using the smart contracts, the validity,
and verification of the claim from the patient. After the verification, the claim will be
automatically done without including the third party. By using the smart contracts,
the degree of fraud towards the insurance sector reduces severely.
Personalized Patient Care: Due to the maintenance of DLT for an individual patient
which can be shared among the patient-related and the doctor for better treatment.
Supply Chain Management: The industries which are supplying medicines and
medical equipment to the hospitals for the treatment of patient have to maintain
a supply chain. When the same medicines are demanded again then the industry will
face difficulties to supply the corresponding medicine for the intended patient. By
using blockchain the industry is able to maintain the transaction history from which
144 A. Panigrahi et al.
easily the previous history can be found for the corresponding patient. Hence the
supply of wrong medicine will be reduced [28].
Clinical Trial: In the health care system many patients are there with different diseases
and their complexity. Hence the clinical trial is done on a patient with a goal to cure
the person. After each trial, the results are being stored along with the test result and
patient statistics which can be accessed by the researcher at any time in the future.
This will reduce the time to cure another patient having the same disease.
Payment Platform: The user can set the amount in the smart contracts which can
be automatically forwarded to the health care industry. The fund stored in smart
contracts can be used for emergency medical purposes.
Data Security: The patient data are stored in a block that needs to be shared between
the doctor and the patient. The digital ids are being used to authenticate the sender
and the receiver. As per the principle of blockchain technology, it is very difficult
to manipulate the data stored in the block. For modification, the NONCE has to be
solved and permission from each participant present in the network is being required.
Smart Contracts: The smart contract is a computer-based protocol which is being
automatically executed upon the requirement. Basically smart contracts come into
account in three different health care parts such as Insurance, Telemedicine, and
patient-related records. Smart contracts along with the blockchain represent the future
of the health care system. Smart contracts make the use of an encryption process for
secure data storage [29].
Biomedical Research: The clinical trials are stored along with the prescription and
medicine details which can be traced in the future for research purposes. The biomed-
ical researcher can retrieve the patient-centric data for improving the treatment
procedures which can reduce the time and the cost for the patient.
Patient-centric Information sharing: In the blockchain, the DLT is maintained for the
individual patient. Whenever necessary the DLT can be shared among the doctor and
the patient relatives for better treatment. While sharing the DLT five things need to
be taken care of such as aggregation, information liquidity, identity, the correctness
of the data, and access protocols for the secure exchange of DLT along with the
transaction history.
Interoperability: It has been focused on the health care system for exchanging the
data between the sender and receiver. Sender and Receiver can be the doctors, the
hospital management system, and the patients. FHIR or Fast Healthcare Interoper-
ability Resource indicates the data formats while sharing the patient-centric data in
a public API [30].
Trustable Clinical Data: The use of blockchain technology in the health care system
make sure about data safety during the transaction. Once the data has been stored
in the block it will be hashed and one NONCE will be added in order to secure the
data. Without solving the NONCE no miner can interfere with the data. For any kind
of modification, the miner or node needs the permission of all available participants
in the peer network. The block is publically stored at each node side [27]. So a
slight change in the data will create a different hash value that will mismatch with
the original hash that is being already stored at different participants. During the
transaction, the hash value will be cross verified, and if mismatched the transaction
will be strictly discarded. For any kind of modification, the miner needs to solve
the NONCE and the solution is to be submitted to the owner. After verification and
permission from every participant, the third party is allowed to change the data. In
this way, the patient and clinical data are safe when the blockchain is implemented
[16].
Health care system has various advantages as per the blockchain feature such as peer
network, cryptography, DLT, NONCE, smart contracts, trustworthiness, permission
transaction, hash function, etc., as shown in Table 8.2.
146 A. Panigrahi et al.
Along with the various benefits, it has several challenges such as storage capacity,
dynamic data, scalability issue, privacy, lack of interest, shifting the legacy system to
blockchain technology are making the scenario difficult in implementing blockchain
in the healthcare system. Table 8.3 shows the parameters along with the way they
are becoming the most prominent barriers in blockchain implementation.
8.6 Conclusion
Now a day the medical records such as prescription, test results, and analysis reports
are stored on a paper. Hence it can be easily deleted which will create a problem. The
solution is to store all data in the form of an electronic record. But the disadvantage is
having a centralized admin to maintain the record which is pruned to a single-point
failure. In this chapter, we have described the blockchain technology, its working
principle, and the key features for solving the issues of the traditional system. We
then defined the BCT for the healthcare system along with the use-case, benefits,
and challenges to accept the BCT as a real-world solution to the healthcare system.
Despite the several key benefits like cryptography, DLT, NONCE, and decentralized
nature, still, there are few drawbacks such as scalability issue, storage limit acts as a
barrier.
8 Application of Blockchain as a Solution … 147
References
1. Zhao, H., Bai, P., Peng, Y., Xu, R.: Efficient key management scheme for health blockchain.
CAAI Trans. Intell. Technol. 3, 114–118 (2018). https://doi.org/10.1049/trit.2018.0014
2. Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T.: FHIRChain: applying
blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16,
267–278 (2018). https://doi.org/10.1016/j.csbj.2018.07.004
3. Boulos, M.N.K., Wilson, J.T., Clauson, K.A.: Geospatial blockchain: promises, challenges,
and scenarios in health and healthcare. Int. J. Health Geogr. 17, 25 (2018). https://doi.org/10.
1186/s12942-018-0144-x
4. Tseng, J.-H., Liao, Y.-C., Chong, B., Liao, S.-W.: Governance on the drug supply chain via
Gcoin blockchain. Int. J. Environ. Res. Public Health 15, 1055 (2018). https://doi.org/10.3390/
ijerph15061055
5. Griggs, K.N., Ossipova, O., Kohlios, C.P., Baccarini, A.N., Howson, E.A., Hayajneh, T.: Health-
care blockchain system using smart contracts for secure automated remote patient monitoring.
J. Med. Syst. 42, 130 (2018). https://doi.org/10.1007/s10916-018-0982-x
6. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare
intelligence on blockchain with novel privacy risk control. J. Med Syst. 40, 453 (2016). https://
doi.org/10.1007/s10916-016-0574-6
148 A. Panigrahi et al.
7. Cichosz, S.L., Stausholm, M.N., Kronborg, T., Vestergaard, P., Hejlesen, O.: How to use
blockchain for diabetes health care data and access management: an operational concept. J.
Sci. Technol. 13, 248–253 (2018). https://doi.org/10.1177/1932296818790281
8. Nugent T., Upton, D., Cimpoesu, M.: Improving data transparency in clinical trials using
blockchain smart contracts. F1000 Res 5, 2541 (2016). https://doi.org/10.12688/f1000research.
9756.1
9. Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and
collaboration in mobile healthcare applications. In: Proceedings of the 2017 IEEE 28th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC),
Montreal, QC, Canada, 8–13 Oct 2017, pp. 1–5
10. Marefat, M., Juneja, A.: Leveraging blockchain for retraining deep learning architecture in
patient-specific arrhythmia classification. In: Proceedings of the 2018 IEEE EMBS Interna-
tional Conference on Biomedical & Health Informatics (BHI), Las Vegas, NV, USA, 4–7 March
2018
11. Zhao, H., Zhang, Y., Peng, Y., Xu, R.: Lightweight backup and efficient recovery scheme for
health blockchain keys. In: Proceedings of the 2017 IEEE 13th International Symposium on
Autonomous Decentralized System (ISADS), Bangkok, Thailand, 22–24 March 2017, pp. 229–
234
12. Fan, K., Wang, S., Ren, Y., Li, H., Yang, Y.: MedBlock: efficient and secure medical data sharing
via blockchain. J. Med Syst. 42, 136 (2018). https://doi.org/10.1007/s10916-018-0993-7
13. Al Omar, A., Rahman, M.S., Basu, A., Kiyomoto, S.: MediBchain: a blockchain based privacy
preserving platform for healthcare data. In: Human Centered Computing, vol. 10658, pp. 534–
543. Springer Nature, Basingstoke, UK (2017)
14. Liu, P.T.S.: Medical record system using blockchain, big data and tokenization. In: Human
Centered Computing, vol. 9977, pp. 254–261. Springer Nature, Basingstoke, UK (2016)
15. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data
access and permission management. In: Proceedings of the 2016 2nd International Conference
on Open and Big Data (OBD), pp. 25–30, Vienna, Austria, 22–24 August 2016
16. Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less medical
data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–14767
(2017). https://doi.org/10.1109/ACCESS.2017.2730843
17. Zhang, P., Walker, M.A., White, J., Schmidt, D.C., Lenz, G.: Metrics for assessing blockchain-
based healthcare decentralized apps. In: Proceedings of the 2017 IEEE 19th International
Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1–4, Dalian,
China, 12–15 October 2017
18. Zhou, L., Wang, L., Sun, Y.: MIStore: a blockchain-based medical insurance storage system.
J. Med. Syst. 42, 149 (2018). https://doi.org/10.1007/s10916-018-0996-4
19. Mytis-Gkometh, P., Efraimidis, P.S., Kaldoudi, E., Drosatos, G.: Notarization of knowledge
retrieval from biomedical repositories using blockchain technology. In: IFMBE Proceedings,
vol. 66, pp. 69–73. Springer Nature, Basingstoke, UK (2017)
20. Accenture: Percentage of healthcare payers and providers that reported select types of data
breaches as occurring most frequently as of 2018, 15. Statista. Statista Inc. (2020)
21. Afrooz, S., Navimipour, N.J.: Memory designing using quantum-dot cellular automata: system-
atic literature review, classification and current trends. J. Circuits Syst. Comput. 26(12),
1730004 (2017). https://doi.org/10.1142/S0218126617300045
22. Agbo, C.C., Mahmoud, Q.H., Eklund, J.M.: Blockchain technology in healthcare: a systematic
review. Healthcare 7(2), 56 (2019)
23. Ahmad, M.O., Dennehy, D., Conboy, K., Oivo, M.: Kanban in software engineering: a
systematic mapping study. J. Syst. Softw. 137, 96–113 (2018)
24. Al Omar, A., Bhuiyan, M.Z.A., Basu, A., Kiyomoto, S., Rahman, M.S.: Privacyfriendly plat-
form for healthcare data in cloud based on blockchain environment. Future Gener. Comput.
Syst. 95, 511–521 (2019)
25. Alla, S., Soltanisehat, L., Tatar, U., Keskin, O.: Blockchain technology in electronic healthcare
systems. IISE Annual Conf. Expo 2018(1), 754–759 (2018)
8 Application of Blockchain as a Solution … 149
26. Angelis, J., da Silva, E.R.: Blockchain adoption: a value driver perspective. Bus. Horiz. 62(3),
307–314 (2019)
27. Angraal, S., Krumholz, H.M., Schulz, W.L.: Blockchain technology: applications in health
care. Circ. Cardiovasc. Qual. Outcomes 10(9), e003800 (2017)
28. Arrieta, A.B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., García,
S., Gil-López, S., Molina, D., Benjamins, R., Chatila, R.: Explainable artificial intelligence
(XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fusion
58, 82–115 (2020)
29. Aznoli, F., Navimipour, N.J.: Cloud services recommendation: reviewing the recent advances
and suggesting the future research directions. J. Netw. Comput. Appl. 77, 73–86 (2017)
30. Badr, S., Gomaa, I., Abd-Elrahman, E.: Multi-tier blockchain framework for IoT-EHRs
systems. Procedia Comput. Sci. 141, 159–166 (2018)
31. Behera, R.K., Bala, P.K., Dhir, A.: The emerging role of cognitive computing in healthcare: a
systematic literature review. Int. J. Med. Inform. 129, 154–166 (2019)
32. Brogan, J., Baskaran, I., Ramachandran, N.: Authenticating health activity data using
distributed ledger technologies. Comput. Struct. Biotechnol. J. 16, 257–266 (2018)
33. Campbell, S.M., Roland, M.O., Buetow, S.A.: Defining quality of care. Soc. Sci. Med. 51(11),
1611–1625 (2000)
34. Casado-Vara, R., Corchado, J.: Distributed e-health wide-world accounting ledger via
blockchain. J. Intell. Fuzzy Syst. 36(3), 2381–2386 (2019)
35. Chattu, V.K., Nanda, A., Chattu, S.K., Kadri, S.M., Knight, A.W.: The emerging role of
blockchain technology applications in routine disease surveillance systems to strengthen global
health security. Big Data Cogn. Comput. 3(2), 25 (2019)
36. Cios, K.J., Krawczyk, B., Cios, J., Staley, K.J.: Uniqueness of medical data mining. In: How
the New Technologies and Data They Generate Are Transforming Medicine, arXiv preprint
arXiv:1905.09203 (2019)
37. Dagher, G.G., Mohler, J., Milojkovic, M., Marella, P.B.: Ancile: privacypreserving framework
for access control and interoperability of electronic health records using blockchain technology.
Sustain. Cities Soc. 39, 283–297 (2018)
38. Devadass, L., Sekaran, S.S., Thinakaran, R.: Cloud computing in healthcare. Int. J. Stud. Res.
Technol. Manag. 5(1), 25–31 (2017)
39. Dhagarra, D., Goswami, M., Sarma, P.R.S., Choudhury, A.: Big data and blockchain supported
conceptual model for enhanced healthcare coverage: the Indian context. Bus. Process. Manag.
J. 25(7), 1612–1632 (2019)
40. Dimitrov, D.V.: Blockchain applications for healthcare data management. Healthc. Inf. Res.
25(1), 51–56 (2019)
Chapter 9
UML Conceptual Analysis of Smart
Contract for Health Claim Processing
Abstract Block chain and current economic scenario allow decentralization of data
profile over peer to peer network. In this research work authors take the help of
UML (Unified modeling language) to build a framework for health insurance claim
processing that is using block chain to built smart contract. Smart contract application
in health insurance industry incorporate user profile, electronic medical record, health
insurance profile and linked bank agencies to automate claim settlement walk out on
any third-party control. Smart contract is providing a promising solution to support
insurance data validation over peer to peer transaction. Health insurance industry
is untangling power of smart contract. Embedding UML analysis for block chain
network build intelligence that showcase a conceptual processing of insurance data
transaction. Though substantial research work in this regard is going on in numerous
fields but still it needs more conceptual analysis before it’s real time implementa-
tion. So, in this experimentation authors pinpoint block chain basic UTXO (Unspent
transaction output) and UML test bed analysis for smart contract in health insurance
service. This meticulous research outcome is justified by factual analysis of block
chain. Moreover, it is given with context aware sequence analysis of smart contract
in health insurance.
Please note that the LNCS Editorial assumes that all authors have used the western naming conven-
tion, with given names preceding surnames. This determines the structure of the names in the
running heads and the author index.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 151
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_9
152 S. Mohapatra et al.
9.1 Introduction
Blockchain use case provide a specific level of security to any business model. In this
perspective block chain is associated with a huge context to untangle some common
security misconception [1]. Bit coin is offering certain common plan of security by
using proof-of-work algorithm. To add block in a transaction it must validate all
transaction block that is performed by repeated calculation which is called hashing.
It is combining with one famous technique i.e. commonly known as longest chain
rule to mine own subversive chain. There are three kind of blockchain (1) Public, (2)
Private, (3) Permission. In public block chain there is no need of approval that indicate
any one can read and write data over this network. If any discrepancies will happen
then no boss is allocated to solve this issue. For example, Bit con in this anybody can
join and leave without any restriction [2]. It is an open source wallet application. In
private block chain all the participant is known and trusted. Here access is provided
to limited number of participants. It can control access to business model. Now the
third-party permission block chain falls in this category it is collaborating with parties
for ease of governance ex-Automobile, health service industry. Bit coin and block
chain don’t provide any inherent security against read access Indeed block chain is
a mechanism that can copy data to all relevant participant in this way consensus is
achieved in network. Block chain is providing a remedial solution against hacking
espionage system. So, the fertile ground of hacking surface is ruined by block chain
application up to a remarkable extent. It is emerging as the most resilient technique
compared to centralized system Peer to peer transaction in block chain provide multi
redundancy.
Specifically, block chain introduces a vital concept of smart contract it consents
claim service of citizen from citizen to bank end. Furthermore, the aim of this
UML ontology in smart contract utilizes block chain technology. It supports peer
to peer policy access without any third-party access control. A number of block
chain researcher already working in this claim processing domain to verify different
aspect of autonomous claim governance system. But it still needs some compre-
hensive overview to further analyze characteristics of ownership in claim. In smart
contract intelligent business logic interact with each other autonomously to process
claim request. In mean time smart contract reduce market counterfeit and manual
processing of claim. Here in this research finding authors deal with a business proto-
type of smart contract through Unified modelling language-sequence diagram. This
prototype model provide solution in smart contract. It concentrates upon different
mode i.e. Bank, claim company, and peer group etc. By the use of smart contract
everyone would get a clear idea of claim processing path and company policy.
Despite of several advantages of smart contract majority of claim processing still
need external expert suggestion before being resolved. From the model point of
view authors has given a suitable choice to embrace a combination of public and
private block chain. The private block chain is suitable for tracking policy record
and claim, and the same time public block chain deal with refund of tradable crypto
9 UML Conceptual Analysis of Smart Contract for Health … 153
currency (e.g. Bitcoin, Ethereum). The above policy definitely holds company’s repu-
tation and trust. As we all know block chain work without intermediaries so no one
could steal claim credential of a person. In this research outcome authors has given
credential checking mechanism of citizen in terms of User id and pass word. This
paper provides precise analysis of participating nodes i.e. (Insurance company, Bank,
Person). Smart contract can exploit various business logic for technology enhance-
ment in health insurance claim industry. In addition to this smart contract authors
have sincerely tried to accomplish business logic for health insurance claim. This is
the future technology which gains momentum to exploit massive business opportuni-
ties in claim. Here authors have given certain future direction to extend smart contract
logic for back office transaction. It comprehends between insurers and re insurers.
Typically, when a claim is initiated insurer must verify its re-insurance content and
channelize the logic with re-insurers for re-insurance recovery. A smart contract
logic can be embedded on a block chain plat form to initiate recovery of transaction
instantly. Smart contract in health claim processing will gradually add new revenue
sources for micro level transaction. It is nothing but a pay per use insurance model
that reckon on public block chain.
So many organizations opt for this application because certain significance level
of security make it unique in compared to other application [3]. The underlying
significance i.e. cryptography and digital signature i.e. enforcing arbitrary read and
write access rights. So historical record adheres to transaction can’t be modified
easily. If anybody want to change this content that can be easily traced in block chain
as all the record hash is linked with previous block hash if one hash has changed then
it exhibits a wrong matching it is the underlying fashion of immutability in block
chain. In current scenario block chain is emerging as a box of technology from which
different item can be put in different ways to create different solution. For a easy
understanding one analogy is given block in block chain is compared with page in
a book as the page contains contents and header information in a similar way block
contains information and implicit hash value of previous valid block [4]. It showcases
a nice way of validating data to provide internal consistency if any intruder wants
to meddle with record then he has to generate all hash from the current position so
it is accumulating accountability feature that make access control more imperative
to centralized system. Now new paradigm shift in block chain strengthen digital
backbone of block chain crypto currency is rather a proven technology in block
chain is considered as type-I, in type-II currency and business logic is embedded,
in type-III only business logic is embedded Ex-Hyper ledger under Linux [5]. It is
adding cryptographic proof to some part of block chain it is enhancing cryptographic
auditability. Crypto currency is a digital currency which is a medium of exchange
nobody is authorized to change unless specific condition is fulfilled for ex-Ethereum
is a Turing complete programmable currency it is used in distributed application [6].
It would not work with Bitcoin. Another example is Ripple it has not taken advantage
of block chain rather it is mapped on iterative consensus process [7]. Ripple is faster
than Bit coin but more vulnerable to attack. In digital world two things are vital
authorization and authentication. Some innovative crypto currency is given as below
for reader guidance [8].
154 S. Mohapatra et al.
It depicts an open source distributed ledger architecture for internet of things. Also,
uses break through ledger technology i.e. named as tangle. Sender in a transaction
must adhere to proof-of-work that approves two transaction [9, 10]. So, it ultimately
eliminates dedicated miners from the framework [11].
• NEO (Network of Smart Economy)
This is a two-tier network the first tier is deal with miners which secure network
and second tier is master node it is capable of relaying transaction. At the same time
enable private sender to type transaction [13, 14].
• QTUM (Pronounced as Quantum)
4. Block reward signifies the amount that miners claim as reward for creating
a block It is equal to sum of the block subsidy plus transaction fees paid by
transaction. [19].
5. Maximum block size as per current consensus rule is four million height unit
[20].
6. Merkle tree it is nothing but a binary tree where each internal node contains hash
value of the children node. Hashing is paired with data in children node it goes
on until a single root is generated i.e. called Merkle root. the leaves are almost
always transaction from a single block [21]. The Merkel tree computation
block diagram is given in Fig. 9.1 here T1 to T4 are depicted as transaction in
each internal node computation is done as below Fig. 9.1.
7. Mining is the act of creating a valid bitcoin block. miners are nothing but device
that mine complex cryptographic puzzle. People own these devices [22].
8. Miners fee indicate the amount remaining when the value of all output in a
transaction are subtracted from all input in a transaction. It is paid to miner
who includes that transaction in a block.
9. Wallet is a software that store private key and monitor block chain to allow
user to spend and receive Satoshi’s.
10. Satoshis is a denomination of bit coin value one bit coin is equal to 100,000,000
Satoshis [23].
11. Peer is a machine that is connected to bit coin network, Genesis block is first
block in block chain.
12. A fork is a term defines when two or more miners find block at the same time
it is a part of attack.
156 S. Mohapatra et al.
13. Double spend is a transaction that uses the same input as already broadcast
transaction. The duplication of transaction is adjudicated by only one of the
transactions [24].
14. Network difficulty signifies how hard it is to find a block relative to difficulty
of finding the easiest possible block.
keep update different version of event. Now script is added to transaction ex-smart
contract.
9.5 Motivation
The entire gamut of block chain application in healthcare service domain show
case service redistribution with peer to peer management and abolishing third party
control. The feasible solution march towards resolving queries of service seeker and
service provider. Block chain authenticate streamline access of service to service
seeker. The block chain administration automates linking of information i.e. policy
tariff in a non-disputable manner over smart contract. Now the question arise why
block chain logic penetrates like wild fire to every sector, the feasible answer is
immutable control. Here each data is associated with unique hash. Hence it prevents
against single point failure. Though it gathers popularity in every single day but still
some resilient research is needed in timestamp based immutable linking of business
record.
More over in this research exploration authors collected various approximate
information to build this conceptual model, so it must revamp health insurance
ecosystem. The model includes vale added service design to bank, claim company,
beneficiaries. The interaction among them is given in sequence diagram in Fig. 9.8.
The complexity of claim processing in smart contract is shown in a piecemeal manner
through various class node i.e. citizen, kiosk, smart contract, policy claim and bank.
The effective key parameter of this research outcome include how it mitigates central-
ized control from multiple stake holders. The information flow between different class
node is participative parameter to exchange data. It creates a tamper proof authentic
model for a trusted domain like health insurance which needs qualitative attention
in this regard. The model analysis showcases operational efficiencies to simplify
complex time bound decision logic in smart contract.
development and concept building frame work in health insurance. That helps to
achieve operational resilience. In addition to this block chain overcome certain
architectural short coming in health insurance. Block chain is a ubiquitous secu-
rity enhancement research trend. It categorizes usage pattern of immutability. Health
insurance is at the peak of hype curve as per recent market survey. So for quality
enhancement in health insurance it need block chain integration As we can shift our
focus from decentralized architecture to peer to peer accessibility. The potential of
block chain collects useful security enhancement option i.e. smart contract, chain
code etc. It provides tamper proof and highly decentralized solution for health insur-
ance record dissemination. In block chain each peer is appropriately authenticated
and authorized. Health insurance continuously face privacy leak over exchange of
data over electronic media. So, block chain provide solution to this problem. The
major step taken by block chain is decentralized infrastructure that concept truly
help to built the security ecosystem in health insurance. As block chain creates an
opportunity in health insurance domain. It has tremendous potential to track citizen
insurance information over Claim Company and bank. At some point insurance
record monitor patient’s credential in terms of how much claim is covered, how
much premium patient has paid, and personal information. These are information
which need zero exploitation. Each day rise in cyber vulnerabilities aims to explore
existing internet infrastructure so from consumer end health insurance industry are
shifting their legacy ecosystem to block chain. So, in respective section authors prop-
agate idea of block chain integration opportunity as a future research direction. As we
know block chain is redefining health insurance sector in terms of improving quality
and effectiveness of data mobility. Every country has their own law over protection
of data in their code of law (privacy and owner ship of data).so consumer information
under transient environment need enforceable security infrastructure like block chain
to protect against cyber attack.
UML modelling diagnoses efficiency of system in research area before its imple-
mentation. The recent research area includes support service for patient claim in
personalized medical service through smart contract. The autonomous management
of patient claim request is designed in this paper. Subsequently communication
through class component is studied effectively by sequence diagram. Its further coor-
dinates action constructively among method within the class by use case analysis.
It processes citizen request and provide quality of service in placing claim request
and processing. This is an adaptive model for real life implementation. The behavior
of model is going to monitor judiciously patient response for claim. The research
including online e-payment request processing through bank. It is elaborated in
Fig. 9.5, in this section.
Further it consists of claim processing from citizen to bank in an interoper-
able efficient load distribution technique. We judiciously focus upon object-oriented
160 S. Mohapatra et al.
modelling technique for a group of class cooperation leading towards effective coor-
dination of job. Here in Fig. 9.5 rectangle component at the top indicate class (Citizen,
KIOSK, Smart contract, Policy claim, Bank).
The proposed infrastructure of the model is given in Fig. 9.5. It amplify user
understanding in this perspective it focus on three level of abstraction (1) Human
understanding, (2) Technological aspect behind smart contract, (3) Digital interac-
tion. Smart contract provides interface logic between digital interaction and human
affective understanding. In Fig. 9.4 Meta model of smart contract define roles and
responsibility of each three level of abstraction. This intuitive block model identifies
potential ontology behind smart contract for future implementation.
Recently healthcare industry giving more emphasis towards placing of patient
claim request settlement in peer to peer manner. It can be extended to provide
helpful information to health management and citizen. It minimizes the action of
virtual health broker who misguide citizen in the name of help. Here we propose
an interactive sequence analysis to carry out claim feedback from citizen, Smart
contract, and bank. We also add flowchart analysis as subject of research in this
paper. It concentrates study upon interactive method call. It is studying functional
feature of each component to validate a model. It can be enhanced further in provision
of claim guideline rule. The key aim behind this paper urges reader to harness the
potential of digital claim intervention in health industry in addition to this, the funda-
mental class components can realistically address all vital function for real life model
implementation. The UML analysis can accelerate exchange of information between
components for effective web-based application. The eventual impact of this anal-
ysis can access the entire financial ecosystem in health industry at a glance. In health
insurance processing eco-system, a large volume of data is generated every day. So
it needs proper processing in an intelligible manner in block chain environment each
data is bound to certain technique and linked hashing concept.
Automating transaction is the vital aspect achieved through smart contract. The
given UML application of smart contract can specify domain specific knowledge for
analysis in block chain network. The UML sequence diagram incorporates semantic
method for insurance application. i.e. pacing of claim service request, key genera-
tion, and transaction confirmation. It depicts ontological encoding behavior of smart
9 UML Conceptual Analysis of Smart Contract for Health … 161
contract. As smart contract is one of the prominence field in block chain that has been
leveraged across several industries, supply chain, healthcare, finance, and insurance.
This research work relies on smart contract sequencing rule and functionality for
of smart contract. The detailed analysis of Figs. 9.5 and 9.6 will surely help further
research work in this domain. Smart contract is governed by self executing rule and
embedded program logic it is a challenging task over which way to select embedded
logic so UML approach design give a precise validation. It not only enforces end to
end traceability between classes but also give dynamic overview of business level
application. Here in this application dynamic aspect is distributed within citizen,
kiosk, smart contract, policy claim and bank class. Smart contract helps to minimize
9.8 Algorithm
Step 1.
Start
Step 2.
9 UML Conceptual Analysis of Smart Contract for Health … 163
User provide its credential to perform claim service. That include Unique
MEC-NO (), USER_NAME (), PASSWORD () in KIOSK which is a GUI
(Graphical user interface).
Step 3.
If patient credential is correct acknowledgement is sent ACK (), then it will
go to next step otherwise time out go to END.
Step 4.
Citizen must initiate term and condition to build Smart contract, In subse-
quent step Claim company and bank must sign necessary credential to built
smart contract.
Step 5.
Citizen create service key ENTER _SERVICE_REQUEST () AT Kiosk
at the same time CREATE_SERVICE_KEY () is created for building smart
contract, at the succeeding step claim company and bank request for this service
and key through smart contract.
Step 6.
In smart contract class it will check on Key-1 and Key-2 value, Key-1 is
held by citizen and Key-2 is held by claim company.
Step 7.
Bank class provide service by giving acknowledgement to smart contract.
It check authenticity of transaction by SIGNED_TERM_CONDITION () with
smart contract and at the same time it verifies CITIZEN_POLICY_CLAIM
() If verification is successful PUBLISH_CLAIM_AMOUT OF_PATIENT()
otherwise verification failure message is given in KIOSK application to citizen.
Step 8.
Transaction End.
Before insurance transaction between insured and insurer authors have given some
common terminologies and set of concepts that define data, rules, and concept in
smart contract. The smart contract lays foundation of business model that facilitate
interaction between transacting parties’ smart contract is nothing but an executable
code which help to invoke operation in block chain. It invokes operation in block
chain ecosystem. It opens door for new business possibilities for any business model.
Here in Fig. 9.7 execution logic of smart contract is specified in a block diagram
which surely improves business logic in terms of insurance request action flow. So,
164 S. Mohapatra et al.
in Fig. 9.7 business logic is interface between Insured (Person who claims insurance)
and claim organization (Provider of health insurance). Hyper ledger fabric defines
concept of chain code where as smart contract and chain code both refer to same
thing. Chain code logic of block diagram is given in Fig. 9.8a, b. It encodes domain
independent canon for system interaction. Chain code establish independent business
logic in block chain network. Consequently, for reader reference authors simplify
Fig. 9.8 a Insurance chain code logic in block chain, b Health insurance chain code logic in block
chain
9 UML Conceptual Analysis of Smart Contract for Health … 165
Gas is the vital aspect of smart contract. Ethereum block chain needs gas as it is
utilized for transaction to pay off miners. Which in terms secure block chain transac-
tion. Here the question arises how the amount of gas is decided for smooth operation.
Subsequently what will be amount of gas and how maximum limit of gas will be set
it is a challenging task for block chain developers. A precise amount of gas is needed
to initiate a transaction as it sets transaction. If gas amount is low then transaction
can’t be initiated. At the same time miners lose the amount of remuneration. Block
chain architect smartly decide amount of gas to set a robust platform the fundamental
aspect of gas economy should be designed in such a manner that the smart contract
platform pick right dynamics. Gas economy always try to minimize energy waste
for long winding transaction. The gas economy judiciously set a priority by which
important transaction compute cost in a priority basis to secure miner cost over the
network This add legitimacy in smart contract.
Gas economy in my Ether wallet (Ethereum blockchain, Ethereum virtual
machine) there is a field known as gas limit it sets maximum amount of gas, block
chain designer provides different amount of gas limit for variety of transaction if we
will provide little amount of gas transaction will prematurely. It makes transaction
in an incomplete state. Right amount of gas boost network in a correct direction. In
design time gas limit is an important guideline so gas limit reflects intelligence of
network designer. As from miners’ point of view miners has the ability to increase
or decrease gas limit of block it sets right propagation in smart contract. Now the
question arises if we set the gas limit high what will happen to block chain network?
As per general convention high fees proportional to faster operation in certain
smart contract service gas price and gas limit is set automatically. The fees are
calculated in gas unit. But in certain case manual setting of gas limit is also possible,
faster operation need high charge too little gas amount make transaction risky. Here
in this section authors have given an example of Ethereum gas refund scenario. In
Solidity there are two command that guarantee gas refund mechanism, (I) Suicide—
It describes kill operation in smart contract and get back of 24,000 gas, (II) SStore—It
means storage deletion and refund of 15,000 gas, here one example is taken for easy
understanding of user, Example—A smart contract designer is using 13,000 gas and
want to delete storage then refund gas amount will be (15,000 − 13,000 = 2000) in
this case miner will be in loss situation as he has done certain computation in block
chain network. Hence to get rid of such scenario one condition is imposed i.e. refund
which has been accumulated can’t exceed half the gas used up during computation.
As in example smart contract use 12,000, gas limit is 21,000. As per command
166 S. Mohapatra et al.
SStore Ethe creator get back (21,000 − 12,000) as an unused gas, thus command
theoretically refund 15,000 gas to creator but 12,000 gas is used by smart contract
as per condition [15,000 > 12,000/2], so, refund will be 6000 + 9000 = 15,000. In
Suicide operation suppose smart contract use 70,000 gas, as this operation delivers
24,000 gas so condition is given as follows [24,000 < 70,000/2], In this scenario gas
refund will be 24,000 + unused gas amount. Gas trade of maintain balance of smart
contract design complexity.
9.11 Conclusion
Now a days, block chain technology plays a vital role in all kinds of fields as it’s one
of the most important creative developments as well as discoveries. Smart contract
will provide a unique identifier-based computing platform in claim processing. It
abolishes third party intervention that play a crucial role in insurance industry. Smart
contract is a major monitoring parameter in block chain application that signifi-
cantly enable secured real time claim processing. Meanwhile It increases threshold
of trust among service provider and service seeker. Smart contract evaluates unique
delivery component of claim processing by assessing a cryptic code. Interestingly it
employs better performance by adding cryptic defense layer against intruder attack.
Smart contract in claim request processing add a hybrid detection mechanism such
as security protection and legal binding of code. Due to massive digitization in health
care and rise of claim processing has attracted many challenges like data theft, loss
of privacy and integrity. It opens a new research field among investigator. Claim
settlement over electronic media involves many sensitive information that include
medical work flows, data of service seeker and provider for claim, etc. So, these
components are taken into consideration for smart contract architecture. So, in this
research outcome authors indicate conceptual solution of smart contract by reviewing
on various relevant research outcome. Smart contract will surely provide a reli-
able healthcare solution in electronic health management system. Smart contract is
next generation of high dimensional data security to decentralized claim processing.
Smart contract split information between computing node by embedding business
logic. Here the sole objective is to speed up the process of claim settlement by
executing smart contract. It can reduce administrative burden by embedding general
purpose business protocol. It can act a smart solution for automated monitoring of
insurance claim. Smart contract is the current need of claim industry. It can be imple-
mented in complex medical ecosystem to streamline claim procedure. However, in
this paper authors focus upon demanding aspect of health care industry and limita-
tion of current claim processing in health care. The ultimate goal of smart contract
can ensure fine-grained and robust ecosystem in claim processing domain.
Block chain technology stirs in the direction of revolution and change. In this
research work authors have proposed a framework in respect to health insurance
domain. So smart contract accumulate money from citizen. (e.g. Ethers, Bitcoin)
The research finding in this section give a broader aspect to reader for harnessing
9 UML Conceptual Analysis of Smart Contract for Health … 167
potential application of smart contract. This study will further analyze scalability
and potential outcome for different sector in claim i.e. micro claim, re-insurance
claim and death claim etc. The model given in section—give a initiative plan for
investigation of smart contract solution in healthcare claim processing. It is the future
smart insurance model. It grants personal data management for comprehensive model
development in smart contract. This UML ontology would provide reference model
for assessment of underlying risk in their supported real time implementation. It defi-
nitely guides future insurance organization to unify understanding in terms of smart
contract attribute building. Consequently, it standardizes insurance asset transac-
tion over smart contract. The following research work focus on model accuracy and
security assessment.
References
1. Griebel, L., Prokosch, H.U., Köpcke, F., Toddenroth, D., Christoph, J., Leb, I., Sedlmayr, M.:
A scoping review of cloud computing in healthcare. BMC Med. Inform. Decis. Mak. 15(1),
1–16 (2015)
2. Bhatti, A., Siyal, A. A., Mehdi, A., Shah, H., Kumar, H., Bohyo, M.A.: Development of cost-
effective tele-monitoring system for remote area patients. In: 2018 International Conference
on Engineering and Emerging Technologies (ICEET), pp. 1–7. IEEE (2018, February)
3. Foster, I., Castaneda, C., Nalley, K., Mannion, C., Bhattacharyya, P., Blake, P., Pecora, A.,
Suh, K.S.: Clinical decision support systems for improving diagnostic accuracy and achieving
precision medicine. J. Clin. Bioinform. 5(1), 4 (2015)
4. Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T.: FHIRChain: applying
blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16,
267–278 (2018)
5. Downing, N.L., Adler-Milstein, J., Palma, J.P., Lane, S., Eisenberg, M., Sharp, C., Northern
California HIE Collaborative and Longhurst, C.A.: Health information exchange policies of 11
diverse health systems and the associated impact on volume of exchange. J. Am. Med. Inform.
Assoc. 24(1), 113–122 (2017)
6. National Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical
data access and permission management. In: 2016 2nd International Conference on Open and
Big Data (OBD), pp. 25–30. IEEE (2016, August)
7. Zhang, J., Xue, N., Huang, X.: A secure system for pervasive social network-based healthcare.
Ieee Access 4, 9239–9250 (2016)
8. Kuo, T.T., Kim, H.E., Ohno-Machado, L.: Blockchain distributed ledger technologies for
biomedical and health care applications. J. Am. Med. Inform. Assoc. 24(6), 1211–1220 (2017)
9. Angraal, S., Krumholz, H.M., Schulz, W.L.: Blockchain technology: applications in health
care. Circul.: Cardiovasc. Qual. Outcomes 10(9), e003800 (2017)
10. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare
intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)
11. Griggs, K.N., Ossipova, O., Kohlios, C.P., Baccarini, A.N., Howson, E.A., Hayajneh, T.: Health-
care blockchain system using smart contracts for secure automated remote patient monitoring.
J. Med. Syst. 42(7), 130 (2018)
12. Ivan, D.: Moving toward a blockchain-based method for the secure storage of patient records.
In: ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg,
Maryland, United States: ONC/NIST, pp. 1–11 (2016, August)
13. Chen, Y., Ding, S., Xu, Z., Zheng, H., Yang, S.: Blockchain-based medical records secure
storage and medical service framework. J. Med. Syst. 43(1), 5 (2019)
168 S. Mohapatra et al.
14. Wang, S., Wang, J., Wang, X., Qiu, T., Yuan, Y., Ouyang, L., Guo, Y., Wang, F.Y.: Blockchain-
powered parallel healthcare systems based on the ACP approach. IEEE Trans. Comput. Soc.
Syst. 5(4), 942–950 (2018)
15. Jiang, S., Cao, J., Wu, H., Yang, Y., Ma, M., He, J.: Blochie: a blockchain-based platform for
healthcare information exchange. In: 2018 IEEE International Conference on Smart Computing
(smartcomp), pp. 49–56. IEEE (2018, June)
16. Cyran, M.A.: Blockchain as a foundation for sharing healthcare data. Blockchain Healthc.
Today 1, 1–6 (2018)
17. Shubbar, S.: Ultrasound medical imaging systems using telemedicine and blockchain for remote
monitoring of responses to neoadjuvant chemotherapy in women’s breast cancer: concept and
implementation. Doctoral dissertation, Kent State University (2017)
18. Ianculescu, M., Stanciu, A., Bica, O., Neagu, G.: Innovative, adapted online services that can
support the active, healthy and independent living of ageing people. A case study. Int. J. Econ.
Manage. Syst. 2 (2017)
19. Ekblaw, A., Azaria, A., Halamka, J.D., Lippman, A.: A case study for blockchain in healthcare:
“MedRec” prototype for electronic health records and medical research data. In: Proceedings
of IEEE Open & Big Data Conference, vol. 13, p. 13 (2016, August)
20. Xia, Q.I., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less
medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–
14767 (2017)
21. Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic
medical records sharing using blockchain. In: AMIA Annual Symposium Proceedings, vol.
2017, p. 650. American Medical Informatics Association (2017)
22. Mohapatra, S., Parija, S.: A brief overview of blockchain algorithm and its impact upon cloud-
connected environment. Bitcoin and Blockchain 99–113 (2020)
23. Siyal, A.A., Junejo, A.Z., Zawish, M., Ahmed, K., Khalil, A., Soursou, G.: Applications
of blockchain technology in medicine and healthcare: challenges and future perspectives.
Cryptography 3(1), 3 (2019)
24. Mohapatra, S., Parija, S.: A brief understanding of blockchain-based healthcare service
model over a remotely cloud-connected environment. In: Evolutionary Computing and Mobile
Sustainable Networks, pp. 949–955. Springer, Singapore
Chapter 10
Enabling Smart Education System Using
Blockchain Technology
Abstract Blockchain Technology is gaining lot of attention in recent days due to its
distinct characteristics like decentralization, reliability, security and data integrity.
Many companies are researching the possibility of adapting Blockchain Technology
in their respective domains to utilize the potential of blockchain to the fullest. In
spite of its rapid growth very little is known about the state of the art of blockchain
in educational sector. The book keeping process of degrees and certificates can
be one such potential area where blockchain can play a major role. This chapter
presents the detailed analysis of Blockchain Technology and its application in educa-
tion. Its emphases on (i) Blockchain Technology and its diversified application (ii)
Digital Signatures and (iii) Blockchain based educational solutions. This chapter also
highlights the challenges of blockchain in education based on an intensive research.
10.1 Background
Digital files could be as ephemeral as paper that vendors often issue to consumers in
proprietary formats; the organizations can’t read or validate the records without the
necessary tools. In many cases the verification process can be slow and unpredictable
even with access to the appropriate tools. The same applies to digital signatures: even
where laws have required their adoption, digital signatures come in a broad range
of formats with different security levels, most of which are not regarded as legal
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 169
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_10
170 A. R. Sathya et al.
evidence. Another problem with digital documents is the way it was shared. One
primary method is sharing them digitally via highly insecure email. Hence it is neces-
sary to build proprietary transmitting infrastructures to send sensitive documents like
certificates, health records, bank statements. On the other hand, other transmission
methods create interoperability issues. Ultimately, as with paper documents, it is also
possible to manipulate digital documents in ways that are hard to discover.
10.2 Introduction
institute can be stored which can later be used for analysis and decision-making
processes. To carry the research article publication in a timely manner blockchain can
be adopted. Through this submission, reviewing and verification process can happen
on time and even counterfeit of research articles can be avoided. The first institute
to store academic certificates in blockchain is University of Nicosia [2]. Later, MIT
Media Lab along with Learning Machine a software enterprise developed Blockcerts,
an open source environment for creating, broadcasting and validating the blockchain
based educational certificates. Smart contracts, asset transactions, digital signatures
and certificates can generally be stored in blockchain with respect to education. Smart
contracts are referred as a set of programs that will be executed automatically when
certain conditions are met [3]. Whereas asset transactions are ownership evidence
documents of any tangible or intangible assets. Certificates are proof of achievements
and signatures are proofs that the certificate is issues from and to authorized persons.
Some of the areas where blockchain can be adapted in educational sector is listed
below [4, 5].
Majority of the educational institutes across the world issues certificates either in
paper or digital format. Paper certificates are easy to store and recipients also find
it easy to carry and show it to others for any purpose. However, the process of
172 A. R. Sathya et al.
issuing, verifying and maintaining these certificates are time-consuming and expen-
sive process. However digital certificates acts as an alternative to paper certificates.
Digital certificates use digital signature which requires an intermediate entity to issue
and verify the certificates. In this case, the proofs of the certificates can completely
be recorded in blockchain in a safe and secured way. Even if the institute that issues
the certificate closes, the certificates will still be available in the blockchain. In case
of digital certificates, the issuing institutes can use a public blockchain to keep the
digital signature in blockchain.
Regarding education, there is a lot of scope for fake degrees. Every education insti-
tute must be verified by an accreditation entity for verifying the quality of the
institute that issues the certificate. In order to check whether a certificate has been
issued by a genuine institute, an individual might verify with the concerned institute
whether it really issued the certificate, Can check for the accreditations the organi-
zation owns, may check the quality of the accrediting body itself in private sector
circumstances. This is very much time consuming and needs experts in managing the
accreditation process. In this case, the accreditation body can put their digital signa-
ture in blockchain. By doing so, a multi-step verification can happen. That is, the
student’s certificate issued by authentic institute which is accredited by an authorized
accreditation body.
Instead of uploading the digital signature alone, if the certificate itself is uploaded in
a blockchain, it will be stored permanently and immutable. There is no need for inter-
mediate person to manage those certificates. The learners can provide the employer
or higher educational institutes the access to view his/her profile, the complete educa-
tional history of the learner can be made visible and can be verified. In case of credit
transfers, a smart contract can be written based on certain condition being fulfilled
the credits can be automatically be transferred from one institute to the other.
Educators can use a blockchain to mark the publishing and documentation of free
educational resources. This would require notary of the publication date for purposes
of copyright and enable monitoring of the extent of re-use of any given property. The
same is the case of journal articles. Tracking of journal citations is a costly process
10 Enabling Smart Education System Using Blockchain Technology 173
and needs a third party to do the process. Through blockchain, we can avoid the third
party and can allow anyone to publish articles and can track the citations without much
access restriction the original articles. A rewarding system may also be introduced
for the authors based on the amount of the resource re-used.
A specific currency is used by students for their fee. Especially when they go outside
their country many institutes accept payments digitally. Under these circumstances,
the students can make payments through cryptocurrencies. In this case, both the
student and the receiving organization should have a wallet to accommodate the
cryptocurrency transaction.
Traditionally the certificate issuing process includes issuing, verifying and sharing
of certificates. The issuing process includes the activities involved in including the
certificate information like the issuer, learner, achievements, logos, signature, etc. this
information usually will be stored in a central repository. The verification process
involves a third party to check the authenticity of the certificate issued. This can
be done in various ways like checking the in-built security features of the paper
certificates or checking with the issuer itself asking about the details. Sharing means
the receiver on receiving the certificates can share it with a third party via post or email
or in-person in case of higher education or employment. The whole process needs a
centralized system for storage or a trusted third party for verifying the certificates. It
is time-consuming and needs lots of security mechanisms and regulations for issuing
and verification process. However, digital certificates have certain advantages over
174 A. R. Sathya et al.
paper certificates like fewer resources needed for issuing, verifying, maintaining and
using. But there are no proper global standards available for digital signatures. Also,
it needs third-party verification for the digital signatures and digital certificates are
easy to counterfeit without signatures.
need any private key to be revealed. The process of digital signature needs a public
key infrastructure (PKI) which generally depends on third parties for generating
public and private keys, to timestamp the documents and to verify the signature. But,
in blockchain by design only all the above steps can be done and does not need a
PKI for digital signatures.
Blockchain resolves the problems of paper and digital certificates and provides and
infrastructure to access for verifying and sharing the certificates in a secured way.
By using Hashing techniques, it keeps the document containing issuer, receiver and
achievement details and whatever data need to be incorporated in the certificate in
the blockchain which is spread across the network. Therefore, forging the certificates
is almost impossible in the blockchain. Since the certificates are available over the
network it is possible for anyone who has access to the blockchain thereby eliminating
the need for third-party verification. Only the hash of the document is stored in
the blockchain and not the document itself [7]. Therefore, the privacy of the user
is maintained. Thus, the benefits of the receiver of this blockchain based digital
certificates are data independence and ownership. Recipient has the control over
the achievements and can share wherever he wants to share. At the same time the
data record is permanent and cannot be destroyed. The workflow of blockchain
based digital certificate is shown in Fig. 10.4. For commercialization few vendors
like Learning Machine, Sony Global Education, Attores Solutions, Gradbase and
Stampery are building innovative blockchain based certificated in market [8–10].
Even though only the hashes of the documents are stored in the blockchain it doesn’t
suffice the energy and storage constraints of blockchain. Adapting blockchain needs
technical knowledge to use. Therefore, dependencies on third parties are unavoidable.
10.7 Conclusion
References
1. Sharples, M., Domingue, J.: The blockchain and kudos: a distributed system for educational
record, reputation and reward, pp. 490–496. Springer International Publishing, Cham (2016)
2. Sharples, M., et al.: Innovating pedagogy 2016: Open University innovation report 5 (2016)
3. Cheng, J.-C., Lee, N.-Y., Chi, C., Chen, Y.-H.: Blockchain and smart contract for digital certifi-
cate. In: Proceedings of the 2018 IEEE International Conference on Applied System Invention
(ICASI), Chiba, Japan, 13–17 Apr 2018; pp. 1046–1051
4. Chen, G., Xu, B., Lu, M., Chen, N.-S.: Exploring blockchain technology and its potential
applications for education. Smart Learn. Environ. 5, 1 (2018)
5. Han, M., Li, Z., He, J.S., Wu, D., Xie, Y., Baba, A.: A novel blockchain-based education records
verification solution. In: Proceedings of the 19th Annual SIG Conference on Information
Technology Education, Fort Lauderdale, FL, USA, 3–6 Oct 2018, pp. 178–183
6. Palma, L.M., Vigil, M.A., Pereira, F.L., Martina, J.E.: Blockchain and smart contracts for higher
education registry in Brazil. Int. J. Netw. Manag. 29, e2061 (2019)
7. Jagers, C.: Blockchain-Based Records and Usability (2017). Available at: https://medium.com/
learning-machine-blog/Blockchain-based-records-and-usability-179a4eeaeb6e
8. Shrier, D., Wu, W., Pentland, A.: MIT. Blockchain & Infrastructure (Identity, Data Secu-
rity) (2016). Available at: https://cdn.www.getsmarter.com/career-advice/wp-content/uploads/
2016/12/mit_Blockchain_and_infrastructure_report.pdf
9. Credentials, Reputation, and the Blockchain. Available at: http://er.educause.edu/articles/2017/
4/credentials-reputation-and-the-Blockchain
10. Arenas, R., Fernandez, P.: CredenceLedger: a permissioned blockchain for verifiable academic
credentials. In: Proceedings of the 2018 IEEE International Conference on Engineering,
Technology and Innovation (ICE/ITMC), Stuttgart, Germany, 17–20 June 2018, pp. 1–6
Chapter 11
Blockchain Technology in Smart-Cities
Abstract With the fast pace of population, intelligent city wants effective and
sustainable smart solutions in transport, climate, energy, and government affairs.
Amongst the most sensible solutions is the smart city platform which includes IoT,
Big Data and the Internet of Energy. It faces many issues, including such inade-
quate IoT security, trouble maintaining and improving efficiency, higher operating
expenses of large amounts of data center construction, good permeability to damage,
difficulty building confidence in electricity internet users, quick leakage of consumer
privacy and a business model which is not acceptable etc. Blockchain is one of today’s
most disruptive technologies. As part of the overall efforts to shape the urban future,
numerous cities around the world are launching blockchain initiatives. With a range
of potential advantages, digital transformation poses many key issues like data secu-
rity and confidentiality. This study proposed a security architecture which utilizes the
blockchain-based with smart devices and provide a secure communication system in
an intelligent city.
P. Chinnasamy (B)
Department of Information Technology, Sri Shakthi Institute of Engineering and Technology,
Coimbatore, India
C. Vinothini · V. Praveena
Department of Computer Science and Engineering, Dr.N.G.P. Institute of Technology,
Coimbatore, India
S. Arun Kumar
Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology,
Sikkim Manipal University, Majitar, East Sikkim, Sikkim, India
A. Allwyn Sundarraj
Department of Food Technology, Sri Shakthi Institute of Engineering and Technology,
Coimbatore, India
S. V. Annlin Jeba
Sri Buddha College of Engineering, Padanilam, Kerala, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 179
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_11
180 P. Chinnasamy et al.
11.1 Introduction
The last few centuries can see a stratospheric increase in the world’s population
residing in metropolitan areas. Upwards of 55% of the total population currently
living in cities, and this proportion is estimated to hit 70% within next three decades,
like an unprecedented 25 million people in the world are projected to transport
to the cities in 2050 [1]. Due to destructive increasing population, the eco system
and economic issue emerge both at the technological and institutional levels. The
number of enterprises are also strongly involved in implementing the ‘intelligent’
principles for optimizing use of both physical and transitory assets. In this aspect, it
is suggested that idea of “Smart City” using new information and communications
technologies (ICT) in an articulate way focused at creating a healthy pedestrian areas
and enhancing the QoL. In industrialized democracies, the smart city appears to
have a broad range of uses including smart devices to monitor surface temperatures
and lighting systems, smart electric power management, enhance healthcare use,
stimulate the educational systems through advanced technology, and strengthen the
digital money exchange through smart governance structure.
Unlike conventional approaches, blockchain technology (which was initially
created for digital currency) enables peer-free transfer and exchange currencies.
Bitcoin has seen a tremendous increase in the financial sector since Santoshi
Nakamoto was founded in 2009 [2]. Blockchain is a distributed ledger, freely acces-
sible and irreversible digital ledger that pioneered how members regulate payment,
communicate, register and monitor transactions while removing the use of a central
body to handle operations altogether [2]. The information gathered by the smart
sensors devices was stored in traditional systems in a central database for future
smart city study. These central servers are vulnerable to many threats, including the
leakage of sensitive data collection due to use of unsecured server as well as the
need for more than one management authority [3]. This underlines the need for a
new approach to establish efficient architecture for data storage and processing in a
decentralized fashion. In this situation, blockchain seems to be the only opportunity
to connect with a decentralized peer-to-peer network, exchanging data and resources.
To the best of authors’ knowledge, however, there have not been any recent studies
discussing the issues of security and privacy in smart cities. This study presents
the governor-of-the-art blockchain technology for resolving the privacy concerns of
smart cities. The contributions are as follows
1. This research presents state-of-the-art blockchain technologies such as
blockchain architectures, consensus processes, implementations, trade-offs and
problems.
2. This study concentrates more on analysis to implement blockchain technologies
to enhance smart cities’ effectiveness, secure, and sustainability.
3. This study examines the usefulness of blockchain in different smart soci-
eties, including healthcare, transport, supply chain management, and accounting
systems.
11 Blockchain Technology in Smart-Cities 181
The substance of the article is structured as follows: Sect. 11.2 addresses the
history and functionality of blockchains. In Sect. 11.3, various features of a smart
city are addressed. Section 11.4 sheds light on the reasons for applying emerging
technology to smart cities. Section 11.5 explores new blockchain developments in
the various implementations of smart cities. Section 11.6 discusses future problems
and study questions, finally concluded in Sect. 11.7.
In simple terms, blockchain is a rapidly growing block chain designed to store all
the accumulated activities with the aid of a shared database in which all interactions
are cryptographically validated and authorized by all miners. In this section, the
detailed description of blockchain structure, various types, and different consensus
mechanisms.
Blockchain strategies have been widely divided into three groups based on influ-
ence and authorization mechanisms, which include public, private and consortium
blockchain. Similar forms are listed as following as shown in Fig. 11.2 and detailed
summary are listed out in Table 11.1.
1. Public Blockchain (Permissionless): Anyone with an internet access will
engage in reading, writing or internal audit activities in this blockchain [4].
Decision-making in this form happens with the aid of various distributed
consensus mechanisms such as PoW and PoS. The Bitcoin, Ethereum, and
Litecoin are examples of public blockchains.
method is legitimate [4]. Following the resolution of the PoW puzzle the frame
will be telecast to other endpoints as seen in Fig. 11.4. Types of PoW are the
bitcoin, ethereum.
2. Proof of Stake (PoS): In PoS the transaction validity is verified determined by
the amount of cryptocurrencies that the consumer owns. Ultimately the new
terrain transactions or blockchain should be checked meaning that the sum
would be granted through reward otherwise it would be confiscated. It needs
low processing power similar to POW processes. Types of PoS are indeed the
Ethereum, Casper, Krypton.
6 components as shown in Fig. 11.5. A complete explanation of all these levels and
their process is performed throughout the sub-chapter below.
1. Data Layer: This layer handle the various information acquired from different
sources [8–11]. This module is primarily responsible for encapsulating the time-
scribbled information blocks. In the block body, authenticated messages are
stored whereas the genesis block contains the current description of the block,
time, Nonce, Merkle root and hash. The new block contains past block hash
(parent block) to link to its preceding block. The time-stamp shows the block’s
formation date. The two crucial elements for block chain are time stamp and
Merkle tree in this layer. Time stamp allows the blockchain data to be placed
correctly and traceably. This could also include time-dimensioned blockchain
data to allow the recurrence of previous data histories. The Merkle tree will
preserve the transactions within this given period of time using a binary hash
tree to authenticate the integrity and presence of such activities effectively.
It’s often thought that smart city is focused on 4 philosophies/key elements, including
physical, institutional, social and economic infrastructures. The principal obligation
of these elements is shown in Fig. 11.7 and described as follows.
1. The physical infrastructure involves ensuring sustainable growth of the resource
and perfect operational processes in the city. It consists of the fabricated trans-
portation system and environmental assets. With the aid of an efficiency IoT
device network and Infrastructure facilities, Smart City is recognized. The
physical infrastructure also includes smart technology, construction upgrades,
sustainable urban design and intelligent architecture [14].
2. The institutional infrastructure focuses on improving smart city democratic
accountability through participation in decision-making, based rehabilitation,
consistent management and social service providers. Gaining greatest benefit
from the intellectual resources and working with the civilians for convenient
system of government and also improving the city is crucial. The operational
framework works with both the national and regional authorities to optimize
the smart city’s value. In addition to provide enough requisite coordination and
190 P. Chinnasamy et al.
In almost some area of our real experiences, ICT has played a crucial role, from
learning, family and wellness existence to domestic security. Many federal agen-
cies have implemented smart city initiatives to handle healthcare, water, electricity,
transport, security and stability aspects. In order to facilitate our lives, the smart
cities also pose many security threats due to growing interdependence, networking
and sophistication between themselves. A good understanding of the determinants
is of extreme significance for the successful implementation of the smart city. In this
chapter, we’re discussing the most influential criteria that really need to be addressed
to create a safe smart city [15].
11 Blockchain Technology in Smart-Cities 191
It is important for IoT systems to monitor and manage the data created by the sensor
nodes while at the same time detecting unauthorized access. Smart cities had to be
possible to deter illegal entry by retaining secure user access, building encrypted
connection and IoT systems authentication. A few other access control and autho-
rization mechanisms including Identity Based Encryption (IBE) [19–21], Role-Based
Access Control (RBAC) [19–21], and Attribute Based Encryption (ABE) [19–21]
have been developed to ensure data protection in cloud-enabled smart cities. The
above protocols help smart cities manage the legitimate access and withdraw their
authorization privileges as well.
192 P. Chinnasamy et al.
There are comprehensive Smart City major ingredients, like smart healthcare, supply
chain management etc. This should offer the opportunity to gain insight towards how
blockchains would be implemented in the smart city environment.
4. Doctors can opt to use central database to exchange the care documents for
more review.
5. It shares the authenticated documentation in encoded file.
6. Patients are demanding access to medical records history from the cloud service
provider (CSP).
7. Upon positive confirmation, the patient receives the encrypted message of the
medical record.
8. To access the actual care report, patients decode the downloaded encrypted
message to use their own secret key.
system that enables the exchange of knowledge between various elements. They will
need reimburse the battery systems, which are conveniently hidden in metropolitan
centers, a certain quantity of funds to guarantee regular fast charging of such EVs.
Smart contracts and blockchain technology allow the exchange of such energy among
fast chargers and EVs.
In [22], created a four-stage mechanism for Electric vehicles (excavation, selling,
examination and trying to charge) that allows for automatic, privacy-conserving
and efficient distribution of charging points based on cost and proximity to the EV.
In [23] suggested Blockchain-based consortium to strengthen electricity vehicles
distribution. The electrical transaction data is registered by a mutual ledger and
an incremental multiple intervention technique is followed to maximize the elec-
tricity rates and the volume of resources exchanged. Likewise, in [23] suggested a
blockchain technology and Smart Contract (LNSC) that could be commonly adopted
with previous methods to secure exchange among charged stacks and EVs. In [24,
25] proposed a two-stage protection system throughout the Internet of Vehicles (IoV)
to defensive towards polling competition among electors.
Most of nationwide generated power is extracted through coal and oil. Given that
over-use of natural gas will translate to increased levels of carbon dioxide and environ-
mental destruction, sustainable energy needs to be used. With emergence of energy
11 Blockchain Technology in Smart-Cities 195
A supply chain [30] is constituted by a group of objects including the firms and people
instantly relating to the distribution of services, information, and ingredients between
origin and suppliers. All these complicated supply chains had already permitted
various types of products to be manufactured and sold around the world, however
the organizations in those chain system also have constrained information about
product development cycle. Fortunately, sufficient commodity knowledge is vital as
customers need such ways to enhance overall trust, and companies need such data
to make financial decisions or forecast industry trends. Thus, the prime element in
chain management is data exchange that could be accomplished through the latest
developments in blockchains [31, 32].
makes this an incredibly dynamic and fat-moving field. Consequently, several major
research issues ought to be tackled mostly in coming years before its successful inte-
gration. The rest of this section addresses numerous problems and potential trends
as part of the research.
The smart city is full of a multitude of sensor networks. For security solutions, there-
fore, it becomes important to concentrate on a defense mechanism instead of deliv-
ering appropriate defenses. Consequently, clear guarantees of security and complex
strategies to protection becomes essential to a smart city [32, 35, 36]. The security
and privacy is the huge challenge in smart city systems. In a block chain, the primary
cause of security issues would be that consumers of these networks become entirely
anonymous instead of fully identifiable. The transactions are generally accessible
and open to those user groups, due to the greater transparency of cryptocurrency.
This may result in user behaviors being tracked and members’ real-world identities
exposed. These records may be used to facilitate the sharing information. Thus, real
privacy must be assured.
Energy efficiency plays a very important role because of the increasingly growing
energy bills in smart cities. Numerous consensus techniques like PoW are computa-
tionally efficient, even as sensor nodes require computational power to mines a next
block. Because of such extensive and intermittent calculations in PoW, it produces
enormous power usage yet is not recognized an energy-efficient approach [32, 39,
40]. Considered to be highly encouraging, additional research is needed on this
consensus algorithms as PBFT requires robustness and PoS protection has not yet
been rigorously investigated.
11.6.4 Interoperability
The adoption of rules for blockchain systems is still not widely recognized. Numeric
organizations like NIST and IEEE would be in the process of establishing guidelines
for blockchain adoption, and protection. [32, 41]. This ambiguity is again enhanced
when the self-governing blockchain networks implement different consensus frame-
works. For e.g., Hyperledger requires PBFT, and Ethereum utilizes the PoW
consensus algorithm but these two processes have to be coordinated to allow effi-
cient process. Consequently, in order to promote streamlined content management
framework, it is important to transfer data between one blockchain into the next.
Therefore, the concept of integrated data applications for smart city technologies
blockchain-based data requires more research.
11.7 Conclusion
The rapid urbanization and population growth in emerging markets, associated with
the rapid development of cities, continues to challenge the economic and environ-
mental affordability of the cities. Towards this extent, it is suggested that its idea
of “Smart City” leverage conventional ICT through an effective manner to create
a healthy metropolitan services and develop the lives of the people. But security
breaches are spreading rapidly in smart cities. Because of its highlight the impor-
tance like interoperability, efficiency, intractability and democratization such issues
could be proposed to resolve through use of blockchains. The opportunities and impli-
cations of adapting blockchains to smart cities and their trade-offs are discussed in
this article via a detailed survey. The study begins with many recent comprehensive
scope of the issue and context information about blockchain-based smart cities. It just
addresses the inspiration behind its adoption of blockchain technology in growing
technologies. In addition, the article attempts to combine the two approaches by
investigating the usefulness of blockchain in several systems, like smart healthcare,
198 P. Chinnasamy et al.
intelligent vehicle, smart grid, supply chain management, and banking sectors. Even-
tually, various open opportunities for the future prospects of science in important
areas are highlighted. In extending block chain to emerging technologies, this study
is supposed to address as a body of knowledge and comprehensive guidance for
future consideration.
References
16. Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve
cryptography based lightweight authentication scheme for smart grid communication. Futur.
Gener. Comput. Syst. 81, 557–565 (2018). https://doi.org/10.1016/j.future.2017.05.002
17. Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Lightweight elliptic curve cryptog-
raphy accelerator for internet of things applications. Ad Hoc Netw. 103, 102159 (2020). https://
doi.org/10.1016/j.adhoc.2020.102159
18. Cisco security monitoring, analysis and response system (Online). Available: https://www.
cisco.com/c/en/us/products/security/securitymonitoring-analysis-response-system/index.html
19. Chinnasamy, P., Deepalakshmi, P., Shankar, K.: An analysis of security access control on health-
care records in the cloud. In: Intelligent Data Security Solutions for e-Health Applications,
pp. 113–130. Academic Press-Elsevier (2020)
20. Chinnasamy, P., Deepalakshmi, P.: A scalable multilabel-based access control as a service for
the cloud (SMBACaaS). Trans. Emerg. Telecommun. Technol. 29(8), e3458 (2018). https://
doi.org/10.1002/ett.3458
21. Chinnasamy, P., Deepalakshmi, P.: A survey on enhancing cloud security through access control
models and technologies. Int. J. Comput. Sci. Eng. (IJCSE) 9(5), 326–331
22. Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., Hossain, E.: Enabling localized peer-to-
peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains.
IEEE Trans. Ind. Inf. 13(6), 3154–3164 (2017). https://doi.org/10.1109/tii.2017.2709784
23. Huang, X., Xu, C., Wang, P., Liu, H.: LNSC: a security model for electric vehicle and charging
pile management based on blockchain ecosystem. IEEE Access 6, 13565–13574 (2018). https://
doi.org/10.1109/access.2018.2812176
24. Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D.I., Zhao, J.: Toward secure blockchain-enabled
internet of vehicles: optimizing consensus management using reputation and contract theory.
IEEE Trans. Veh. Technol. 68(3), 2906–2920 (2019). https://doi.org/10.1109/tvt.2019.2894944
25. Zhou, Z., Wang, B., Guo, Y., Zhang, Y.: Blockchain and computational intelligence inspired
incentive-compatible demand response in internet of electric vehicles. IEEE Trans. Emerg.
Top. Comput. Intell. 3(3), 205–216 (2019). https://doi.org/10.1109/tetci.2018.2880693
26. Yang, Z., Yang, K., Lei, L., Zheng, K., Leung, V.C.M.: Blockchain-based decentralized trust
management in vehicular networks. IEEE Internet of Things J. 6(2), 1495–1505 (2019). https://
doi.org/10.1109/jiot.2018.2836144
27. Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.: CreditCoin: a privacy-
preserving blockchain-based incentive announcement network for communications of smart
vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204–2220 (2018). https://doi.org/10.1109/
tits.2017.2777990
28. Luo, B., Li, X., Weng, J., Guo, J., Ma, J.: Blockchain enabled trust-based location privacy
protection scheme in VANET. IEEE Trans. Veh. Technol. 69(2), 2034–2048 (2020). https://
doi.org/10.1109/tvt.2019.2957744
29. Wang, J., Wu, L., Choo, K.-K.R., He, D.: Blockchain-based anonymous authentication with
key management for smart grid edge computing infrastructure. IEEE Trans. Ind. Inf. 16(3),
1984–1992 (2020). https://doi.org/10.1109/tii.2019.2936278
30. Mentzer, J.T., Dewitt, W., Keebler, J.S., Min, S., Nix, N.W., Smith, C.D., Zacharia, Z.G.:
Defining supply chain management. J. Bus. Logist. 22(2), 1–25 (2001). https://doi.org/10.
1002/j.2158-1592.2001.tb00001.x
31. Gonczol, P., Katsikouli, P., Herskind, L., Dragoni, N.: Blockchain implementations and use
cases for supply chains—a survey. IEEE Access 8, 11856–11871 (2020). https://doi.org/10.
1109/ac-cess.2020.2964880
32. Bhushan, B., Khamparia, A., Martin Sagayam, K., Sharma, S.K., Ahad, M.A., Debnath, N.C.:
Blockchain for smart cities: A review of architectures, integration trends and future research
directions. Sustain. Cities Soc. 61 (2020). https://doi.org/10.1016/j.scs.2020.102360
33. Chen, P., Jiang, B., Wang, C.: Blockchain-based payment collection supervision system using
pervasive Bitcoin digital wallet. In: 2017 IEEE 13th International Conference on Wireless
and Mobile Computing, Networking and Communications (WiMob) (2017). https://doi.org/
10.1109/wimob.2017.8115844
200 P. Chinnasamy et al.
34. Khan, C., Lewis, A., Rutland, E., Wan, C., Rutter, K., Thompson, C.: A distributed-ledger
consortium model for collaborative innovation. Computer 50(9), 29–37 (2017). https://doi.
org/10.1109/mc.2017.3571057
35. Nagel, E., Kranz, J.: Smart city applications on the blockchain: development of a multi-layer
taxonomy. Progress in IS Blockchain and Distributed Ledger Technology Use Cases, pp. 201–
226 (2020). https://doi.org/10.1007/978-3-030-44337-5_10
36. Hakak, S., Khan, W.Z., Gilkar, G.A., Imran, M., Guizani, N.: Securing smart cities through
blockchain technology: architecture, requirements, and challenges. IEEE Network 34(1), 8–14
(2020). https://doi.org/10.1109/mnet.001.1900178
37. Mokhtari, G., Anvari-Moghaddam, A., Zhang, Q.: A new layered architecture for future big
data-driven smart homes. IEEE Access 7, 19002–19012 (2019). https://doi.org/10.1109/ac-
cess.2019.2896403
38. Alli, A.A., Alam, M.M.: SecOFF-FCIoT: machine learning based secure offloading in Fog-
Cloud of things for smart city applications. Internet of Things 7, 100070 (2019). https://doi.
org/10.1016/j.iot.2019.100070
39. Mendling, J., Weber, I., Aalst, W.V., Brocke, J.V., Cabanillas, C., Daniel, F., Zhu, L.:
Blockchains for business process management—challenges and opportunities. ACM Trans.
Manage. Inf. Syst. 9(1), 1–16 (2018). https://doi.org/10.1145/3183367
40. Vukolic, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In:
Open Problems in Network Security Lecture Notes in Computer Science, pp. 112–125 (2016).
https://doi.org/10.1007/978-3-319-39028-4_9
41. Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A survey of distributed consensus protocols for
blockchain networks. IEEE Commun. Surv. Tutor. 1-1 (2020). https://doi.org/10.1109/comst.
2020.2969706
Chapter 12
Blockchain Technology and Fashion
Industry-Opportunities and Challenges
Abstract Fashion and textile industry are one of the fastest growing sectors that
involves a complex supply chain at local and global levels to procure raw materials
and supply finished products to the market. The complexity of the industry demands
for a system which is transparent, distributed and can protect the intellectual property
rights. With key characteristics like decentralization, immutability, consensus etc.,
blockchain technology has the potential to enhance the exiting fashion industry by
adding an extra layer of security and trust to it. One of the major challenges faced
by the fashion industry is the counterfeit products flooding the market place. These
fake products have a negative impact on the brand image and value. Blockchain
has the ability to protect and secure the digital identities and establish authenticity
in fashion industry. Despite of the exponentially growing popularity and interest in
this technology, very little is known about the current state of application and use of
blockchain in fashion and textile industry. This paper discusses the various aspects of
the use of blockchain technology in the fashion and textile industry highlighting the
benefits that blockchain could bring. The role of blockchain in providing potential
solutions to the existing issues and challenges faced by the fashion industry are
discussed with an insight into the current state of the blockchain technology in
fashion industry. Further, the work also discusses the challenges in the integration of
blockchain into the existing processes of the fashion and textile industry.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 201
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_12
202 G. Tripathi et al.
12.1 Introduction
The global fashion industry is growing rapidly due to several factors and is all set to
take its graph further to a higher level in the coming times. Over the period of time,
various digital technological advancements have played a major role in enhancing
the capabilities of fashion industry to provide value and seamless experience to its
customers across the globe. Bridging the gap between fashion and digital technology
and especially blockchain technology can lead to solving various crucial issues that
persist in Fashion Industry today. Coupling fashion industry with blockchain tech-
nology can help business achieve better service to their customers. In view of this
situation below are the main key issues existing in Fashion industry today which can
probably be address with the help of block chain technology.
Supply Chain Management constitutes the sequence of key business processes from
procurement of raw materials to getting the product delivered to the end user.
204 G. Tripathi et al.
Supply chain in fashion industry is very long, complex and demanding in nature.
The ecosystem of an apparel supply chain generally comprises of sourcing of raw
material (fiber, yarn, fabric) from in-house or from outside vendors, manufacturing
of apparels which can be again done in-house or through outside vendors, distribu-
tion of apparels through distributors and wholesalers and finally the apparel product
reaches the retailers from their it reaches the customers. There are many intermediary
parties in between especially vendors, logistic and other supporting partners which
are involved as a part to complete supply chain network as presented in Fig. 12.2.
Longer lead times, shorter seasons and global sourcing adds to complexity of
fashion supply chain [7]. Also, high degree of uncertainty of consumer demand
affects the flow of supply chain making it complicated. In order to meet the consumer
demand on time the supply chains need to be quick in response without delays and
to achieve this the information flow at various points should be smooth, accurate
and on real time basis. In traditional system of supply chain, information sharing
at each step of supply chain is very minimal and difficult to obtain. With the help
of enhanced ERP systems this problem is reduced but cannot be totally resolved.
Moreover, implementation of an ERP system is a complex, large scale project, which
has significant strategic, operational and increased business cost implications for the
organization [8]. Finding an ERP solution to fit specific need of a fashion business
is another challenge [9].
Also, with the increasing demand of radical transparency from consumer’s side
it is pushing business to be more efficient in monitoring and disclosing their supply
chain activity. Customers are proactively interested in complete transparency and
traceability throughout supply chains. However, most brands are still following the
legacy supply chain frameworks which lacks transparency and traceability [10].
The fashion industry is much more than just clothes and apparels. It is more about
creating and manufacturing novel designs with an aim to monetize with intellectual
proprietary rights [11]. Fashion managers must be able to timely identify the valuable
assets and their business relevance in order to safeguard the intellectual property
rights [12]. The universal selling point (USP) of any fashion business is innovation
and creativity. Therefore, such businesses are primarily focused on creating new and
innovative design and manufacturing ideas and invests a good amount of time and
12 Blockchain Technology and Fashion Industry-Opportunities … 205
Sustainable fashion has become one of the most talked about concepts amongst the
fashion community. Many big design houses and renowned brands are opting for
environment friendly processes and moving towards sustainable fashion. However,
the mass adoption of this concept of sustainable fashion is still far from reality.
Sustainability in fashion depends of three major aspects namely the environmental
aspect, the social aspect and the economic aspect.
The environmental aspect deals with the best practices to ensure that the various
production processes are nature friendly. The major part of environmental impact
come from the usage of various chemicals and natural resources leading to nega-
tive impact on the environment. The social aspect of sustainable fashion aims to
ensure healthy working conditions for the labours. In most parts of the world the
fashion industry provides harmful working environments and unfair labour practices
to the artisans and labours. The economic sustainability aims at making the fashion
affordable while balancing the environmental and social aspects.
To establish equilibrium between these three aspects is a major challenge for the
fashion industry. The efforts to cut costs and make fashion affordable have a negative
impact on the environmental and social sustainability as it results in minimizing the
budget for chemical waste treatments, resource recycling, low labour etc. On the
other hand, improving the environmental and social sustainability leads to increased
cost of production. These increased costs create an overhead for small and medium
scale industries thus making environmental and social sustainability less feasible
and less desirable. Figure 12.4 provides the various environmental and sustainability
aspects in fashion industry.
Sustainability issues in the fashion industry is surfacing across the globe and is
gaining ground in Fashion industry. Moreover, shift in consumer behavior towards
sustainable lifestyle lays emphasis on developing circular economic models which
are sustainable. Fashion business are trying to push themselves towards ecological
integrity and social justice while earning profits to balance the triple bottom line of
sustainability [17] as shown in Fig. 12.5.
Businesses are trying to build brands that are for people, planet and profit. Sustain-
able Fashion business conduct themselves in an ethical and fair way. Fashion is a
labor-intensive industry and the welfare of the people or human capital involved
in fashion ecosystem is the responsibility of businesses. This includes the workers,
laborers, artisans and other people directly or indirectly working in the industry are
treated fairly, have good working conditions, and receive fair wages and appreciation
for their work. Also, the businesses should be concerned about their impact on other
people around them and specially their customers. Fashion industry is one of the
biggest culprits for pollution on this earth. Caring about the planet by reducing the
impact on environment by making clothes in a more environment friendly manner is
one of the triple bottom lines of sustainability. Fashion business these days vie hard
to incorporate sustainable materials, sustainable design and manufacturing process
in their business to reduce the size of their ecological footprint as much as possible.
12 Blockchain Technology and Fashion Industry-Opportunities … 207
Also, customers should be made aware about the initiatives that the business take
to make better choices for people and planet. These thing needs to be promoted,
educated and communicated to the customers in a very transparent way which can
help build trust between the businesses and customers. Also, this will empower and
generate healthy revenue and profit streams not just for the shareholders but for a
broader community. Fashion business are trying to pioneer in sustainability aspect to
leverage the commercial opportunity. Business need to start measuring their sustain-
ability performance and develop strategies to achieve sustainability goals and also
inform consumer in a transparent way to enable trust.
The last decade has seen a significant increase in the researches, academic debates
and publications in the fashion domain. The growing interests in fashion has helped
to establish it as one of the major industries in today’s world [18]. The authors in
[19] highlights the main characteristics of the modern fashion industry in terms of the
volatility, velocity, variety, complexity and dynamism of the fashion industry. The
paper also focuses on the management of the supply chain in the fashion industry
as characterized by the time to market, time to serve and time to react. The authors
used systematic, comparative and logical research approaches for conducting their
research and analysis. The authors in [20] discussed about the possibility of designing
and adopting sustainable fashion designs. The various challenges associated with
it are also discussed. The paper further presents a model for designing sustain-
able fashion that identifies the principles and best practices to be implemented
for achieving sustainability in fashion designs. The authors in [21] highlights the
importance of innovative sustainable business models in fashion industry. The study
comprises of interviews and case studies to propose a framework that showcases
the various trends and drivers of sustainable and innovative models of business in
fashion industry. The work discusses the concept of circular economy, corporate
social responsibility, collaborative consumption and sharing economy, consumer
awareness and various technological innovations. Further the authors also discussed
about the various fashion-based startups that are focused on innovation and sustain-
ability. The work presented in [22] highlights the changes that have occurred since
1990 in the fashion industry. The study focuses on the emerging trends of fast fashion
from the perspective of the suppliers as well as the consumers. In [23] the authors
discussed about the technological interventions in the fashion industry by high-
lighting the role of Information and Technology (IT) in bringing a paradigm shift
in the overall consumer experience in the online shopping environment. Further the
author also discussed about the influence of online shopping experiences on the
fashion consumers based on a survey conducted on 439 consumers from UK. The
authors in [24] proposed an innovative and sustainable model for fashion industry
that redefines that redefines the manufacturing process to reduce the carbon foot-
prints. The authors used the blockchain technology to improve the Emission Trading
12 Blockchain Technology and Fashion Industry-Opportunities … 209
Scheme (ETS) that enables to measure and record the carbon emissions for fashion
apparel manufacturing industry. The results of the study show that blockchain inte-
gration into the ETS helps to significantly improve the performance of the system
and provides environmentally sustainable solutions. In [25] the authors highlighted
the data quality issues in the fashion industry and its impact on the sustainable supply
chain operations. The authors further advocate the use of blockchain technology for
enhancing the supply chains and presents an environmental taxation waiver scheme
for social welfare. The study presented in [26] shows how blockchain technology
can provide a solution for Intellectual Property related issues in the fashion and
other industries by enhancing the process of registration, transaction processing,
enforcements, payments, licenses, distributions and agreements. The authors in [27]
highlighted the potential of blockchain technology to create a transparent system in
the fashion industry by filling the gaps in the efficient implementation of Intellec-
tual property rights. The paper focuses on how blockchain can help the small and
medium scale industry and new designers to defend and protect their IP. The use of
smart contracts to eliminate the intermediaries and third parties in the IP law process
is also discussed.
provide better forecast of the inventory items and thus cater to dynamically changing
demands.
With the transparency of blockchain technology, the tracing and tracking of goods
and services can be managed in real-time. With the help of advanced analytics and
12 Blockchain Technology and Fashion Industry-Opportunities … 211
blockchain technology, better and informed decisions can be taken to maintain the
balance between the supply and demands.
12.4.4 Security
Blockchain technology makes the system more secure and immutable. In blockchain,
only the legitimate entities of the system are allowed role-based access on mutually
agreed smart contracts. No other entity (external or internal) can have access to the
system. Furthermore, the anonymity of the blockchain technology enable the users
to interact with each other without the fear of compromising their personal and other
information (which is not needed).
In fashion industry, the main USP of the fashion brands is the uniqueness and quality
of the designs and products. The blockchain based IR tags and chips can be used
to ensure the legitimacy of the goods and services as well as track them throughout
the product life cycle from raw materials to the finished products. Blockchain based
digital designs are highly secure and are not prone to copyright infringements.
Blockchain technology helps in tracking and tracing the raw materials. The
blockchain based IR tags can be used to track the goods and services and provide the
customer with the history of the apparels in order to make them aware about things
like from where the raw material is procured, what is the product life cycle, what
procedure is involved in making the finished products etc. Figure 12.7 shows the life
cycle of Apparels and Garments.
Textile Production
At this stage, the blockchain technology can be used to oversee the production steps
including yarn development, textile thickness, quality etc. in a transparent manner.
212 G. Tripathi et al.
Design
Once the textile is developed, the next and the most important stage is the designing of
the product. With blockchain technology, the unique designs of the designers can be
protected against copyright infringements and IPR thefts. The blockchain based tags
can be used to uniquely identify the designs in a digital format which is impossible
to counterfeit.
Distribution
Blockchain technology makes it possible to track and trace the textile throughout the
transportation cycle till it reaches the destination.
Retail
Once the textile and finished products reach the retailers, they can use blockchain
technology to effectively manage the supply chain, inventory and thus reduce costs
and save time.
12 Blockchain Technology and Fashion Industry-Opportunities … 213
End Users
The garments and apparels which are created by integrating blockchain technology
makes it possible for the end user to identify the production life cycle, authenticity
and source of origin of the clothes giving them complete satisfaction.
The increasing awareness amongst the masses to opt for sustainable, cruelty free
and environment friendly products has led to the ideas revolving around the use of
technology in fashion industry. Many fashion houses, brands and startups are exper-
imenting with solutions to cater this demand. One of technologies that has gained
considerable notice in the last few years the blockchain technology. Many new ideas
have emerged on the integration of blockchain technology into the existing fashion
industry processes to make it more sustainable, ethical and efficient. Table 12.1
presents some of the organizations that have used blockchain in the fashion industry.
Blockchain technology continues to evolve and grow. This technology is still at its
initial stage and researchers are currently testing the beta stage of blockchain seeking
to overcome various issues associated with the technology [29].
In the context of fashion industry, when the deployment of blockchain is costly and
the environmental expense related to the remaining commodity is substantially high,
it will benefit the society at large but it will lead to losses in the supply chain [25].
12 Blockchain Technology and Fashion Industry-Opportunities … 217
The scale and number of blocks grows with growing information, commodity
complexity and supply chain partners, leading to higher processing and database
needs. The management of such circumstances involves examining and selecting only
critical product lifecycle phases and relevant details for the purpose of traceability
[29].
In the case of blockchain, the real product details may be retrieved by a bogus
product from the database with the intent of forgery. Hence, security framework
needs to be deployed at the business level (to facilitate secure information exchange
among supply chain players and businesses) and product level (to safeguard product
and traceability tags from forgery) [29].
As blockchain renders the supply chain transparent, many stakeholders are hesitant to
reveal critical details about their trade since their rivals might steal this information.
Moreover, the collection and processing of this information is a tiresome task, thereby
requiring additional incentives to encourage the involved participants [29].
The automated nature of blockchain poses concerns for intellectual property protec-
tion for fashion vendors, such as the inability to provide legal defense to intel-
lectual properties. The general theory is that blockchain cannot override existing
218 G. Tripathi et al.
copyright legislation, and third parties cannot provide copyright defense without the
unequivocal permission of the lawmaker [31].
Incorporating blockchain into the existing fashion industry can pose a serious chal-
lenge as the overall process could be highly expensive and time consuming. An
additional funding of human resources may be required for the successful cultural
transition from centralized to decentralized framework.
Consequently, blockchain deployment requires strong enthusiasm and anticipa-
tion among the concerned players in the fashion market [29].
In the last few years fashion industry has greatly impacted the social and economic
life of individuals. Today fashion has become a powerful medium of communication.
The consumers of fashion, use it as a medium to express themselves to the external
world where it has become a tool to represent the culture, personalities and social
status. With the large popularity of high-end fashion brands amongst the masses has
increased the demand of these products amongst all groups of people. Today the
markets are flooded with counterfeit products to meet the increasing demands. The
increasing demands has led to various malpractices in the fashion industry related
to the labor laws, copyright, sustainability, supply chain etc. This increased popu-
larity and demand of fashion products amounts the masses, has led to a consider-
able amount of attention towards the issues and challenges faced by the industry
and its impact on the social, economic and environmental aspects. Today fashion
industry is using various ICT tools and other technological innovations to trans-
form their processes and meet the demands of the market and at the same time
increase their profits. Blockchain technology has gained significant attention from
the fashion world in the last few years. The key features of blockchain technology
like transparency, immutability, decentralization, anonymity etc. are seen as poten-
tial solution to the existing issues and challenges of the fashion industry. The work
presented here explores the potential of blockchain technology in transforming the
fashion industry from an opaque to a transparent system along with the various chal-
lenges that might come in the way. Blockchain has the potential to address the issues
of the fashion supply chain by facilitating transparency and traceability along with
the elimination of intermediaries and third parties. The technology can also help to
achieve sustainability by addressing the various social, economic and environmental
aspects. Further the transparency and immutability of blockchain helps to protect
the intellectual property rights and fight against the counterfeit products. Being a
newly adopted technology the fashion industry the mass adoption of blockchain
12 Blockchain Technology and Fashion Industry-Opportunities … 219
is still far from reality. However, the study shows that integrating blockchain into
fashion industry operations can bring traceability, transparency, scalability and flex-
ibility in the system thus providing risk reduction, value creation, fault detection and
elimination.
References
18. Black, S.: Editorial in “fashion practice: design, creative process and the fashion industry”.
Fash. Pract.: J. Des., Creative Process Fash. Ind. 1(1), 5–8 (2009)
19. Ciarnienè, R., Vienazindiene, M.: Management of contemporary fashion industry: character-
istics and challenges. Procedia—Soc. Behav. Sci. 156, 63–68 (2014)
20. Aakko, M., Koskennurmi-Sivonen, R.: Designing sustainable fashion: possibilities and
challenges. Res. J. Text. Apparel 17(1), 13 (2013)
21. Todeschini, B.V., Cortimiglia, M.N., Callegaro-de-Menezes, D., Ghezzi, A.: Innovative and
sustainable business models in the fashion industry: entrepreneurial drivers, opportunities, and
challenges. Bus. Horiz. 60(6), 759–770 (2017)
22. Bhardwaj, V., Fairhurst, A.: Fast fashion: response to changes in the fashion industry. Int. Rev.
Retail, Distrib. Consum. Res. 20(1), 165–173 (2010)
23. Blázquez, M.: Fashion shopping in multichannel retail: the role of technology in enhancing the
customer experience. Int. J. Electron. Commer. 18(4), 97–116 (2014)
24. Fu, B., Shu, Z., Liu, X.: Blockchain enhanced emission trading framework in fashion apparel
manufacturing industry. Sustainability 10(4), 1105 (2018)
25. Choi, T.M., Luo, S.: Data quality challenges for sustainable fashion supply chain operations in
emerging markets: roles of blockchain, government sponsors and environment taxes. Transp.
Res. Part E: Logist. Transp. Rev. 131, 139–152 (2019)
26. Burstall, R., Clark, B.: Blockchain, IP and the fashion industry. Managing Intell. Prop. 266, 9
(2017)
27. Yanisky-Ravid, S., Monroy, G.: When Blockchain Meets Fashion Industry. Available at SSRN
3488071 (2019)
28. Trautman, L.J.: Virtual currencies; bitcoin & what now after Liberty Reserve, Silk Road, and
Mt. Gox? Richmond J. Law Technol. 20(4) (2014)
29. Agrawal, T.K., Sharma, A., Kumar, V.: Blockchain-based secured traceability system for textile
and clothing supply chain. In: Artificial intelligence for fashion industry in the big data era,
pp. 197–208. Springer, Singapore (2018)
30. Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G-enabled IoT for industrial
automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135,
106382 (2020)
31. Anderson, S.: The missing link between blockchain and copyright: how companies are using
new technology to misinform creators and violate federal law. North Carolina J. Law Technol.
19(4), 1 (2018)
32. Bhushan, B., Khamparia, A., Sagayam, K.M., Sharma, S.K., Ahad, M.A., Debnath, N.C.:
Blockchain for smart cities: a review of architectures, integration trends and future research
directions. Sustain. Cities Soc. 61, 102360 (2020)
33. https://www.loomia.com/tiletag
34. https://www.provenance.org/case-studies/martine-jarlgaard
35. https://curate.style/index.html
36. https://coin.fashion/auth
37. https://www.intelligenthq.com/how-blockchain-could-support-ethical-fashion/
38. https://www.vechain.com
39. https://www.ledgerinsights.com/lvmh-luxury-blockchain-microsoft-consensys/
40. https://martinejarlgaard.com/About
41. https://www.levistrauss.com/2019/01/24/new-way-measure-worker-well/
42. https://www.somish.com/lp/sustainable-fashion-survey-caif/
43. https://www.arianee.org
44. https://www.sourcemap.com
Chapter 13
Secure Event Ticket Booking Using
Decentralized System
Abstract Over the past years, it has been noticed that there is a steady increase
in the number of events being conducted across the globe, and the entry to these
events is monitored through a system of tickets. One of the biggest problems faced
by the event organizers regarding the current system of events is the duplication
and reselling of the tickets at a cost higher than the original cost. It has become
easier for the conmen to carry out this process as most of the tickets are purchased
through various online platforms. Therefore, it is important to establish a reliable
system to make sure that there won’t be any tampering of the ticket. The objective
behind this chapter is to introduce a new system of ticketing wherein, the issues
faced in the current system can be tackled with the help of blockchain technology.
In our proposed model, an online platform is engineered where the digital tickets
are linked to the purchasers with the help of their mobile numbers. All the events
are stored in the form of the ledger based on handling variance and tracking of the
system. Due to its characteristics of decentralization, transparency, integrity, and
immutability, blockchain can be effectively used to eliminate the above problems
and improve the proof of ownership, making the tickets tamper-proof. This system
will introduce trust between the participants involved in this chain and allows the
consumers to authenticate and verify the ownership of the tickets before purchasing
them. However, the usage of blockchain technology brings some constraints to our
model when it comes to a large population.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 221
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_13
222 V. Naman et al.
13.1 Introduction
In the current time and day, there are a lot of frauds and scams in every monetary
field, due to the present growth of the e-commerce market worldwide. The annual
amount which is scammed by fraudsters in India is in the form of thousands of
crores [1]. This majorly happens in the banking, corporate, medical sector, and also
in the field of ticket selling for service or event management. With the latest facilities
provided by various online platforms, people prefer buying tickets over the internet
when compared to the traditional methods of waiting in the queues for a long time
[2]. Over the last decade, due to the anonymity of the customers on the internet, it
has become easier for the conmen to dupe customers. Even if the duped customers
want to contact the sellers of the tickets it is really difficult. Since up until the last
minute, the buyers do not know whether the ticket is fake or not, at which point in
time, the conman disables the medium of connection which was used originally, this
severs all connection methods to the conman. In this chapter, we propose a model as a
solution to this problem, which will reduce fraud-practices like ticket counterfeiting
and reselling tickets, by using blockchain technology [3–5]. Using this, we can make
all the transactions transparent and the counterfeiting of any ticket nearly impossible.
In this model, tickets are considered assets on the blockchain, similar to Ethereum and
other cryptocurrencies [6, 7]. Since the content on the blockchain cannot be changed,
the ticket or voucher once uploaded on it cannot be altered. The transactions are based
on a token system, which will allow us to track and identify each transaction [8].
The security features of the proposed system are that data related to transactions
and bookings are viewable, it is next to impossible to replicate the tickets for selling
using an illegal manner, there is never a data leakage as there is a minimal human
intervention which reduces most of the errors. There is no possibility for third party
attacks as the blockchain is a decentralized system which consists of nodes that are
mutually untrustworthy, and this property prevents the creation of malicious nodes
for false transactions [9–11]. As the major problems with the ticket vending are
reselling the ticket at an increased price and replication of the tickets, these problems
are solved using the proposed model.
current issues of ticket frauds and ticket traceability process with information stability
among the availability chain nodes [17]. The ever-growing greed for money is also
increasing along with the current progress of science and technology, leading to a
rise in the number of scam and fraud cases. The current understanding of blockchain
technology helps us make the world a better place by inhibiting scams in multiple
fields [1]. This chapter consists of research from various papers and the main idea
for this chapter comes from a lack of transparency and clarity in the transactions in
the event management field [6]. This takes place mainly due to the anonymity of any
user of the internet and the comforts of the internet. In light of recent events, it has
been noticed that counterfeiting is increasing at an alarming rate, and to control this
in the event management field, we are using blockchain for making various versions
of a single ticket required for attending events [2]. The key fact here is that even
the user who purchased a ticket can be accessed by him/her only before a stipulated
time of the event. The non-editable property of the data on the blockchain assures
that the tickets cannot be replicated by any means owing to the immutable property.
The smart contracts and the properties of the blockchain assure the security of the
ticket [18]. The main drawback of this model is that there can be a delay in scanning
the dynamic QR code, only if there is a large crowd there is a time delay [19]. The
papers we referred to and the insights we took from there are as follows: Li et al. [20]
have suggested a peer-to-peer networking architecture which will help the customer
understand the logistic information in real-time using a decentralized approach to
ensure clarity in the distribution of data in an up-to-date and timely manner. Ye
et al. [21] also took into consideration the encryption of personal data security which
allowed businesses to avoid divulging sensitive data when exchanging the personal
information and ensuring that the information was accessible transparently, trace-
able, and immutably. Lu and Xu [7] carried out a traceability procedure utilizing
the blockchain technology backed shared protocol, however, they did not take into
consideration the additional benefit of the blockchain through the existing structure
and hence the application of clever contracts. Salah et al. [9] suggested a way to
follow up and carry out transfers without the need for a trustworthy third-party entity
using an Ethereum blockchain of smart contracts.
Since the research done on blockchain to be used in the event management field
is still developing, there are not many platforms in the market that use the chain
information management systems which are supported by blockchain technology,
the theoretical research on the blockchain is yet to improve.
224 V. Naman et al.
13.3 Preliminaries
In this section, we discuss some of the detailed key points that are relevant and
important for the sake of understanding this chapter.
What is a blockchain?
Blockchain is one of the booming technologies that is gradually becoming more
prominent [15]. A blockchain can be described as a combination of a distributed
ledger database and a consensus algorithm that gives it certain characteristics
like distributed, decentralized, immutability, integrity, tamper-proof, etc. [22]. This
records all the transactions that have occurred in a network in the form of logs that are
verified and authenticated by the nodes in the network, making the entire procedure
transparent and irreversible.
This technology came into existence about 10 years ago when the cryptocurrency
Bitcoin was first introduced [23]. Now, blockchain technology is not only being
used in cryptocurrency but is also used in many applications such as the medical
industry, supply chain management, the travel industry, and many more [14, 24, 25].
It can broadly be divided into permission-less and permissioned blockchain, where
the permission-less or public blockchain is entirely decentralized as a node can enter
and leave a network at any point in time [26]. Whereas, the permissioned blockchain
which is further classified into private and consortium blockchains, has restrictions
regarding certain decisions to be taken in the network.
As you can see in Fig. 13.1, the blockchain-built traceability system explained in this
chapter consists of organized entities such as users and events. Every node within
the network correlates to an Ethereum account, that represents its identity within the
system and it might not deploy the smart contracts. The organized entities within the
chain can be reviewed as Admin, Organizer, Events, User, and Tokens. The functions
of each of the following nodes are as follows:
Admin: Admin is the head of the department who plays a key role in this supply
chain network. Admin provides a web platform where the user can register for an
event that he has to attend and at the same time mints the tokens to the token entity.
Admin forms an agreement with the organizer who wants to organize the event.
Organizer: As a middleman in the process of forming an agreement with the admin
and organizing the event, the organizer is responsible for conducting events and
Fig. 13.1 An overview of the participants in the system of the solution proposed
226 V. Naman et al.
managing all the process planning for the event. When an organizer forms an agree-
ment with the admin, he will share every detail about the event with the admin so that
the application can be tweaked to display the right details for the usage of customers.
Event: In the workflow, the event is the entity that provides the details of the event
such as type of event, venue, date of the event, etc. to the users who want to register
and book their tickets.
User: User is the individual who finally decides whether he wants to attend the event
or not. The user signs up on a website provided by the admin by giving his details
such as his name, phone number, email, etc. Instead of giving his card details for
booking tickets, the user first pays the fiat cash using a gateway where this cash is
received and in turn, the value of the token in the e-wallet is changed, this token is
assigned to the user in an e-wallet provided by the admin at the time of registration.
Token: This is the entity which allows the transfer of ownership of the ticket(s) from
the admin to the customer, this token is assigned to the user when he creates his
account in the application. The user can change the value of the token by spending
fiat currency or he can also change the value by spending the deposited amount for
buying a ticket to any specific event.
Ticket: In the form of a QR Code, this is the most essential part of gaining access to
any event, the code is scanned at the event and the ticket holder is allowed into the
event. This is generated using the id of the customer and the details of the events.
This data is converted into a QR code and this is shown to the customer only before a
stipulated time of the event commencement, this is done so that there is no duplication
of the code.
Figure 13.2 depicts the activity diagram for the event ticket booking system in which
the flow between the activity of signing up, minting of tokens, organizing the event
is portrayed, and finally generates a dynamic QR code.
The main activities involved in this activity diagram are as follows: Sign up
activity, Choosing event activity, Payment activity.
Signup activity: The signup activity allows users to log in or create an account on a
particular website. The user should provide his details (name, phone number, email
id), by doing this the user account gets created. Once the user creates his account, an
OTP will be sent to his registered phone number/email id. Once the user enters the
password, his account gets created on the website and the user can proceed to the
next forum.
Choosing event activity: After signing up successfully, the user can set the location
and select the choice of the event that he wants to attend. Once he selects the event
13 Secure Event Ticket Booking Using Decentralized System 227
Fig. 13.2 The activity diagram showing the activities carried out as a part of this solution
of his choice, he then has to select the number of seats required and check if they are
available or not.
Payment: The most important phase of this proposed model where there is no
involvement of third parties in the exchange for the currency. Once the user reaches
this stage instead of paying the amount through the card on an online portal, he will
have to pay fiat cash to the organization department from where the tokens are minted
and will be credited into the user’s wallet which is assigned to each user who signs
up. When the tokens are received, the user can do the payment through the gateway
and if the payment is successful the user will get a message of confirmation details
to his mobile number, and finally, the QR code gets generated and will be displayed
on the ticket.
Features of the activity diagram for the event ticket booking system include all
the objects (sign up, choosing an event, payment) that are interlinked. Users will be
able to register for an event by signing up on the online portal. The value of the token
changes every time there’s a fiat payment. Tokens are minted and assigned only when
a new user signs up, once a token is received and confirmed by the database, the user
can reserve the seats, get approval for them, and finally view the dynamic QR code,
which shows the full description and flow of booking a ticket, updating token value
and payment for the seats.
228 V. Naman et al.
This use case diagram shown in Fig. 13.3 is a graphical depiction of the interactions
among the entities of the event ticket management system. It represents the plan used
in the system analysis to fetch, clarify, and organize the system requirements for the
model proposed. The main 4 actors involved in this process include user, admin,
database, and payment gateway.
User: The use case of a user includes signing up if he/she is new to the web platform.
Log in if he/she is an existing user and authenticate whether the user is a valid person
or not. Once the user is directed to the website, his/her next task is to select a location,
choose the event, check if the seats are available and if they are available then select
the type and number of seats required by the user. Once everything is done, the user
should pay fiat cash to increment the value of their token through which the tickets
can be bought.
Fig. 13.3 The activity diagram showing the activities carried out as a part of this solution
13 Secure Event Ticket Booking Using Decentralized System 229
Database: The main objective of the database is to store each information provided
by the user and the admin and once the payment is successful display the QR code
to the user.
Admin: The use case of an admin includes signing up, and responding to the user’s
actions such as reserving the seats, getting approval of seats.
Payment Gateway: The use case of a payment gateway is to verify the fiat cash
payment made by the user to increment the value of their token so that they can
purchase the required ticket/s.
Figure 13.4 depicts the various interactions between the admin and the organizer
which are explained below in detail. The relation between the admin and the organizer
must be clear and strong for the successful organization of any event without any
miscommunication or difference of opinions.
For that to happen, the organizer must inform the admin about the venue and
location of the event. They must also inform the capacity, facilities, seat hierarchy,
and layout of the venue. Along with these details, the price of each seat/ticket must
also be discussed with the organizer so that the individual profits can be decided
upon with mutual agreement.
The proposed model (Fig. 13.5) described in this chapter mainly includes orga-
nized entities and users which are secured through a decentralized network. The enter-
prise entities include organizers, organizations, events, and tokens. The responsibility
and individual roles of every network are given as follows.
Organization Department: The organization department is the head of the depart-
ment where the procedure of minting tokens is decided and the procedure of forming
an agreement with the event organizer takes place. In this department, the partic-
ular organization member is going to provide his name, email id, and phone number
230 V. Naman et al.
Fig. 13.5 The class diagram describing the properties of the various entities
(which is the primary key). These details are only visible to the organizer who wants
to agree with the organization member.
Organizer Department: The organizer’s work is to organize an event. They will
handle the whole process of planning an event and carrying on post-event evaluation.
This organizer shares his name, phone number, and email id with the organization
department and each organizer has a unique ID (primary key) which helps the orga-
nization department to identify what type of event is being organized and it helps in
forming an agreement signed between the organizer and the organization.
Event Department: This department includes the details about the event name, the
event type, venue of the event, date of the event. Even this department has a unique
ID (primary key) which allows the organizer to refer to the event and its details.
Token Department: This is the department in which the value of the tokens is
updated when the user pays the fiat cash for purchasing an event ticket. Tokens will
only be minted when there’s a new user and these minted tokens will be added into
the user’s wallet. It keeps the record of how much value has been spent and keeps
changing the value.
User Department: This department takes care of storing the details like name, phone
number (primary key), email id, address provided by the user at the time of signing
up, and assigns each user with a unique ID that is encrypted. This ID contains the
details of the user and helps maintain their identity. After the user is registered, they
are provided with a unique e-wallet that has a token and the unique ID linked to it.
Whenever a user wants to book a ticket, he needs to login onto the online portal and
pays the fiat currency to update the value of his token in the wallet. The user can then
13 Secure Event Ticket Booking Using Decentralized System 231
pay for the ticket using the token and the generated dynamic QR code is sent to the
user’s registered phone and the value of the token is changed accordingly.
The above state (Fig. 13.6) diagram represents the flow of the process a user has
to follow to be able to log in, book a ticket, and exit the application. Firstly, the
user would have to register by entering all the details in the designated boxes, if
registration is over, then the user can directly login using the username and password
designated to the user during the registration process.
The user can check his previous transactions, the user can also book tickets by
setting the location which is comfortable to the user. He can then decide on which
event he wants to go to and he has to select the seats in the event.
After this, he has to update the value of the token using the payment gateway.
Using the updated token, he can buy the tickets for the value in the token. After paying
for the seats, the seats will get reserved under your name. The user will receive a QR
code that can be scanned at the venue of the event. After receiving the QR code the
user can then decide to log out of the application to exit it.
We have designed three smart contracts, they are User Registration contract, Wallet
contract, and Ticket Update contract for the sake of our model. The user registration
contract holds the address of the wallet contract, and the wallet contract holds the
address of the ticket update contract such that the contracts are linked to each other
and coordinated. In the user registration contract, every user is designated with a
wallet contract address when they register on the platform. In the wallet contract, the
user can update the value of the token possessed by the user’s wallet. In the ticket
update contract, the user is given ownership over a ticket after the user meets the
232 V. Naman et al.
required criteria. Any user can inquire about the transfer history of the acquired ticket
to verify the authenticity of that ticket. The individual functions of each contract are
as follows:
User Registration Contract: This contract is deployed by the admin. Furthermore,
it provides a user registration function register() which stores the registration infor-
mation of each user forever. The user provides information like name, phone number,
email, etc. and gets registered through a unique code (OTP) sent to the user’s unique
phone number. As soon as the user is registered, this contract will deploy the wallet
contract with the current user’s address. This will assign the current user with an
e-wallet that is linked to the user’s address in the user registration contract.
Wallet Contract: This contract is deployed by the user after registration and it
provides the function addWallet(). The wallet assigned to the user will contain a token
whose initial value is zero. This contract also contains another function buyToken()
through which the value of this token can be incremented after the user’s payment has
been verified at the payment gateway. After the buyToken() function is executed, the
ticket update contract is deployed. This contract provides the function of assigning
and updating the ownership of the tickets.
Ticket Update Contract: This contract is deployed after the buyToken() function
is executed and it provides the functions buyTicket() which decrements the value of
the token assigned to the wallet owned by the user and updateTicket() which updates
the owner of the ticket. If the ticket is purchased for the first time, the QR code is also
attached, otherwise, the hash of the previous transaction is referred. The acquired
transaction information is added to the list of transaction records managed in this
contract, including the hash of the current buyer of the ticket, the seller of the ticket,
the previous transaction’s hash, and timestamp.
Note: The list of transactions will only be revised if the current transaction is
completed successfully and it will be linked to the blockchain if the previous trans-
action’s hash is valid; else, an exception/error occurs. This guarantees that every
transaction added to the block is credible and legit, prohibiting the selling of false
tickets or multiple copies of a ticket.
13.5.1 Algorithms
Following is the explanation of the five algorithms that we have used as per the
solution.
Algorithm 1 register()
Input: Message sender (msg.sender), username (username), phone
number (phonenumber), Email (emailID), current timestamp (now), autho-
rization list (authlist), user count (usercount), wallet contract address
(wcaddr) (Fig. 13.7).Please check and confirm if the inserted citations of
Figs. 13.7–13.11 are correct. If not, please suggest an alternate citations. Please
13 Secure Event Ticket Booking Using Decentralized System 233
note that figures should be cited sequentially in the text.All the inserted citations of
figures from 13.7-13.11 are correct.
Explanation
The function register(), represented in Algorithm 1 allows a new user
to register on the online platform. This function takes the following inputs:
message sender (msg.sender), username (username), phone number
(phonenumber), email (emailID), current timestamp (now), authoriza-
tion list (authlist), user count (usercount), and wallet contract address
(wcaddr).
Here, the authorization list includes the list of all accredited user’s Ethereum
addresses in this contract. If the message sender’s address matches any address in
the authorization list, then the algorithm will check to see that no user with this
phone number has already registered. If both of these conditions are satisfied, then
the algorithm will register this user on the platform and stores the details like the
username, msg.sender, phonenumber, emailID, now and wcaddr to the
blockchain. The algorithm will then increment the count of the users by incrementing
usercount.
234 V. Naman et al.
If either one of the conditions fails, then the state of the contract is reverted, an
error is shown and the user is not registered. Once a user is registered, he/she can
then use all the facilities provided on the platform.
Algorithm 2 addwallet()
Input: Message sender (msg.sender), username (username),
phone number(phonenumber), Email (emailID), current times-
tamp(now), authorization list(authlist), user count(usercount), wallet
count(walletcount) (Fig. 13.8).
Explanation
The function addWallet() described in Algorithm 2 is used to assign every user
with a unique e-wallet which contains a token whose initial value is zero. This
function takes in the following inputs: message sender (msg.sender), username
(username), phone number (phonenumber), email (emailID), current
Algorithm 3 buytoken()
Input: Message sender (msg.sender), phone number (phoneNumber),
money paid (moneypaid), wallet ID (walletID), token value
(tokenValue), authorization list (authlist), ticket update contract address
(tucaddr), current timestamp (now) (Fig. 13.9).
Explanation
The function buyToken() represented in Algorithm 3 is used to increment the
value of the token in the wallet of the user after the fiat currency payment has
been verified by the payment gateway. This function takes the following inputs:
message sender (msg.sender), phone number (phoneNumber), money paid
(moneypaid), wallet ID (walletID), token value (tokenValue), autho-
rization list (authlist), ticket update contract address (tucaddr), and current
timestamp (now).
Here, the authorization list includes the list of all accredited user’s Ethereum
addresses in this contract. If the message sender’s address matches any address in
the authorization list, then the algorithm will check to see that the user with this
wallet id and phone number is already registered. If both of these conditions are
satisfied, then the algorithm will increment the value of the token with the amount
of fiat currency paid after this payment is verified at the payment gateway. Then the
walletID, phoneNumber, tokenValue, now, msg.sender, moneyPaid,
and tucaddr are added to the blockchain.
If either one of the conditions fails, then the state of the contract is reverted, an
error is shown and the value of the ticket is not incremented. Once the value of the
token is incremented concerning the fiat currency payment made, he/she can then
book the tickets for any event on the online platform.
Algorithm 4 buyticket()
Input: Message sender (msg.sender), phone number (phoneNumber),
event name (eventname), wallet ID (walletID), token value
236 V. Naman et al.
Explanation
The function buyTicket() represented in Algorithm 4 allows a user to buy tickets
for any event that is available on the online platform by consuming the value of the
token in the user’s wallet. This function takes the following inputs: message sender
(msg.sender), phone number (phoneNumber), event name (eventname), wallet
ID (walletID), token value (tokenValue), authorization list (authlist), current
timestamp (now), and ticket cost (ticketcost) (Fig. 13.11).
Here, the authorization list includes the list of all accredited user’s Ethereum
addresses in this contract. If the message sender’s address matches any address in
the authorization list, then the algorithm will check to see that the user with this wallet
id and phone number is already registered. After this, the algorithm will verify the
13 Secure Event Ticket Booking Using Decentralized System 237
value of the token to be greater than or equal to the cost of the ticket. If all the three
conditions are satisfied, then the algorithm will generate a QR code and make the
user the owner of the ticket, keeping the phone number as the main constraint. The
value of the ticket cost is subtracted from the value of the token and the final token
value is updated.
If this user is the first owner of this ticket, then the tokenValue,
phoneNumber, walletID, msg.sender, QRcode, and now are added to the
blockchain, otherwise, the updateTicket() function is called. If either one of
the conditions fails, then the state of the contract is reverted, an error is shown and
the user does not get the ownership of the ticket. Once the ownership of the ticket
is given to the user, he/she can use this to either attend the event or sell it to another
user at a cost not more than the original ticket cost.
Algorithm 5 updateticket()
238 V. Naman et al.
Explanation
The function updateTicket() represented in Algorithm 5 allows the transfer
of ownership of the ticket between various users. This function takes the following
inputs: message sender (msg.sender), buyer’s address (buyer), current trans-
action (currentTr), previous transaction (previousTr), authorization list
(authList), transaction count (trCount), seller’s wallet id (walletID),
current timestamp (now).
Here, the authorization list includes the list of all accredited user’s Ethereum
addresses in this contract. If the message sender’s address matches any address in the
authorization list, then the algorithm will check to see that the previous transaction is
13 Secure Event Ticket Booking Using Decentralized System 239
valid in the blockchain. If both of these conditions are satisfied, then the algorithm will
log currentTr, msg.sender, previousTr, buyer, now, and walletID
to the blockchain. The algorithm will then increment the count of the transactions
by incrementing trCount. If either one of the conditions fails, then the state of the
contract is reverted, an error is shown and the buyer is not given the ownership of
the ticket. Once the ownership of the ticket is given to the buyer, he/she can use this
to either attend the event or sell it to another user at a cost not more than the original
ticket cost and the seller no longer owns any right over this ticket.
The blockchain traceability system proposed in the chapter meets the following
security requirements [31, 32]:
Data accessibility: As the system can be viewed to anyone, users can access the
system to see data related to their transactions and bookings.
Sale of non-valid or invalidated tickets: In today’s world, it has become easy to
produce a copy of the tickets without valid identifiers, but when it comes to blockchain
based-solutions it is close to impossible to replicate the tickets. The system proposed
allows only authorized tickets to be stored in the ledger. Once the ticket is identified
as an invalid ticket, the re-selling of the ticket is not allowed by the chain code and
the indivisibility which is vowed by the blockchain makes sure of a consistent state
for each ticket [33].
Data immutability: The selling of paper tickets allows a person to make copies of
the tickets and sell them to different buyers. The proposed model has a tamper-proof
functionality to provide true and reliable data to the users.
System autonomy: The data that gets exchanged in the system follows a fixed algo-
rithm, the nodes that are present in the system will exchange, record, and update data
on their own without any human interference [34].
Opposition to 3rd party attack: Since blockchain is a decentralized system, the
nodes within the system mutually cannot be trusted. Therefore, the system resists
3rd party attacks and prevents malicious nodes from producing false transactions
[35].
From a conceptual point of view, the proposed model need not require a
blockchain. For every ticket, there should be a trustworthy organizer to allow the
owner of the ticket to enter the event. But when it comes to a non-theoretical point of
view, however, blockchain allows the organizer to deploy the application to multiple
providers, trusting them fully.
Moreover, it seems fair for the organizer to run such a system hand in hand which
lets an increase in resilience by earning trust in their infrastructure and improves user’s
encounter by producing all valid tickets being governed in a single application.
240 V. Naman et al.
It has become easy for the scammers to make a copy of a legally-acquired ticket and
replicate the same QR code which helps them in making illegal profits by selling
multiple fake tickets to the users via online platforms or at the event venue. In this
scenario, using blockchain provides a guarantee that the ticket the users are going
to receive is indeed valid and is not a counterfeit or copied ticket. The proposed
prototype shows how blockchain technology helps in recording this step-by-step
procedure in a ledger which cannot be changed with the help of smart contracts and
therefore the process of event registration, minting of tokens, and generating QR
code is conceived through the combination of smart contracts. The proposed system
has some evident decentralized characteristics, which at second hand reduces the
chances of altering data within the enterprises. All the occurrences can be listed
and safely stored in the blockchain via a log. The outcome of the security analysis
shows how the proposed model is identified by data accessibility, sale of non-valid
or invalidated tickets, system autonomy, and opposition to 3rd party attack.
For the betterment of the traceability system suggested in this chapter, future work
could be dedicated to enhancing the proposed prototype by:
1. recognize formatted upload of data with the help of IoT technology to reduce
the chances of manual internal inputs,
2. to make the whole prototype fully automated with no human interaction using
AI or ML.
References
1. Konstantinidis, I., Siaminos, G., Timplalexis, C., Zervas, P., Peristeras, V., Decker, S.:
Blockchain for business applications: a systematic literature review. In: Abramowicz, W.,
Paschke, A. (eds.) Business Information Systems. BIS 2018. Lecture Notes in Business
Information Processing, vol. 320. Springer, Cham (2018)
2. Toyoda, K., Mathiopoulos, P.T., Sasase, I., Ohtsuki, T.: A novel blockchain-based product
ownership management system (POMS) for anti-counterfeits in the post supply chain. IEEE
Access 5, 17465–17477 (2017)
3. AXS: Ticket selfie equals ticket theft unless you have id-based, digital tickets. https://www.
theguardian.com/money/2016/mar/21/online-ticket-fraud-social-media-users-warned-twitter-
facebook-get-safe-online
4. Koblitz, N., Menezes, A.J.: Crypto cash, cryptocurrencies, and crypto contracts. Des. Codes
Cryptogr. 78, 87–102 (2016). https://doi.org/10.1007/s10623-015-0148-5
5. Fan, K., Wang, S., Ren, Y., Li, H., Yang, Y.: MedBlock: efficient and secure medical data
sharing via blockchain. J. Med. Syst. 42(8), 136 (2018)
6. Hasan, H.R., Salah, K.: Blockchain-based solution for proof of delivery of physical assets. In:
Chen, S., Wang, H., Zhang, L.-J. (eds.) ICBC 2018. LNCS, vol. 10974, pp. 139–152. Springer,
Cham (2018). https://doi.org/10.1007/978-3-319-94478-4_10
7. Lu, Q., Xu, X.: Adaptable blockchain-based systems: a case study for product traceability.
IEEE Softw. 34(6), 21–27 (2017)
13 Secure Event Ticket Booking Using Decentralized System 241
8. Jones, R.: Social media users warned over a rise in online ticket fraud (December 2015). http://
solutions.axs.com/ticket-selfie-equals-ticket-theft-unless-you-have-id-based-digital-tickets/
9. Salah, K., Nizamuddin, N., Jayaraman, R., Omar, M.: Blockchain-based soybean traceability
in the agricultural supply chain. IEEE Access 7, 73295–73305 (2019)
10. Tackmann, B.: Secure event tickets on a blockchain. In: Garcia-Alfaro, J., Navarro-Arribas, G.,
Hartenstein, H., Herrera-Joancomartí, J. (eds.) Data Privacy Management, Cryptocurrencies,
and Blockchain Technology. DPM 2017, CBT 2017. Lecture Notes in Computer Science, vol.
10436. Springer, Cham (2017)
11. Gencer, A.E., Basu, S., Eyal, I., Van Renesse, R., Sirer, E.: Decentralization in bitcoin and
ethereum networks (2018)
12. Nofer, M., Gomber, P., Hinz, O., et al.: Blockchain. Bus. Inf. Syst. Eng. 59, 183–187 (2017).
https://doi.org/10.1007/s12599-017-0467-3
13. Glomann, L., Schmid, M., Kitajewa, N.: Improving the blockchain user experience—an
approach to address blockchain mass adoption issues from a human-centred perspective. In:
Ahram, T. (ed.) Advances in Artificial Intelligence, Software and Systems Engineering. AHFE
2019. Advances in Intelligent Systems and Computing, vol. 965. Springer, Cham (2020)
14. Perboli, G., Musso, S., Rosano, M.: Blockchain in logistics and supply chain: a lean approach
for designing real-world use cases. IEEE Access 6, 62018–66202 (2018)
15. Lin, Q., Wang, H., Pei, X., Wang, J.: Food safety traceability system based on blockchain and
EPCIS. IEEE Access 7, 20698–20707 (2019)
16. Wang, S., Li, D., Zhang, Y., Chen, J.: Smart contract-based product traceability system in the
supply chain scenario. IEEE Access. pp. 1-1 (2019). https://doi.org/10.1109/access.2019.293
5873
17. Figorilli, S., et al.: A blockchain implementation prototype for the electronic open-source
traceability of wood along the whole supply chain. Sensors 18, 3133–3146 (2018)
18. Zhang, J., et al.: A review on blockchain-based systems and applications. In: Hsu, C.H., Kallel,
S., Lan, K.C., Zheng, Z. (eds.) Internet of Vehicles. Technologies and Services Toward Smart
Cities. IOV 2019. Lecture Notes in Computer Science, vol. 11894. Springer, Cham (2020)
19. Yining, H., et al.: A delay-tolerant payment scheme based on the Ethereum blockchain. IEEE
Access 7, 33159–33172 (2019)
20. Li, Z., Wu, H., King, B., Miled, Z.B., Wassick, J., Tazelaar, J.: A hybrid blockchain ledger
for supply chain visibility. In: Proceedings of 17th International Symposium on Parallel and
Distributed Computing (ISPDC), Geneva, Switzerland, Aug 2018, pp. 118–125
21. Ye, X., Shao, Q., Xiao, R.: A supply chain prototype system based on blockchain, smart contract
and Internet of Things. Sci. Technol. Rev. 35(23), 62–69 (2017)
22. Schiller, K.: Was isteineDApp (dezentralisierte App), Blockchainwelt. https://blockchainwelt.
de/dapp-dezentralisierte-app-dapps/ (2018). Retrieved 31 Jan 2019
23. Benatia, M.A., Remadna, A., Baudry, D., Halftermeyer, P., Delalin, H.: QR-code enabled
product traceability system: a big data perspective. In: Proceedings of 16th International
Conference on Manufacture Research (ICMR), Skövde, Sweden: University, Skövde, Sept
2018, pp. 323–328
24. Guts, B.V.: Guts tickets (2017). https://guts.tickets
25. Buterin, V., Di Lorio, A., Hoskinson, C., Alisie, M.: Ethereum: a distributed cryptographic
ledger (2013). http://www.ethereum.org/
26. Szabo, N.: Smart contracts: formalizing and securing relationships on public networks. First
Monday 2(9) (1997). https://doi.org/10.5210/fm.v2i9.548Ijdf
27. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin.org, White Paper, 2008
28. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better—how to make bitcoin a better
currency. In: International Conference on Financial Cryptography and Data Security. Springer,
Heidelberg, pp. 399–414 (2012)
29. Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P.,
Shi, E., Gun Sirer, E., Song, D., Wattenhofer, R.: On scaling decentralized blockchains. 3rd
Workshop on Bitcoin Research (BITCOIN), Barbados (2016)
242 V. Naman et al.
30. Alharby, M., van Moorsel, A.: Blockchain-based smart contracts: a systematic mapping study,
125–140 (2017). https://doi.org/10.5121/csit.2017.71011
31. Singh, S., Singh, N.: Blockchain: future of financial and cybersecurity. In: Proceedings of 2nd
International Conference on Contemporary Computing and Informatics (IC3I), Noida, India,
Dec. 2016, pp. 463–467
32. Tracking Platform Test. Accessed 18 July 2019 (Online). Available: https://github.com/sno
wby-ldy/eth-traceabilityplatform
33. Meier, A.: Blockchain. HMD55, 1133–1134 (2018). https://doi.org/10.1365/s40702-018-004
67-5
34. Aitzhan, N.Z., Svetinovic. D.: Security and privacy in decentralized energy trading through
multi-signatures, blockchain, and anonymous messaging streams. IEEE Trans. Dependable
Secur. Comput. (2016)
35. Siddiqui, S.T., Ahmad, R., Shuaib, M., Alam, S.: Blockchain security threats, attacks, and
countermeasures. In: Hu, Y.C., Tiwari, S., Trivedi, M., Mishra, K. (eds.) Ambient Communi-
cations and Computer Systems. Advances in Intelligent Systems and Computing, vol. 1097.
Springer, Singapore (2020)
Chapter 14
Cloud Identity and Access Management
Solution with Blockchain
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 243
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_14
244 S. P. Otta and S. Panda
14.1 Introduction
rights of users for various resources. This also permit the transfer of right among
users originating from any policy changes in the enterprise.
The organization of the rest of the chapter is as follows: Sect. 14.2 provides details
of Identity and Access management. Section 14.3 discusses some IAM Concerns.
Section 14.4 elaborates Blockchain as a technology and its application to address
IAM issues. Open research issues are covered in Sects. 14.5 and 14.6 concludes the
chapter.
Conceptually Cloud Computing has evolved from grid computing. This is used for
organizing and providing internet-based information technology (IT) management
functions for enterprises. Everything is delivered in enterprise computing as service,
where the user is required to communicate multiple service providers to perform
desired transaction. In this matter, identity federation in Enterprise Computing
model, is a security model which facilitate users to log into interconnected and inte-
grated system having single set of credentials for signing on, without considering
implementation technologies as well as infrastructure involved.
Password Authentication
This is the easiest method to be used. But it must have desired difficulty level
to prevent it from being easily guessed. It must be regularly renewed to maintain
security. This type of authentication is well established with a common weakness.
Although proper user id and associated passphrase is applied, still it may be difficult
to justify that such access is initiated from a legitimate user and is vulnerable to
shoulder surfing attack [1]. However, password authentication continues to be most
commonly followed authentication means for transactions.
Trusted Platform Module Based Authentication
It is based on a hardware security module like a hardware lock. This lock uses a secure
crypto processor that is capable of storing cipher keys for information protection. A
commonly known variant of this is Mobile Trusted Module (MTM). This suggested
standard is issued by Trusted Computing Group (TCG), which is a consortium of
Microsoft, AMD, IBM, Intel, and Hewlett-Packard. This method is mostly applied
to authenticate telecommunication system terminals. Moreover, this is considered
to be a type of authentication method using online mechanism involving Subscriber
Identity Module (SIM) for its effective utilization in smartphones.
Trusted Third Party Authentication
Generally, a Trusted Third Party (TTP) service those are implemented in cloud
services establishes desired trust mechanism and provide solutions to ensure confi-
dentiality, integrity, and authenticity. This is also used to ensure security of transacted
data. Public key infrastructure (PKI) with TTP facilitates a robust means for imple-
menting effective authorization having desired authentication inbuilt into it. Public
key cryptography authentication means are used for implementation of PKI. A known
example of authentication using TTP is known as Single Sign On (SSO). Moreover,
TPP performs the task of an authentication server or a certifying authority that has
overcomes security bottlenecks concerning the system. This SSO method of authen-
tication is generally a preferred means to be widely followed in federated cloud
environments. However the TTP associated could be treated as a singular failure
point.
Multifactor Authentication
Authentication using multiple and collective factors [20] is a process that ensure,
there is a combination of two or more means of authentication for a legitimate user.
14 Cloud Identity and Access Management Solution with Blockchain 251
Implicit Authentication
Authentication by implicit method uses constant observation of client behavior. This
is most suitable for mobiles as they can collect many type of users’ information. To
name a few, user location, movement of user, communication made by user, as well as
usage of various applications by the users. For providing stable and desired services
to users and their profile associated saved personal credential, many techniques have
been studied which are applicable to mobile cloud scenario [25].
Blockchain Authentication
Using Blockchain authentication method, a distributed ledger carries out desired veri-
fication thereby ensuring legitimacy of users messages and transactions. The need for
a TTP to provide authentication is eliminated. Simultaneously costs of expenditure
could be further curtailed with security and privacy are remarkably improved. The
process of authentication is accessed to be more difficult in a distributed scenario.
Blockchain authentication [11] is done by smart contracts which are deployed asso-
ciated with blockchain. Smart contract generator is usually created using Smart
Contract Authentication (SCA) layer. This is activated and executed whenever
an authentication request gets generated or self-govern it from pre-defined set of
desirable actions.
and also responsible for the de-provisioning of user accounts. Effective management
of identity and associated control of attributes are required for managing identities
towards various services. It is essentially desired to simplify user provisioning process
by proper identity management. Identity management may be analyzed considering
both users as well as digital entities. Security of user identity is associated with related
software systems to store identity credentials, related data, so also communication
link over which identity is desired to be verified and then established. For access
control and related matters, digital signature technique provides a secure mechanism
for user verification. For secured identity and access management using blockchain,
cryptographically secured system for managing identity can become more robust by
decentralizing the access method, verification and related transactions. Several types
of identity management methods are described below in this regard.
Independent IDM
In this method managing and owning of user credentials are responsibility of a single
entity. It is seen as mostly centralized internet identities. However, such independent
identity repository model possesses some definite shortcomings. In this the users
are not regarded as the owners of their own identity record. There is a possibility
that user identity credentials could be revoked or may even be misused by identity
provider.
Federated IDM
This mechanism is comparatively difficult for its implementation and require desired
service level agreement and proper trust relationship between offered service. Feder-
ated identity management systems [24] is expected to provide authentication as well
as authorization spreading beyond one organization and its administrative system
boundary. This essentially needs service level agreement (SLA), by means of that
identity credentials of one service provider is respected and acknowledged by other
providers. Data ownership of the systems associated with corresponding service
providers are also covered in the SLA. Identity provider is responsible for managing
user accounts independently. There is no requirement of enterprise user directory
wise integration. This mechanism lowers the security risk because of propagation of
use credentials and non-replication.
Self-sovereign IDM
In this type users and systems are capable of storing own identity related data on its
devices in a decentralized manner. This system securely give out their identity related
credential to those who require this for validation as and when required, without
depending on a central identity data repository. Self-sovereign identity concept is
emerging as a new means in which users are permitted for controlling self-digital
identity [17]. This method facilitates full control for user security as well as complete
portability of user’s data. As described by Sovrin foundation self-sovereign identity
is expressed as an Internet for identity. There is no identity owner in this huge pool.
Rather every user can use it and also permitted to further improve it.
14 Cloud Identity and Access Management Solution with Blockchain 253
In integrated system, Identity and Access Management (IAM) signify how securely
identity authentication and authorization means are used to manage desired appli-
cations of the system. This is followed for authentication of users, devices and in
certain cases services. For accessing the desired application, own identity repository
or technique to authenticate a system or service is always not mandatory. Rather
process of establishing identity may be achieved with the help of trusted third party
identity provider. This mechanism reduces workload of the application substantially.
This can also be used from outside an enterprise for handling business to business
oriented strategic relationship. This can even be used between a private enterprise
system and cloud service provider. This way this is implemented in a Multi-Cloud
or Federated environment.
Many method and protocols have been proposed by various researchers for
handling identity in cloud environment. Among authentication and authorization
protocols already developed and available for federated identity, three protocols are
generally found to be well accepted and established. They are SAML, OAuth and
OpenID [16]. These protocols differ in provisioning to address security related issues
of exchanging privileged data, authentication and authorization. Simultaneously all
three mentioned methods adopt same procedure, which is essentially a token based
solution. Below we deliberate on such methods.
OAuth
This is an Open Standard protocol that is used to provide secured and authorization
service in delegated manner. Without sharing users’ password, only limited access
may be permitted for other applications with this method. With reference to OAuth
nomenclature, Service Provider is termed as Resource Server, Identity Provider is
called as Authorization Server and the User is known as Resource Owner. In OAuth
flow of operation, when resource owner’s status is online by logging in, the client
application essentially receives two tokens from the Authorization Server. One is
Access Token while other is Refresh Token. Access tokens so generated are designed
to be short lived considering its security and for preventing token theft. Client use
refresh token without undergoing login process again and again for getting access
token, afresh from respective Authorization Server on completion of active life of last
254 S. P. Otta and S. Panda
generated access token. Newly generated refresh tokens also carry relevant expiry
period.
OpenID
This is operated as an additional authentication mechanism over OAuth. It is essen-
tial for having specific OpenID account associated with available OpenID identity
providers. After logging on a user on such IdP is then capable of obtaining access
to privileged services which directly reside on resource servers. At the same time
relaying party then processes the desired OpenID authentication. There is a redirec-
tion from OpenID for the concerned user to IdP and further OpenID Provider for
getting authenticated. While using services by relying party’s access request and on
being authenticated with login credentials for user SSO session, the IdP assign that
service access having desired authorization.
Several researchers have identified problems associated with this research area and
have suggested many solutions to IAM. Below mentioned Table 14.2 depicts a list
of suggested approaches for solution to some of such problems. Related aspects of
solutions specifically have been highlighted on the usage of Blockchain technology.
environment. Accordingly no specific means is proposed to decide depending on any TTP. This solution is known to have been
about particular user who is to be made responsible regarding developed from Bitcoin techniques
specific action for system functioning
257
258 S. P. Otta and S. Panda
Consensus Mechanism
Blockchain systems are independent of any third party trusted authority due to their
decentralized approach. In blockchain adoption, decentralized consensus mechanism
is vital for ensuring reliability, consistency of data, and also the transactions. Some
four well known consensus mechanisms are in use. They are Proof of Stake (PoS),
Proof of Work (PoW), Practical Byzantine Fault Tolerance (PBFT), and Delegated
Proof of Stake(DPoS).
PoW mechanism use puzzle solution for establishing credibility of data. Generally
used puzzle is computationally difficult but an easily verifiable problem. For creation
of a block by a node it is mandatorily required to solve a PoW puzzle. On being
resolved, it is broadcasted to other nodes for achieving consensus. PoW mechanism
require huge amount of calculations thereby wasting of computation capabilities.
For proving credibility of user data, the PoS mechanism use proof of ownership
of cryptocurrency. For block creation or any transaction, in a PoS based arrangement
users are supposed to pay desired amount of cryptocurrency. On successful validation
of transaction or block creation used cryptocurrency amount are sent back to original
node like a type of bonus. Else it is used as a fine. PoS mechanism increases the
throughput of blockchain system as it can effectively reduce load of computation.
Evolution of Technology
From its inception, the blockchain as a distributed ledger technology has matured
through two development stages. They are commonly termed as blockchain 1.0
and blockchain 2.0. Blockchain technology is primarily utilized for cryptocur-
rency transactions in stage 1.0. Like Bitcoin, there exists several other exam-
ples of cryptocurrency. To name a few Litecoin, Dogecoin and many more. With
development of Blockchain 2.0, a new idea called smart contract was introduced
for developing various applications. Smart contract is also signified as a special-
ized code for lightweight decentralized application(dAPP). A commonly known
example of blockchain 2.0 implementation is Ethereum. Every node of Ethereum
run specific Ethereum Virtual Machine (EVM) which enables execution of smart
contracts. In comparison to classical applications, a dAPP possesses undermentioned
characteristics and advantages.
1. Autonomy: Smart contracts are designed to be deployed and run on the
blockchain systems. Smart contracts are the core mechanism behind develop-
ment of dAPPs. Accordingly, dAPPs can run autonomically and independently
without any other’s assistance or participation.
2. Stable: State tree of blockchain holds generated bytecodes of smart contracts.
Every full node has information of all blocks as well as stateDB. These nodes
also store the generated bytecodes. Accordingly, considering probable failure of
some nodes, its operation is not likely to be affected. This mechanism ensures
stability of dAPPs.
3. Secure: Blockchain consensus mechanism along with public key cryptography
ensures the security as well as desired operations of smart contracts. This in
turn also maximizes security of dAPPs.
4. Traceable: All information related to smart contracts is stored as event logged
transactions in the blockchain. Accordingly every actions and operations
involving dAPPs are saved which are traceable as well.
Working of blockchain is explained here with the help of Fig. 14.3. It depicts a money
transfer example scenario, wherein Alice wishes to transfer some money to Bob.
262 S. P. Otta and S. Panda
1. Firstly, Alice starts initiation of this transaction with computer using her slotted
Bitcoin wallet.
2. This transaction incorporates related sender information like the sender’s wallet,
address of the receive and to be transferred amount. Its mandatory for said
transaction to be signed by private key of Alice which thereafter could be verified
and made accessible to other users with public key of Alice. Further the system
broadcasts this initiated transaction to everyone in the P2P network.
3. Subsequently, successfully validated transaction gets appended at the end of
transactions list. This creates a new block in blockchain when the miner of
blockchain solves required puzzles successfully.
4. Ultimately, all nodes save a snap sort of updated blockchain. This happens when
the successful validation of transaction is said to be complete and it is appended
to blockchain.
There are definite differences noticed with blockchain technologies. These differ-
ences are prominently noticed with respect to scalability and native of cryptocur-
rency. Differences could also be noticed pertaining to participation of nodes in the
decentralized network, consensus mechanism etc. An analytical comparison between
various types of Blockchain is presented in Table 14.3.
14 Cloud Identity and Access Management Solution with Blockchain 263
Various Basic Security Techniques and principle that specify as to how Blockchain
technology can ensure security are mentioned below:
1. Confidentiality: It is ensured by this means that only permitted users are allowed
to access the desired information. Blockchain uses a notional-anonymization
technique namely a hash function for hiding user identities and thereby ensuring
confidentiality.
2. Integrity: This property ensure that the information is changed or updated, only
by users permitted to do so. Blockchain incorporates cryptographic technique
for ensuring that transactions are immutable with an aim to verify data integrity.
3. Availability: This property ensures availability of data as desired. It also facili-
tates that the services are always activated upon the request of genuine users. To
achieve this aim Blockchain allow to get blocks stored in decentralized manner
having multiple copy stored in the blockchain.
4. Authentication: By this means, computer system tries establishing identity of
user or computer to permit that user or computer to gain access to certain allowed
and secured resources. This ensure restricted or controlled access permissions
for the said resources. Blockchain technology enables this functionality in terms
of provisioning of private keys for users those are permitted for performing
transactions.
5. Non repudiation: It signify impossible nature for a user or some entity associated
to communication, to not agreeing to have received or to have sent a message.
Such functionality is employed with blockchain due to time stamped event
logging property.
264 S. P. Otta and S. Panda
It is concluded from above discussion that the methods involving MAC and DAC
may not be suitable enough for present day techniques of security advancement.
ABAC and RBAC could be able to keep them abreast with current requirements.
IAM is the most challenging field for research work having huge scope and can be
further explored for its enhancements. Since applications are vulnerable to attacks
in numerous means, this can only be handled with new security techniques for the
situation. Based upon the type of access control means adopted, some issues that
needs attention of researchers are mentioned below.
1. MAC intends to use dispatch functionality for the related tools, utility and system
for the access control infrastructure.
2. MAC model restricts user access. Depending on the protection policy it does
not allow any attempt for alteration by user themselves.
3. A determined setup is essentially required to implement MAC in efficient
manner. It is required to have a heavily loaded organization management to
periodically refresh object and account labels for collecting new data when a
MAC system is implemented.
14 Cloud Identity and Access Management Solution with Blockchain 267
1. Sometimes it produces extra and may even contradicting roles than those of
users.
2. RBAC method of allocation of roles is a static process for the users, which are
not chosen in dynamic situation. It is very troublesome to implement when the
system function dynamically and its environment further distributed.
3. It is troublesome to change access rights of the user without making a change
to the role of that particular user.
4. Dynamic attributes are not recommended for usage with RBAC.
5. Access rights are not likely get modified without changing the user roles. For
implementing RBAC model roles it is recommended to be assigned well prior
to its implementation.
6. A role change may be of advantage for permissions associated role which could
be deleted or distorted.
268 S. P. Otta and S. Panda
1. Multilevel security may result in fine grained and on demand access control
methods.
2. Lack of prominent Personal Identifiable Information (PII).
3. It may lack desired architecture to support clients in data distribution during
information exchanging.
4. Lack of assurance on performance parameters of users by Service Provider.
In this discussion it is pointed out regarding audit and privacy concerns are compa-
rable to each sides of a coin. Both of above mentioned concerns follow the principle of
blockchain technology’s nature of storing information in a tamper proof and openly
accessible mechanism of storage. While trying to handle the privacy related matters
it is not advisable to neglect required transparency of the system. Such a facility can
be achieved by limiting access to stored information following a need to know basis
approach and also only to intended parties. The simplest way for its implementa-
tion could be to adopt a private blockchain implementation. For operating the block,
trusted parties only are permitted to add new blocks to the chain and also to access
information already saved in the blocks. In order to efficiently process encrypted data
in clear mode enough miners would need to decipher such information in the event
data be encrypted in a private chain to further limit information access by others. A
private blockchain is not able to solve this issue of processing of deciphered data and
storage as well as of retrieval of data in encrypted mode in general. This may even
limit itself to replace such matter with the need a TTP. This may lead to a situation
where the private blockchain miners are required to be trusted.
14.6 Conclusion
reliable and technically robust IAM solution for government agencies as well as
corporates can be made available with the help of Bolckchain.
References
1. Awang, M.I., Mohamed, M.A., Mohamed, R.R., Ahmad, A., Rawi, N.A.: A pattern-based
password authentication scheme for minimizing shoulder surfing attack. Int. J. Adv. Sci., Eng.
Inf. Technol. 7(3), 1049–1055 (2017)
2. Belguith, S., Kaaniche, N., Russello, G., et al.: Lightweight attribute-based encryption
supporting access policy update for cloud assisted IoT. In: Proceedings of the 15th International
Joint Conference on E-Business and Telecommunications-Volume 1: SECRYPT, pp. 135–146.
SciTePress (2018)
3. Cha, S.-C., Chen, J.-F., Su, C., Yeh, K.-H.: A blockchain connected gateway for Ble-based
devices in the Internet of Things. IEEE Access 6, 24639–24649 (2018)
4. Cruz, J.P., Kaji, Y., Yanai, N.: RBAC-Sc: role-based access control using smart contract. IEEE
Access 6, 12240–12251 (2018)
5. Dai, H.-N., Zheng, Z., Zhang, Y.: Blockchain for Internet of Things: a survey. IEEE Internet
of Things J. 6(5), 8076–8094 (2019)
6. Faisca, J.G., Rogado, J.Q.: Personal Cloud Interoperability. In: 2016 IEEE 17th International
Symposium on a World of Wireless, Mobile and Multimedia Networks (Wowmom), pp. 1–3.
IEEE (2016)
7. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized
blockchain-based authentication system for IoT. Comput. Secur. 78, 126–142 (2018)
8. Kim, H.-W., Jeong, Y.-S.: Secure authentication management human centric scheme for trusting
personal resource information on mobile cloud computing with blockchain. Hum. Centric
Comput. Inf. Sci. 8(1), 11 (2018)
9. Lee, J.-H.: BIDaaS: blockchain based id as a service. IEEE Access 6, 2274–2278 (2017)
10. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems.
Futur. Gener. Comput. Syst. 107, 841–853 (2020)
11. Lim, S.Y., Fotsing, P.T., Almasri, A., Musa, O., Kiah, M.L.M., Ang, T.F., Ismail, R.: Blockchain
technology the identity management and authentication service disruptor: a survey. Int. J. Adv.
Sci., Eng. Inf. Technol. 8(4-2), 1735–1745 Insight Society (2018)
12. Lin, C., He, D., Huang, X., Khan, M.K., Choo, K.-K.R.: A new transitively closed undirected
graph authentication scheme for blockchain-based identity management systems. IEEE Access
6, 28203–28212 (2018)
13. Lin, Q., Yan, H., Huang, Z., Chen, W., Shen, J., Tang, Y.: An Id-based linearly homomorphic
signature scheme and its application in blockchain. IEEE Access 6, 20632–20640 (2018)
14. Maesa, D.D.F., Mori, P., Ricci, L.: Blockchain based access control. In: IFIP International
Conference on Distributed Applications and Interoperable Systems, pp. 206–220. Springer
(2017)
15. Morrison, J.: Context integrity measurement architecture: a privacy-preserving strategy for the
era of ubiquitous computing. In: 2016 Ieee 7th Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference (Uemcon), pp. 1–10. IEEE (2016)
16. Naik, N., Jenkins, P.: Securing digital identities in the cloud by selecting an apposite federated
identity management from Saml, Oauth and Openid Connect. In: 2017 11th International
Conference on Research Challenges in Information Science (Rcis), pp. 163–174. IEEE (2017)
17. Naik, N., Jenkins, P.: Self-sovereign identity specifications: govern your identity through your
digital wallet using blockchain technology. In: 2020 8th Ieee International Conference on
Mobile Cloud Computing, Services, and Engineering (Mobilecloud), pp. 90–95. IEEE (2020)
18. Niu, Y., Wei, L., Zhang, C., Liu, J., Fang, Y.: An anonymous and accountable authentication
scheme for Wi-Fi hotspot access with the bitcoin blockchain. In: 2017 Ieee/Cic International
Conference on Communications in China (Iccc), pp. 1–6. IEEE (2017)
270 S. P. Otta and S. Panda
19. Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access
control framework for the Internet of Things. Secur. Commun. Networks 9(18), 5943–5964
(2016)
20. Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-
factor authentication: a survey. Cryptography 2(1), 1 (2018)
21. Polyzos, G.C., Fotiou, N.: Blockchain-assisted information distribution for the Internet of
Things. In: 2017 Ieee International Conference on Information Reuse and Integration (Iri),
pp. 75–78. IEEE (2017)
22. Ra, G.-J., Lee, I.-Y.: A study on Ksi-based authentication management and communication for
secure smart home environments. KSII Trans. Internet Inf. Syst. 12, 2–3 (2018)
23. Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication
scheme for the Internet of Things. In: 2016 Ieee Symposium on Computers and Communication
(Iscc), pp. 1109–1111. IEEE (2016)
24. Selvanathan, N., Jayakody, D., Damjanovic-Behrendt, V.: Federated identity management and
interoperability for heterogeneous cloud platform ecosystems. In: Proceedings of the 14th
International Conference on Availability, Reliability and Security, pp. 1–7 (2019)
25. Vhaduri, S., Poellabauer, C.: Multi-modal biometric-based implicit authentication of wearable
device users. IEEE Trans. Inf. Forensics Secur. 14(12), 3116–3125 (2019)
26. Wan, Z., Deng, R.H., et al.: HASBE: a hierarchical attribute-based solution for flexible and
scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754
(2011)
27. Yang, H., Zheng, H., Zhang, J., Wu, Y., Lee, Y., Ji, Y.: Blockchain-based trusted authentication
in cloud radio over fiber network for 5G. In: 2017 16th International Conference on Optical
Communications and Networks (Icocn), pp. 1–3. IEEE (2017)
28. Yin, H., Xiong, Y., Zhang, J., Ou, L., Liao, S., Qin, Z.: A key-policy searchable attribute-based
encryption scheme for efficient keyword search and fine-grained access control over encrypted
data. Electronics 8(3), 265 (2019)
29. Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, Gong, Yu, M.: Authentication with block-
chain algorithm and text encryption protocol in calculation of social network. IEEE Access 5,
24944–24951 (2017)
30. Zheng, Z., Xie, S., Dai, H.-N., Chen, W., Chen, X., Weng, J., Imran, M.: An overview on
smart contracts: challenges, advances and platforms. Futur. Gener. Comput. Syst. 105, 475–491
(2020)
Chapter 15
Blockchain: A New Safeguard
to Cybersecurity
Abstract Blockchain and Cybersecurity are two vivid technologies that have devel-
oped tremendous consideration in recent years. This chapter presents a structure
of existing and possible utilization of blockchain-based cybersecurity solutions for
attackers and defenders to evaluate whether the convergence will steer the results for
one of these groups. It focuses on the blockchain architecture and clarifies the ideas
and different features such as decentralization, trustworthiness, smart contracts, and
immutability. It attempts to feature the role of Blockchain in molding the eventual
fate of Cyber Security. It also deals with trending cryptocurrencies like bitcoin and
Ethereum which are gaining prominence in the recent times and will revolutionize
the way people trade.
15.1 Introduction
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 271
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_15
272 I. Ahmed et al.
place, such as a file or database server [2]. But what if a company’s data was encrypted
and then distributed on a digital ledger. There’s already a company working on this
solution. Companies would be able to archive off their data, have it encrypted, then
distributed. The advantage in this is that even if a hacker could somehow penetrate
the Blockchain, they would only be able to retrieve a small piece of the puzzle.
But blockchain technology could change all this. For instance, because of
Blockchain’s decentralized nature, a group of devices would be able to form a
consensus regarding the regular occurrences within a given network and shut down
any node that has an anomaly. It is the significance of a democratized structure as
the blockchain network has no central power. Since it is an immutable record, the
info in it is public for everyone to see [3, 4]. Therefore, anything that hinge on the
Blockchain is for its very nature direct, and everyone included is liable for their
trainings.
This chapter is organized into seven major sections. First section describes the
basic introduction of Blockchain. Next section deals with the methodology and
working of Blockchain. Third section summarizes one of the major applications
of Blockchain i.e. Ethereum. Fourth section compares and contrast the differences
between different types of Blockchain. Fifth section presents brief summary of
different Cyber Threats and how Blockchain can prevent Cyber Security from these
cyber threats. Sixth section compiles the future aspects and impacts of blockchain
technology. In the last section we conclude that how Blockchain is a great innovation
for eradicating Cyber Threats.
15.2 Methodology
Blockchain innovation works by making a safe and upfront condition for the mone-
tary exchanges of digital assets, i.e., Bitcoin. Each block’s Hash codes protect records
in the Blockchain. This is mostly in light of the fact that independent of the size of
the data or record, the numerical hash work gives a hash code of a similar length [5].
Along these lines, endeavoring to change a square of information would produce a
totally new hash value.
When an exchange has been approved and settled upon by all the nodes, it, at that
point, gets added to the digital ledger and secured utilizing cryptography that utilizes
a public key available to the various nodes and a private key that must be left well
enough alone.
A system that is available to everybody and simultaneously keeps up the client’s
secrecy without a doubt raises trust issues in regards to the members. Along these
lines, to manufacture the trust, the members need to experience a few agreement
consensuses protocols, for example, Proof of Work and Proof of Stake [6].
The Blockchain is upfront and shrewd technique too of passing data from X to Y
in a completely computerized and safe way. The procedure of making a block starts
when a group participates in an exchange. Thousands check this block, maybe a huge
number of PCs disseminated around the net. The confirmed block is added to a chain
15 Blockchain: A New Safeguard to Cybersecurity 273
set aside over the net, making an uncommon record, yet an exceptional business with
a unique history [7]. Corrupting a singular report would mean delivering the whole
chain in limitless models. Bitcoin uses this model for cash related trades, yet it might
be passed on from various viewpoints (Fig. 15.1).
15.3 Ethereum
into lines of code. It helps exchange money, property, offers, or anything of note-
worthy worth in a straightforward, conflict-free way while staying away from the
organizations of a third party (Fig. 15.2).
Example
Assume we rent a flat from person X. We can do this with the help of blockchain
technology by paying in digital currency. We get a certificate which will hold in
our virtual agreement; Person X gives us the computerized passage key, delivered
to us by a predefined time and date. On the off chance that the key doesn’t come on
schedule, the Blockchain discharges a refund. If Person X sends the key before the
specified date, the system holds it, which was previously releasing both the expense
and critical to us and person X separately when the time shows up. The framework
works on the If-Then reason and is observed by several individuals to anticipate a
flawless performance. If Person X gives us the key, Person X makes sure to be paid.
If we send a certain sum in bitcoins, we get the key. The archive is consequently
dropped after the time, and the code cannot be hindered with both of us without the
other knowing since all members are at the same time alerted.
forms it. Smart Contracts are aggregated into bytecode, which a component called
EVM can read and execute. EVM works in a sand-boxed domain as it is completely
disengaged from the principle Blockchain system, and works perfectly as a testing
situation. Along with these, anyone who might need to make a smart contract utilizing
EVM can do so without interfering with other Blockchain operations.
15.3.3 Gas
Gas refers to the expense or estimating value, required to effectively direct exchange
or execute an agreement on the Ethereum blockchain platform. It is valued in sub-
units of the cryptocurrency ether, known as gwei. Gas quantifies the measure of work
miners need to do to remember transactions in a block. The market determines the
estimation of gas as the bitcoin market. If a higher gas cost is paid, the node will
organize the transactions for benefit.
dApp utilizes incentives, for example, crypto-tokens and inbuilt consensus mecha-
nisms. A distributed application doesn’t have to store its states; in any case, Ethereum-
based dispersed application stores confided in states, and these outcomes in a prudent
answer for end-users.
The dApp client is required to program the frontend, aside from the user interfaces
with the Ethereum blockchain. The clients are regularly written in JavaScript because
they can be run in an internet browser, which many of us have.
It’s a type of Blockchain network in which anyone can join, i.e., a permissionless
blockchain. In a public blockchain, anyone can read, write, or take an interest. This
type of Blockchain is decentralized, no one has ordered over the framework, and
276 I. Ahmed et al.
they are protected in that the information can’t be altered once approved. Data on
a public blockchain are secure as it is not possible to expect some modification or
change data once they have been passed on the Blockchain.
Public blockchains do carry some necessary inconveniences concerning the busi-
ness. Organizations are generally increasingly keen on private blockchains to make
blockchain solutions with better protection and security.
Cyber Security Challenges have expanded complex, and there is a change in perspec-
tive in Threat Landscape. Not regarding significant spending on heritage security
items, advanced cyber-criminals are bypassing these protections effectively, making
the life of security Professional hopeless. How about we take a look at this present
reality. The Chinese government and their military, the People’s Liberation Army
(PLA), have been blamed for accessing technology and trade secrets unknowingly,
regularly from private organizations worldwide. We always imagine that China wants
to obliterate the US. However, that is not true. China essentially needs to be the
superpower and needs to be a technology chief. In the long run, it requires every
American, and even the remainder of the world, to be an innovation subject to the
Chinese market. Due to this, the outcome is that the Chinese cybercriminals always
spy activities focusing on worldwide organizations and government organizations to
assemble free trade secrets. Sometimes political parties gather essential information
using advanced analytics of their citizens to foresee future election results.
15 Blockchain: A New Safeguard to Cybersecurity 277
15.5.1.1 Ransomware
An insider threat is a security risk that begins inside the focused-on association, at the
point when an insider deliberately or inadvertently abuses access to adversely influ-
ence the classification, respectability, or accessibility of the organization’s primary
data or frameworks. They could be an expert, previous worker, colleague, or panel
member. Traditional safety efforts will result in the global spotlight on outer or third-
parties’ dangers and are not generally fit for recognizing an interior danger radiating
from inside the association.
278 I. Ahmed et al.
A typical case of a cyber threat is a Data Breach, which is a security incident wherein
data is gotten to without approval. It may incorporate the mishap or burglary of
your Aadhar Card Number, bank details, personal healthcare data, passwords, or
email. Data Breaches are achievable because of weak passwords, missing anti-virus
patches that are abused, or lost or taken PCs cell phones, laptops. Cybercriminals
regularly hamper information breaks, and there are likewise episodes where ventures
or government offices accidentally uncover delicate or private information on the
web.
In the wake of understanding the developing cyber threats and the absolute best cyber-
attacks, it is imperative to figure out our self-defense. These cyber-threats groups have
all that they have to find an association’s benefits and afterward discover the vulner-
abilities to assemble their weapons appropriately. Cyber threats prompt a vast worry
for organizations that have been non-versatile, here and there for more than decades,
yet how about we acknowledge the way that there are a decent number of bodies
who have been splendid in accomplishing cyber cleanliness and better resistant cyber
systems. We should concentrate on a portion of these bodies, including governments
and organizations.
15.5.2.1 Governments
15.5.2.2 India
15.5.2.4 Europe
The European Union is reinforcing its cybersecurity rules to handle the expanding
danger acted by cyber-attacks like well as to make the most of the chances of the new
advanced age. The European Union Agency for Network and Information Security
(ENISA) fills in as a focal point of skill and greatness for both part-state and EU
establishments identified with system and data security [16]. On April 9, 2019, the
Council received a guideline called the Cybersecurity Act which presents:
• An arrangement of EU-wide affirmation plans
• An EU cybersecurity organization to update and take control from the current
European Union Agency for Network and Information Security (ENISA).
Like every other intelligence, cyber threat intelligence gives a value add to digital
threat data, which decreases vulnerability for the shopper while supporting the
purchaser in recognizing dangers and openings. The system is a cycle since it
identifies understanding gaps, unresolved requests, which guidelines new grouping
280 I. Ahmed et al.
essentials, this way restarting the information cycle. Intelligence experts recognize
knowledge holes during the investigation stage.
Public Key Infrastructure (PKI) can be followed back to the 1970s when signifi-
cant encryption forward leaps from a couple of British intelligence office designers
molded the eventual fate of key distribution [17]. A certificate authority (CA) fills
in as a mediator for these transactions. It ensures the genuineness of the public key,
making it workable for a beneficiary of information to approve the transaction’s
content. But with the help of Blockchain, an innovative concept is achieved, which
is a Decentralized Public Key Infrastructure (DPKI) that accomplishes verification
over public systems without relying upon a solitary third-party that can bargain the
trustworthiness and security of the system. Blockchain works with a trustless method-
ology that permits both trusted and untrusted gatherings to speak with one another.
With DPKI, any content will be a type of mystery property.
A conventional blockchain can replicate the signature functionality of a PKI for
approving exchanges. What’s more, it gives the advantage that, with the help of a
consensus mechanism, no central CA is required, which significantly diminishes the
danger of an attack on that vector.
As examined above, Distributed Denial of Service (DDoS) attacks are the same
old thing. However, ongoing assaults are expanding in seriousness, intricacy, and
recurrence and have like this become a standard worry for organizations and private
clients the same. Organizations are starting to investigate Blockchain to forestall and
alleviate DDoS attacks. Working the DNS on a blockchain would guarantee that
attacks are not focused on a brought together to source, devastating it.
Then again, organizations are likewise utilizing blockchain technology to make a
decentralized system of servers that can rapidly send bandwidth capacity to different
servers confronting attacks. The attacked server would then be able to withstand
the DDoS attacks by engrossing the overabundance traffic utilizing the extra band-
width. Organizations can be distributed between different server nodes that give high
strength and evacuate the single purpose of failure to prevent systems from DDoS
attacks.
282 I. Ahmed et al.
Cybersecurity is one of the most flexible ventures in which organizations see another
variety of danger every other day. That is why it is essential to set up an appraisal of
potential hazards and potential security advancements to keep predicting client and
partner trust. The mix of block-building algorithms and hashing makes Blockchain
an incredible arrangement in the cybersecurity portfolio, as Blockchain is changing
the cybersecurity solution in a few different ways.
For example, Akasha, Steem.io, or Synereo are distributed social organizations that
work like Facebook, however, without a focal platform. Rather than depending on a
centralized association to deal with the system and specify which content ought to
be shown to whom, these stages are run in a decentralized way, accumulating crafted
by different gatherings of peers, which facilitate themselves, just and only, through
a lot of code-based standards revered in a blockchain. By empowering peer-to-peer
transactions, the blockchain technology makes way for direct collaboration between
groups—a decentralized sharing economy outcome.
Supply chains contain complex systems of providers, makers, wholesalers,
retailers, examiners, and customers [19]. A blockchain’s IT foundation would smooth
out work processes for all gatherings, regardless of the size of the business system.
Moreover, a common foundation would give inspectors more exceptional visi-
bility into members’ exercises along the worth chain. Blockchain can drive cost-
sparing efficiencies and to upgrade the customer experience through recognizability,
straightforwardness, and detectability.
Consolidating Blockchain and IoT permits organizations and even shoppers to
legitimately adopt the “multiple times more data” that is produced by the roughly
30 sensors in your vehicle, motor sensors in planes estimating 5000 components
for each second, and billions of different sensors in all aspects of our day by day
lives figuring things like climate impacts, contaminations, area, fuel, temperature,
moistness, sound, vibration, wind opposition, pressure, weight, power, and over 300
different kinds of components.
Blockchain could go about as an incomprehensibly secure and precise approach
to store singular data, which is utilized for KYC and AML consistency. On the off
chance that Blockchain is used for KYC and AML consistency, a customer could
make a solitary “block” by taking care of their information, which understandings
for KYC and AML consistence [20]. The underlying one is that a customary KYC
and AML Blockchain library can be made, and different banks and money related
establishments can utilize it. Another critical edge is that a KYC and AML vault is
additionally made for intra-bank use. Blockchain can significantly enliven and bring
down expenses for KYC.
15 Blockchain: A New Safeguard to Cybersecurity 283
With the stock market over the globe, increasingly holding onto Blockchain’s local
capacities as the reason for advertising exchanges, numerous foundations investigate
how blockchain technology can be utilized in the securities exchange. Blockchain
offers enormous potential for following protections loaning, repo and edge financing,
and checking significant hazards.
Blockchain can be the answer to compatibility, belief, and truthfulness issues
in divided market structures. The innovation can have suitable use in clearing and
settlement, while safely robotizing the post-exchange process, enabling desk work
of exchange and legitimate possession move of the security. It can kill the need
for third-party participation to a considerable degree. The standards and guidelines
would be in-worked inside smart contracts and official with each exchange request
to enrol exchanges with the Blockchain arrange to go about as a controller for all
trades.
References
1. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at
https://metzdowd.com (2009)
2. Kury, T.: Russians Hacked into America’s Electric Grid. Here’s Why Securing It Is Hard.
Government Technology, July 2018
3. Mission Support Center, “Cyber Threat and Vulnerability Analysis of The U.S. Electric Sector,”
Idaho National Laboratory, 2016
4. Huang, Z., Su, X., Zhang, Y.: A decentralized solution for IoT data trusted exchange based-on
blockchain. In: International Conference on Computing and Communication Technologies,
2016
5. How Blockchain Technology Works. Guide for Beginners, Coin telegraph. (Online). Avail-
able: https://cointelegraph.com/bitcoin-for-beginners/how-blockchain-technology-works-
guide-for-beginners
6. Amaba, D.B., Leed, P.C., Ahram, D.T., Sargolzaei, D.A., Daniels, D.J., Sargolzaei, D.S.:
Blockchain Technology Innovations, p. 5, 2017
7. Bahalul, A.K.M., Haque, Rahman, M.: Blockchain technology: methodology, application and
security issues (Feb 2020)
8. How blockchain architecture works? https://www.zignuts.com/blogs/how-blockchain-archit
ecture-works-basic-understanding-of-blockchain-and-its-architecture/
9. Marr, B.: A very brief history of blockchain technology everyone should read, Forbes, 16
Feb 2018. Available: https://www.forbes.com/sites/bernardmarr/2018/02/16/a-very-briefhist
ory-of-blockchain-technology-everyone-shouldread/#19c60b067bc4. Accessed 15 Feb 2019
10. Voshmgir, S.: Token economy: how blockchain and smart contracts will revolutionize the
economy, pp. 105–107, 2019
11. Kim, J.-T., Jin, J., Kim, K.: A study on an energy effective and secure consensus algorithm for
private blockchain systems (PoM: Proof of Majority). In: 2018 International Conference on
Information and Communication Technology Convergence (ICTC)
12. Paquet-Clouston, M., Haslhofer, B., Dupont, B.: Ransomware payments in the bitcoin
ecosystem, 2018
13. Flashpoint. Mirai Botnet Linked to Dyn DNS DDoS Attacks. Accessed: 18 Dec
2018. (Online). Available: https://www.flashpointintel.com/blog/cybercrime/mirai-botnetlin
ked-dyn-dns-ddos-attacks/
14. Botnet Cleaning and Malware Analysis Centre (Cyber Swachhta Kendra) https://www.cybers
wachhtakendra.gov.in/about.html
15. National Cyber Strategy of the United States of America, https://www.whitehouse.gov/wp-con
tent/uploads/2018/09/National-Cyber-Strategy.pdf
16. Training for Cybersecurity Specialists, https://www.enisa.europa.eu/topics/csirts-in-europe/
glossary/blockchainw
17. Shbair, Y., Wallborn, A.: A blockchain-based PKI management framework. In: IEEE NOMS
Conference, 2018
18. Lepoint, T., Ciocarlie, G., Eldefrawy, K.: BlockCIS—a blockchain-based cyber insurance
system. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), IEEE,
pp. 378–384, Apr 2018
19. Kshetri, N.: 1 Blockchain’s roles in meeting key supply chain management objectives. Int. J.
Inf. Manage. 39, 80–89 (2018)
20. Bhaskaran, K., Ilfrich, P., Liffman, D., Vecchiola, C., Jayachandran, P., Kumar, A., Lim, F.,
Nandakumar, K., Qin, Z., Ramakrishna, V., Teo, E.G.: Double-blind consent-driven data sharing
on blockchain. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), IEEE,
pp. 385–391, Apr 2018
Chapter 16
Gun Tracking System Using Blockchain
Technology
Abstract One of the major concerns for the government in terms of security is the
safety of the citizens. We have come across many cases in which the individuals
have access to the ammunition without having the required license. Inadequacy in
the management of weapons, especially those which remain reserved is the major
contributing factor. Individuals submit counterfeit documents to some third party
dealers who help them in getting a fake arms license. That’s not all, no one knows
whether the individuals who use the ammunition with the fake license have any
criminal background at that time. The production of such reserved deteriorating
weapons is creating a huge problem leading to an unsafe environment among the
citizenry. In this chapter, we lay forward a model that helps to overcome these
challenges with the help of blockchain technology. In our model, we provided a
simple solution on how the transfer of guns can take place between the dealer and
the seller using digital signatures and a digital gun safe just like a bitcoin (BTC)
wallet which stores each and every information about an individual securely and it
helps us in identifying whether the person who has a weapon holds an original arms
license or has a fake one and also checks whether the person has a previous criminal
record on his name. Since blockchain is immutable and hackproof, this technology
can be used to eliminate the above claims and improve the ownership, traceability
of the weapon and keeps the records securely inside the digital safe. Although the
use of blockchain technology has some constraints when a large number of records
are to be stored inside the safe, it’s properties can be used to improve the current
scenario.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 285
S. K. Panda et al. (eds.), Blockchain Technology: Applications and Challenges,
Intelligent Systems Reference Library 203,
https://doi.org/10.1007/978-3-030-69395-4_16
286 S. S. Lokre et al.
16.1 Introduction
In today’s world, the supply of illegal weapons has increased drastically and most
of these weapons are being sold in the black market and on online sites such as the
dark web [1]. Though the arms business is small in the capacity as compared to other
products smuggled online, its consequences on security are quite significant. Despite
efforts being made for regulating firearms, there has been news about people carrying
ammunition wherever they go with them for their safety concerns. But, most of these
people do not have a valid arms license for carrying any kind of weapon with them
[2]. It has become easy for conmen to get a fake arms license from a third party dealer
by providing fake documents [3]. Due to this, tension is prevailing among the people
about their safety of roaming freely in the environment. It has become necessary to
track these people and find out if they hold a valid arms license or not. Therefore, we
intend to use blockchain technology to eliminate the above-listed problems. In this
model, we provided two solutions. One for forming an agreement between the delaer
and the seller without any involvement of third party and two, to have a digital gun
safe, which is similar to a bitcoin (BTC) wallet which securely stores each and every
information about the person owning a gun or wanting to purchase a gun [4]. Forming
an agreement between any two parties requires a signature. Normally these signatures
can be tampered and the document is accepted without knowing that the signatures
are not valid and that the document is not legal. So to avoid this kind of problem
we make use of digital signatures. Digital signature is one of the way to ensure
that the message is not tampered and that it maintains the integrity of data. Once
the agreement is formed between the dealer and the seller, the transfer of weapons
take place. At the time buying the weapon the customer will pe provided with a
Digital Gun Safe same like Bitcoin Wallet (BTC). This digital safe can be opened
only through biometric data such as a retina scan or with the help of a fingerprint
[5]. Ahead of purchasing the gun, the receiver should make the required background
checks and if the information provided by the receiver is proven to be correct, then
the transfer of ownership takes place where the buyer has the right to purchase a
weapon. If the individual fails to provide the correct information then the transfer
of ownership gets contradicted and will be recorded in the individual’s digital gun
safe. This helps in reducing the involvement of any third party dealer. In this way,
all the legal/illegal information about an individual will be recorded in the gun-safe
and it becomes easy for the authorities to track them. Since blockchain is immutable,
the details regarding the transactions made from one gun safe to the other, that are
recorded on the blockchain cannot be tampered with. The transactions recorded in
the gun safe can only be accessed by the individual’s biometric and private key and
hacking these transactions is impossible [6]. With the help of this model, it will be
easy for us to track these people and reduce the crime rates in countries where such
practices are common [7].
16 Gun Tracking System Using Blockchain Technology 287
16.2 Prerequisites
Blockchain
We all know that technology continues to constantly advance in a field that aims to
beat itself, coming up with remarkable developments one after the other of some
paradigm-shifting innovation [8]. Blockchain Technology is one such technology
that became a hot topic in today’s world. Blockchain can be characterized as a
decentralized public distributed ledger. On the off chance that we go through the
definition we will recognize the 4 fundamental terminologies (i.e. decentralized,
public, distributed, ledger) to understand. Let us see what these terminologies mean:
• Decentralized: Unlike a centralized system where all the information is being
held by a central authority, where hacking the system becomes pretty simple,
blockchain technology follows a decentralized system in which the information
is dispersed among all the nodes that participate in the system, this lowers the risk
of systematic failure [9].
• Public: A public blockchain is a permissionless blockchain [10]. It can be viewed
publicly which means that anybody can take part in the network, read and write
in the blocks. Public blockchains are decentralized and are secure such that the
data cannot be changed once validated on the blockchain.
• Distributed: The data is stored on multiple systems or multiple nodes on the
blockchain. This will ensure smooth retrieval of data even when one of the nodes
is malfunctioning.
• Ledger: In simple terms, a ledger is a list of records [11]. These records can
be of any type such as transactions or items etc. A blockchain-based ledger has
properties such as immutability which prevents tampering of data and integrity
through hash functions and is secured through cryptography [12].
With its intuitive applications being powered by its network architecture,
blockchain technology has become a front and center of technology with discussions
[13]. Being the technology acting at the core of bitcoin and other cryptocurrencies,
blockchain is an open, distributed ledger that can record transactions between two
or more individuals in a more efficient, verifiable, and permanent way [14].
Cryptography
Cryptography is the hone of creating conventions that avoid third parties from seeing
the information. The name itself says “crypt” means hidden or vault and “graphy”
means writing. In cryptography, the approach which is used to secure the information
is obtained from algorithms by converting messages in such a way that it is very
hard to decode it [15]. These algorithms are used to generate cryptographic keys, in
digital signing, verification to protect data privacy, and many more. In the present
era of computers, cryptography is usually related to the technique where an ordinary
plain text is processed to the ciphertext in which the text is intended such that the
receiver who receives the text can decode it. This process of converting a plain into
ciphertext is known as encryption and the process of converting the ciphertext back
288 S. S. Lokre et al.
Digital Signature
Digital signatures are used to carry out electronic signatures [18]. It is an arith-
metic scheme showing the authenticity of the digital messages/documents. A valid
signature gives the receiver reason to believe that the message is generated by an
authenticated sender, that the sender cannot repudiate having sent the message and
that the message is not altered in transit.
These signatures are identical to the standard handwritten signatures but the one
with properly implemented digital signatures is next to impossible to forge. Digital
signatures are implemented using asymmetric cryptography as discussed in the above
paragraph. One of the advantages of a digital signature is that if a hacker tries to access
the information and alter it, then the hash of the modified information and the output
presented by the authenticated algorithm will not match and the receiver can deny
information by assuming that data integrity was violated [19, 20].
The above Fig. 16.2 represents the nodes that are taking part in this blockchain-based
traceability system and how each node in a blockchain network is going to act and
that each node in the network is connected to an Ethereum account which shows its
identity within the system [21, 22]. Since blockchain is a decentralized system, all the
transactions that happen inside the system will be present with each node that takes
part in this traceability system. Let’s look at each of the nodes before proceeding
ahead:
Gun Manufacturer: The gun manufacturer processes the raw materials provided by
the supplier into the desired weapon. At the same time, the manufacturer sells these
weapons to the licensed dealer and will be distributed among the licensed shops
for sale [23]. The manufacturer is responsible for wrapping the information of the
weapon and recording it in the blockchain system.
Gun Dealer: The main role of the dealer is to form an agreement with the licensed
seller so that all the transactions that happen between both of them are recorded as
a ledger in the system [23]. For making the agreement successful, the seller shop
should be a licensed shop with all the necessary documents being recorded in the
system.
Gun Seller: Prior to the sale, the seller as well as the dealer should sign an agreement
so that the transaction details will be recorded in the system and can be approved for
sale [24]. Just like a digital signature, both the parties need to sign the transfer.
Customer: The customer is the final end receiver of the weapon. But before
purchasing a weapon, the customer should pass a few background checks for authen-
tication purposes [25]. Once the individual clears the test the transfer of ownership
takes place. Once the transfer of ownership and weapon is successful, the individual
will be given a digital gun safe where all his personal information such as name,
mobile number, arms license, and the weapon information that he is using will be
stored inside this safe.
Digital Gun Safe: Like an e-wallet, a digital gun safe is a safe where the individual’s
information such as name, mobile number, arms license and the weapon information
that he is using will be stored. When an individual purchases a weapon, he/she will be
given a gun safe which is digital just like a bitcoin (BTC) wallet. This safe is tamper-
proof and can only be accessed with the help of biometric data (i.e. fingerprint, retina
scan) of the individual [26].
the details of the weapons such as how much quantity is to be supplied, the date of
supply, etc. This record will be stored securely inside the blockchain.
Once the weapons are supplied to the dealer, the dealer contacts the gun seller and
forms a dealership agreement between him and the seller. This is where digital signa-
tures come into the picture. At the time of agreement formation, unlike handwritten
signatures, the deal takes place inside the blockchain network. First, the dealer creates
a document (Fig. 16.3) that includes the information that is required to sign and form
an agreement which proves the transfer of ownership.
Next, he hashes the document and encrypts it with the help of his private key. The
encrypted hash is known as a digital signature as shown in Fig. 16.4.
Once this is done, the dealer sends the document and the digital signature to the
seller where the seller verifies if the received document matches the digital signature
or not. As shown in Fig. 16.5, the seller uses the dealers public key to decrypt the
digital signature which results in the hash value of the document.
Next, In Fig. 16.6, the seller applies the same hashing algorithm to the document
he received and checks if both the hashes match with each other or not.
If it matches then the seller approves from his side and forms a deal with the
dealer and if it doesn’t then the seller assumes that the document has been altered
during the transit which results in the cancellation of the deal.
The above diagram (Fig. 16.7) depicts the overview diagram of the contract deal
between the dealer and the seller. With the help of digital signatures, there won’t
be any third party involvement, and any kind of deals can take place in a fair and
transparent manner.
Once the agreement is confirmed in a fair and transparent manner, the assets can
now be transferred between the dealer and the seller as per the directives mentioned
in the agreement document. The gun transaction between the buyer and the seller
can take place in a similar way to sending and receiving bitcoins. Before that, the
buyer should pass a background check as shown in Fig. 16.8 which includes age
verification, valid arms license, crime records, citizenship proof.
Blockchain technology supports peer-to-peer transactions where there is no
involvement of any third party who makes the transaction successful. So for transfer-
ring and receiving the coins, the buyer and seller use a very safe and secure platform
known as “Omni-layer”. Omni is a protocol modeled as a layer over the bitcoin which
allows us to send and receive the transactions. The main advantage of Omni is that
it can transform into any currency using the smart contracts on the layer. So when a
16 Gun Tracking System Using Blockchain Technology 293
buyer wants to make any transaction, he can transfer the money irrespective of the
currency as the Omni protocol converts any currency into omnis with the help of a
smart contract. For the transaction to take place just like a bitcoin wallet, we can use
the Omni wallet which is safe, secured, easy to use and multi-currency support. Once
the safe transfer of gun and ownership takes place, the buyer will be provided with
a gun safe, known as “electronic digital gun safe” as proposed by Heaston. Unlike
a physical gun safe, this gun-safe is digitally secured which contains information
about the owner.
This gun safe can be accessed with a fingerprint scan, or with a retina scan of
the owner. The main purpose of providing this gun safe is to track each and every
information about the owner and the gun that he is using (Fig. 16.9). If a crime is
committed and if people had to trace a particular weapon, then the safe provides each
and every information regarding the person as well as the weapon that he used to
commit the crime.
Tracking guns with advanced blockchain protocols will help regulate overall gun
significance upon society, so reasonable gun control measures can be implemented.
Fig. 16.9 Pictorial representation of the digital gun-safe and what it contains
converted into its equivalent hash value, the dealer uses his private key (pvtkey)
to encrypt the document.
function msg_digest(message)
{
var m=msg_bytes(“Signed message\n”).concat msg_bytes(message));
return crypto.SHA256(crypto.SHA256(m, {asbytes:true}), {asbytes:true});
}
function sign_message(pvtkey, message)
{
if (! pvtkey)
return false;
var signature=pvtkey.sign(msg_digest(message));
var address=message.gethash();
}
Explanation of Algorithm 2: document_verify()
The function document_verify()allows the seller to verify whether the docu-
ment that he received and the document that has been hashed is the same or not.
For verification of the document, the seller uses the dealer’s public key (pub_key)
16 Gun Tracking System Using Blockchain Technology 295
to decrypt the hash value to its equivalent message using base64Tobytes. If the
hashed value and the message turns out to be different then the program throws an
error with which the seller gets to know that the document has been tampered with
and that the deal cannot be signed.
function document_verify()
if (! pubkey) {
return false;
var signature=pubkey.sign(msg_digest(message));
var address=message.gethash();
}
try {
var sig=message.base64Tobytes(signature);
}
catch(err)
{
return false;
}
16.4.2 Implementation
As we can see that the model that is proposed in this chapter requires execution
of multiple steps. The agreement deal has to be signed with the seller, the seller
sells the product to the buyer and the buyer gets an electronic gun-safe which stores
the information of the buyer securely. Therefore, for the purpose of clarity we will
be looking into the first implementation i.e. the implementation of digital signature
between the dealer and the seller.
The execution requires creation of two files:
• Signing_messge.js: This file includes the code that is required for signing the
document and encrypting the file with the help of private key.
• verify_message.js: This file includes the code that is required for verifying the
document and decrypting the file with the help of public key.
After completing the code, the next step is to execute these codes at a time. For
that we can create a HTML file in which we can link the above two codes so that we
can execute it simultaneously.
296 S. S. Lokre et al.
As you can see in Fig. 16.10, when we open the HTML file the browser opens up
a new window where the digital signature takes place. This page includes 2 links.
One is for signing the message and another is for verifying. Upon clicking the sign
link, the webpage gets directed to the sign page as shown in Fig. 16.11.
This page consists of entries like private key, address, message and signed
message. The dealer now enters his private which has an option of show and hide.
According to the dealer’s choice he can select the option. Once he enters his private
key, an address hash value gets generated as seen in Fig. 16.11. This address value is
nothing but the address of the document that is signed by the dealer. In the message
box, the dealer writes the message i.e. the document that is to be signed. Once these
details are enterned and when the dealer clicks on the sign message button, a hash
value of the document that is to be signed is generated as shown in Fig. 16.12. The
signed message generated for the document and the public key of the dealer is now
shared with the seller for the verification purpose.
For the verification purpose, the seller now clicks on the verify link (Fig. 16.10)
which is directed to the verify message page. On this page the seller enters the
public key and the signed message hash value for verification purposes as viewed in
Fig. 16.13.
Once the seller enters the public key and the signed hash value of the message,
he then clicks on the verify button, which decrypts the signed hash value into its
equivalent message (Fig. 16.14) which helps the seller to verify whether the decrypted
message matches with the original message.
With this, the seller can confirm that the message has not been tampered and that
the original message matches with the decrypted message. You can see that in the
details section which shows the date and time of the signing document and date and
time of verification of the document.
The blockchain tracking system described in this chapter meets the following security
requirements:
Durability and Reliability: Since blockchain is a decentralized network, it does not
have a central point of failure and is good at resisting the malicious attack [27].
Non-repudiation: Any signature that is affected using a private key, is known/owned
by the owner and that he cannot contradict his/her signature attached to the document
i.e. the signator cannot affirm effectively that they did not sign a letter, and that their
private key remains hidden as well. [28].
Data Integrity: Once the document is signed and received by the recipient it guaran-
tees that the contract is authentic, reliable and defends against unwanted manipulation
of the recipient during transmission. If any tampering of a document takes place, then
it produces a whole new digital signature.
Authentication: As long as the owner’s private key is safe and secure with him, the
recipient can use the public key to confirm that the signature was created by the
owner and no one else.
16 Gun Tracking System Using Blockchain Technology 299
16.6 Conclusions
The main motive of this chapter is to find a viable solution for reducing the
violence and crime rate especially the crimes committed using illegal firearms.
With blockchain coming into the picture this can be reduced to quite an extent.
The blockchain protocol is the most precise system to track a gun flow from the
manufacturer to the end-user who receives it. Its salient features such as transparency,
immutability, and dencentralization helps the network to be highly secure against any
kind of tampering information or anything that looks malicious. With this technology,
the agreement deal between the dealer and the seller happens smoothly compared to
the existing system in which there is an involvement of the third party. With each
and every information being stored in the blockchain platform, makes the transaction
process in a very transparent manner without any altering of the data. Undergoing
a background check before the transfer of the ownership helps to identify whether
the eligibility of the buyer regarding the correct licences. An “electronic digital gun
safe”, just like a BTC wallet which is given at the time of purchasing the gun helps
to track the person and the kind of weapon that he is using. Blockchain technology,
when applied in improving tracking systems, automatically creates a climate where
the crime rates decrease and the society need not be scared of ammunition anymore.
References
1. Fincham, D.: Assessing the viability of blockchain to impact the antiquities trade. Cardozo
Arts & Ent. LJ, 2019—HeinOnline
2. Caplan, D.I.: The Right of the Individual to Bear Arms: A Recent Judicial Trend—Det. CL
Rev., 1982—HeinOnline
3. Baza, M., Lasla, N., Mahmoud, M., et al.: B-ride: Ride sharing with privacy-preservation, trust
and fair payment atop public blockchain … on Network Science 2019—ieeexplore.ieee.org
4. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system—2019—git.dhimmel.com
5. repository.library.georgetown.edu/handle/10822/1056615
6. Qu, H., Yan, Z., Lin, X.J., Zhang, Q., Sun, L.: Certificateless public key encryption with equality
test. Information Sciences. Elsevier (2018)
7. Keane, K.: Does bitcoin use affect crime rates? 2020—kb.gcsu.edu
8. Allen, D.W.E.: Blockchain innovation commons. SSRN Electron. J. 2017—academia.edu
9. Subramanian, H.: Decentralized blockchain-based electronic marketplaces. Communications
of the ACM, 2017—dl.acm.org
300 S. S. Lokre et al.
10. Neudecker, T., Hartenstein, H.: Network layer aspects of permissionless blockchains. IEEE
Communications Surveys & …, 2018—ieeexplore.ieee.org
11. Hughes, A., Park, A., Kietzmann, J., Archer-Brown, C.: Beyond Bitcoin: What blockchain and
distributed ledger technologies mean for firms. Business Horizons, 2019—Elsevier
12. Raikwar, M., Gligoroski, D., Kralevska, K.: SoK of used cryptography in blockchain. IEEE
Access, 2019—ieeexplore.ieee.org
13. Zheng, Z., Xie, S., Dai, H., Chen, X., et al.: An overview of blockchain technology: architecture,
consensus, and future trends. In: 2017 IEEE International …, 2017—ieeexplore.ieee.org
14. Gupta, S., Sadoghi, M.: Blockchain Transaction Processing. 2019—researchgate.net
15. Al-Shabi, M.A.: A survey on symmetric and asymmetric cryptography algorithms in informa-
tion security. Int. J. Sci. Res. 2019—researchgate.net
16. Zhang, Y., Xu, C., Ni, J., Li, H.: Blockchain-assisted public-key encryption with keyword
search against keyword guessing attacks for cloud storage. IEEE Transactions on …, 2019—
ieeexplore.ieee.org
17. Li, H., Zhang, F., He, J., Tian, H.: A searchable symmetric encryption scheme using blockchain.
arXiv preprint arXiv:1711.01030, 2017—arxiv.org
18. Watanabe, H., Fujimura, S., Nakadaira, A., et al.: Blockchain contract: a complete consensus
using blockchain. In: 2015 IEEE 4th global …, 2015—ieeexplore.ieee.org
19. Liu, M., Wu, K., Xu, J.J.: How will blockchain technology impact auditing and
accounting: permissionless versus permissioned blockchain. Current Issues in Auditing,
2019—meridian.allenpress.com
20. Zikratov, I., Kuzmin, A., Akimenko, V., et al.: Ensuring data integrity using blockchain
technology. In: 20th Conference of …, 2017—ieeexplore.ieee.org
21. Ethereum white paper: a next generation smart contract & decentralized application platform
22. Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging
blockchain technology. IEEE Access, 2019—ieeexplore.ieee.org
23. Yeoh, P.: Regulatory issues in blockchain technology. J. Financ. Regul. Complian. 2017—
emerald.com
24. Min, H.: Blockchain technology for enhancing supply chain resilience. Business Horizons,
2019—Elsevier
25. Hammi, M.T., Bellot, P., et al.: BCTrust: a decentralized authentication blockchain-based
mechanism. 2018 IEEE Wireless …, 2018—ieeexplore.ieee.org
26. Garcia, P.: Biometrics on the blockchain. Biometric Technology Today, 2018—Elsevier
27. Karafiloski, E., Mishev, A.: Blockchain solutions for big data challenges: a literature review.
IEEE EUROCON 2017-17th …, 2017—ieeexplore.ieee.org
28. Savelyev, A.: Copyright in the blockchain era: promises and challenges. Comput. Law Secur.
Rev. Elsevier (2018)
29. Zhang, Y., Xu, C., Li, H., Yang, H., et al.: Chronos: secure and accurate time-stamping scheme
for digital files via blockchain. In: ICC 2019-2019 IEEE …, 2019—ieeexplore.ieee.org