Blockchain for Cybersecurity

Ensuring Business Continuity with Blockchain Distributed Storage

Home|Blockchain for Cybersecurity

Authors: Edward Hackbarth, Ulrich Lang   (Original Version: June 24, 2019)

Today we would like to present an interesting use case for blockchain to improve cybersecurity. One of DARPA’s original design features of the Internet was to ensure connectivity is resilient to partial failures. This was achieved through decentralization and recovery from failures. With more and more data stored online, a similarly robust infrastructure is needed for data storage. Any ICT department would be interested in preserving their data during and after network compromise, and any and all networks are susceptible to compromise, arriving in a variety of disparate ways, such as natural disaster, terrorist activity, malicious intent, or technical and equipment failures, to name some.

Blockchain is useful beyond its original purpose as a decentralized immutable bitcoin transaction ledger. We recently looked at numerous use cases, including blockchain for supply chain provenance tracking and risk analysis (related to our SCRAMS technology)

We recently outlined a blockchain solution for a government agency for preserving mission critical data under the most extreme network compromising attacks. During this effort, it became clear that such network resilience would be beneficial and applicable to nearly any networking environment and everyday data storage infrastructure.

Our proposed solution approach is outlined in the high-level diagramming abstraction on the right. The blue nodes are, of course, the network participants, be they devices, systems, etc. The orange qualifiers describe some the supporting technology of the resilient blockchain storage solution. And the input actors on the left represent actions on the network. Network compromising actions are included for simulation and solution demonstration purposes.

Figure 1. DLT-based network and data protection abstraction.

Having the solution be a drop in for existing network storage solutions would be most ideal. Therefore, we consider the incoming actions as standard database queries, be they SQL or NOSQL. Conceptually the query language doesn’t matter.

We then create smart contracts that bridge the queries with the unique backing store of the resilient blockchain. We introduce the idea of Smart QUERY Contracts.

The data pushes and queries would function regardless of compromising attacks or situations, short of complete network devastation. The smart query contracts do all the work of translating, distributing the data, and putting it back together as needed to honor queries, all using standard DB query languages.

Writing the data pushes and queries into the ledger would further provide an automatic audit trail.

Figure 2. Smart QUERY contracts map standard queries
into resilient decentralized storage.

Based on our preliminary research, such an architecture should be able to recover from failures affecting a significant portion of the decentralized network, maybe caused by human error, storage technology failure, electromagnetic pulses (or nuclear radiation) damaging microelectronics etc. We will report back once with experimental results in a future blog update.

By |June 24th, 2019|General|Comments Off on Blockchain for Cybersecurity