Blockchain Technology and Related Security Risks: Towards a Seven-Layer Perspective and Taxonomy

被引:7
|
作者
Mollajafari, Sepideh [1 ]
Bechkoum, Kamal [1 ]
机构
[1] Univ Gloucestershire, Sch Comp & Engn, Cheltenham GL50 4AZ, England
关键词
blockchain; Ethereum; smart contract vulnerabilities; centralisation; one-owner control; SMART CONTRACTS; ATTACKS;
D O I
10.3390/su151813401
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Blockchain technology can be a useful tool to address issues related to sustainability. From its initial foundation based on cryptocurrency to the development of smart contracts, blockchain technology promises significant business benefits for various industry sectors, including the potential to offer more trustworthy modes of governance, reducing the risks for environmental and economic crises. Notwithstanding its known benefits, and despite having some protective measures and security features, this emerging technology still faces significant security challenges within its different abstract layers. This paper classifies the critical cybersecurity threats and vulnerabilities inherent in smart contracts based on an in-depth literature review and analysis. From the perspective of architectural layering, each layer of the blockchain has its own corresponding security issues. In order to have a detailed look at the source of security vulnerabilities within the blockchain, a seven-layer architecture is used, whereby the various components of each layer are set out, highlighting the related security risks and corresponding countermeasures. This is followed by a taxonomy that establishes the inter-relationships between the vulnerabilities and attacks in a smart contract. A specific emphasis is placed on the issues caused by centralisation within smart contracts, whereby a "one-owner" controls access, thus threatening the very decentralised nature that blockchain is based upon. This work offers two main contributions: firstly, a general taxonomy that compiles the different vulnerabilities, types of attacks, and related countermeasures within each of the seven layers of the blockchain; secondly, a specific focus on one layer of the blockchain namely, the contract layer. A model application is developed that depicts, in more detail, the security risks within the contract layer, while enlisting the best practices and tools to use to mitigate against these risks. The findings point to future research on developing countermeasures to alleviate the security risks and vulnerabilities inherent to one-owner control in smart contracts.
引用
收藏
页数:24
相关论文
共 17 条
  • [11] Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review
    Alanzi, Haifa
    Alkhatib, Mohammad
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [12] A taxonomy of the expected roles of librarians towards knowledge management An eight-layer perspective for practice
    Abukhader, Sajed
    LIBRARY MANAGEMENT, 2019, 40 (1-2) : 34 - 44
  • [13] Fair Label versus Blockchain Technology from the Consumer Perspective: Towards a Comprehensive Research Agenda
    Sodamin, Dino
    Vanek, Jiri
    Ulman, Milos
    Simek, Pavel
    AGRIS ON-LINE PAPERS IN ECONOMICS AND INFORMATICS, 2022, 14 (02):
  • [14] On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security (vol 12, pg 3881, 2024)
    Kuznetsov, Oleksandr
    Sernani, Paolo
    Romeo, Luca
    Frontoni, Emanuele
    Mancini, Adriano
    IEEE ACCESS, 2024, 12 : 162550 - 162550
  • [15] Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology
    Kumar, Randhir
    Tripathi, Rakesh
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (08): : 7916 - 7955
  • [16] Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology
    Randhir Kumar
    Rakesh Tripathi
    The Journal of Supercomputing, 2021, 77 : 7916 - 7955
  • [17] Strategic approaches concerning the security risks related to the implementation of the 5G technology and the use of facial recognition systems
    Vevera, Florina
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2020, 30 (01): : 125 - 132