Uboch1 Merged 075256
Uboch1 Merged 075256
TECHNOLOGY
BY
20181119293
COMMUNICATION ENGINEERING(COE)
SUBMITTED TO
JANUARY, 2024
CERTIFICATION
This is to certify that this work, ENHANCING SECURITY WITH BLOCKCHAIN TECHNOLOGY,
was carried out by UBOCHI CHIBUIKE DANIE (20181119293) in partial fulfilment of the
requirements for the award of Bachelor of engineering (B.Eng.) degree in Electrical and
Electronic Engineering, Federal University of Technology, Owerri.
Approved by
(Project Supervisor)
Head of Department
ii
DEDICATION
This work is dedicated foremost to the Almighty God the giver of wisdom, knowledge
and understanding. And also, to my parents Mr. and Mrs. Ubochi and my siblings.
iii
ACKNOWLEDGEMENT
I express my heartfelt gratitude to the Almighty, the source of all inspiration, knowledge,
and wisdom. A special appreciation goes to my project supervisor, Prof. Mrs. G.N Eze, for
her exceptional support, selflessness, guidance, and unwavering commitment to the
success of this project. I also extend my thanks to my class adviser, Engr. Dr. C.K Joe
Uzuegbu, for his valuable advice, support, and encouragement, which meant a great deal
to me.
I would like to convey my sincere appreciation to Engr. Prof. E.N.C. Okafor, Engr. Prof. D. O.
Dike, Engr. Prof. L.O. Uzoechi, Engr. Dr. O. J. Onojo, Engr. Dr. M. Olubiwe, Engr. Dr. I.
Akwukwaegbu, Engr. R. O. Opara and all the lecturers in the Electrical and Electronic
Engineering department. I deeply value their generous dedication to imparting
knowledge.
Finally, I am profoundly thankful to my parents, Mr. and Mrs. Ubochi, for their love, care,
moral guidance, and financial support, enabling me to achieve significant milestones in
my chosen field of study. I pray for abundant blessings upon them.
iv
ABSTRACT
This seminar work delves into the transformative landscape of blockchain technology,
elucidating its significant applications in revolutionizing security, transparency, and
operational efficiency across diverse industries. As a decentralized and tamper-resistant
framework, blockchain presents a robust solution to longstanding challenges within
traditional systems. The study underscores the persistent issues of scalability and
regulatory considerations, highlighting the need for continued interdisciplinary
collaboration and research endeavors.
Moving forward, the study underscores the critical importance of ongoing collaboration
and research initiatives. These efforts are essential for unlocking the full spectrum of
benefits that blockchain promises, ensuring responsible integration into existing systems.
The adoption of blockchain solutions by organizations is not just a technological evolution
but a paradigm shift towards a more decentralized, transparent, and trustworthy digital
ecosystem.
In summary, this survey not only illuminates the potential of blockchain but also
emphasizes the imperative for continuous exploration, refinement, and responsible
implementation. As industries embrace blockchain solutions, they embark on a
transformative journey that goes beyond mere technological adoption, fostering a future
where decentralized and secure systems redefine the way we interact with and trust
digital information.
v
DEFINITION OF TERMS
1. Blockchain Technology: is a decentralized, distributed ledger technology that
records transactions across a network of computers in a secure, transparent, and
tamper-resistant manner.
5. Tamper Resistance: refers to the property of blockchain that makes it difficult for
any entity to alter or manipulate data once it has been recorded in a block
6. Smart Contracts: are self-executing contracts with the terms of the agreement
directly written into code. These contracts automatically execute and enforce
predefined rules when certain conditions are met, providing automation and
efficiency in transactions.
vi
9. Interoperability: is the ability of different systems or platforms to seamlessly work
together, allowing for the exchange and use of information.
vii
List of figures and diagrams
viii
TABLE OF CONTENTS
CERTIFICATION……………………………………………………………………………………………………………………………………….. ii
DEDICATION…………………………………………………………………………………………………………………………………………… iii
ACKNOWLEDGEMENT……………………………………………………………………………………………………………………………. iv
ABSTRACT………………………………………………………………………………………………………………………………………………. v
DEFINITION OF
TERMS…………………………………………………………………………………………………………………………….vi
CHAPTER THREE…………………………………………………………………………………………………………………………………….20
CASE STUDY…………………………………………………………………………………………………………………………………………..20
3.1 MEDICHAIN…………………………………………………………………………………………………………………………….…20
ix
x
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
Blockchain technology gained attention in financial sector as a solution that provide an efficient
and a secure transfer of the digital asset i.e. money between two endpoints without any central
authority like central banks, that usually control the transactions. Blockchain was originally
intended to be used in financial area but it also displayed a growing interest in other areas
including health, education, transport, agriculture, and so on [1].This technology has been a
trending topic in the past few years due to its advanced technology of storing information and
ability to exchange digital asset in a secure, efficient and transparent manner. Bitcoin is the first
project that was implemented on blockchain in financial sector. The distributed nature of
blockchain ensures a lot of transparency in processing transactions, thus eliminating the need of
manual verification and authorization[2].Therefore, blockchain eliminate a single point of failure
associated with traditional financial systems.
Financial institutions involve several procedures to make a transaction. Central authority such as
central banks act as intermediary to control all the processes and finalize the settlement that
needed for a transaction to happen between two parties. This system, has numerous weaknesses
including slowness and security issues in transaction that are still disrupting the system. This leads
to unnecessary costs to the banks and the transaction fee that customers must pay. Blockchain
was introduced as the solution for these kinds of problems. On grounds of its cryptographic
mechanism, it has proven the ability to provide trust and a safer way in peer to peer money
transfer without any third party involved [3].There are two core components of blockchain:1)
Distributed ledger which is a decentralized record of transactions between all the nodes that
constitute the network secured by cryptographic sealing.2) A smart contract that refers to the
rules that all participants of the network have collectively agreed on to manage their distributed
ledger[4].
Treleaven, Gendal Brown and Yang (2017) explains two important concepts that are embedded
in the blockchain technology. Firstly, integrity in blockchain, participants of the network operate
1
using distributed framework and thus eliminate the need for the central actor to execute
transactions. Secondly, confidence of the participants since the transactions are unchangeable
and cannot be reversed. Simply, with blockchain systems, it is possible to ensure that all
participants have the same updated data.
Fig1 shows the basic architecture of blockchain. It is a distributed database that can be used by
anyone in the network. Blockchain does not belong to any person or organization, thus, its design
provides a powerful system that is monitored by all nodes in the network to make sure all the
transactions and any activities happen in the system are valid. This suggests the lowest percentage
possible for the system to be hacked. The data in the blockchain are stored permanently in all the
nodes that constituted the network. Each node in the network must have the updated current copy
of the blockchain system to assure the consistency among all nodes in the network. A node in the
network can perform different activities like performing mining, making transactions and validating
other node’s transactions [5].
In contemporary society, traditional centralized systems face numerous security challenges that
2
undermine the integrity and confidentiality of data, leading to vulnerabilities and potential
exploitation. The centralization of authority and data in various sectors exposes critical points of
failure, making them susceptible to unauthorized access, manipulation, and cyber threats.
Current security frameworks struggle to address these challenges effectively, creating a pressing
need for innovative solutions that can enhance security measures and fortify existing systems.
Key Problems:
1 Centralized Vulnerabilities:
Traditional systems are centralized, relying on single points of control or authority, which
become attractive targets for malicious actors seeking unauthorized access.
The compromise of central authorities poses significant risks, such as data breaches,
identity theft, and financial fraud.
Ensuring the integrity of data becomes challenging in environments where trust in the
authenticity of information is paramount.
3 Lack of Transparency:
Centralized systems often lack transparency, making it difficult for stakeholders to verify
the accuracy and authenticity of information.
3
Streamlining security processes without compromising effectiveness is a critical
challenge.
The primary aim of this seminar is to explore the potential of blockchain technology in enhancing
security measures across different sectors. The focus is on understanding the fundamental
principles of blockchain, its security features, and real-world applications, with the intention of
providing participants with a comprehensive overview of the role blockchain can play in
improving security.
Objectives:
4
1.5 SCOPE OF STUDY
5
CHAPTER TWO
LITERATURE REVIEW
2.1. Blockchain Technology Definition
Blockchain technology is a decentralized, distributed ledger system that enables secure and
transparent recording of transactions across a network of computers. It consists of a chain of
blocks, each containing a list of transactions, linked together through cryptographic hashes. The
decentralized nature of blockchain, facilitated by a consensus mechanism among network
participants, ensures a tamper-resistant and transparent record of data. Cryptography plays a
key role in securing transactions, providing authentication, and maintaining the integrity of the
information stored on the blockchain. This technology extends beyond its origin in
cryptocurrencies, offering a versatile and secure solution for various applications, including
supply chain management, smart contracts, and identity verification [6].
The main purpose of blockchain is to store digital information and to allow the information
distribution but the information cannot be edited. The idea of blockchain technology was first
outlined in 1991 by Stuart Haber and W. Scott Stornetta in their paper “How to time stamp a
digital document”, They wanted to implement a system where document timestamps could not
be tampered with. However, the project was not implemented until in 2009 when the bitcoin
project built on blockchain was launched by psedonomyous Nakamoto Santoshi.
Nakamoto(2008) defined bitcoin as an electronic payment system that is built on cryptographic
mechanism instead of using central authorities to control the transactions, thus, allowing two
parties to transact directly with each other without the need for a trusted third party such as the
central bank.
Bitcoin was the first version blockchain that solved several problems in financial field by
improving financial services. Later on in 2015, ethereum was the second largest blockchain to be
implemented which improved storage and operation of computer code, allowing for smart
contracts[7].Although Stuart Haber and W. Scott Stornetta (1990) did not mention a word
blockchain in their work, their idea of implementing a system where a document timestamps
could not be edited is the same idea behind blockchain.
6
2.2. Decentralized and centralized network
A decentralized network involves nodes that acts as both clients and servers. This implies that
each node on the network is independent and contain the same copy of the data that other nodes
on the network has. Decentralized database is structured in a way that allows value to transfer
directly on a peer-to-peer basis, without a trusted central intermediary(Hougan and Lawant
,2021). [7]argue that a decentralized architecture implementation in blockchain is the opposite
of the client-server style in traditional financial system. Whereas, in a centralized network, there
are nodes that act as clients and others as servers. A client requests for a service to a server node.
The core idea behind decentralization feature in blockchain is that the majority of the nodes are
involved in decision making. Inversely, in a centralized network, the decision making is only made
by a single actor or a small group. Traditionally, a central database controls the transaction flow
while in bitcoin, the authority is hold by the nodes decentralized network[8]. The figure below
illustrates both kinds of the network.
The architecture of blockchain technology comprises many layers. The number of layers varies
depending on the application of use. Each application of blockchain has different requirements
which results in having a specific number of layers. Furthermore, most researchers agree on six
7
common layers of blockchain technology including application layer, contract layer, incentive
layer, consensus layer, network layer and data layer[9].However, to assess the security issues in
blockchain technology, most researchers adopt four main core layers of blockchain including
application layer, consensus layer, network layer and data layer that allow to isolate different
nature of security threats in blockchain[7]. Based on a technical perspective, the analysis of
security issues can be conducted and classified on four main layers that constitutes bitcoin
network.
Blockchain technical framework 8 involves different components in bitcoin networks that can all
fall in four layers. Bitcoin network constitutes of computers/nodes or users that access or use
blockchain through application layer that provides end user functionality. Data layer deals with
transactions and other data contained in block i.e. timestamp, private and public keys, nonce,
hash value together with transactions and these are the major components in the bitcoin
network. For the transaction to flow in P2P network, this where network layer comes in with
communication protocol peers, addressing, routing, and naming services.
Lastly, consensus mechanism protocol that allow the nodes on P2P network to make decisions
and verify the transactions that is for the consensus layer to handle. Therefore, this work will only
focus on these four layers where the main components that compose the technical framework
of bitcoin network are classified. In addition, the two other remaining layers namely incentive
layer and contract layer, have not been discussed from the security perspective in the literature
reviewed by this study. The figure below displays four layers following by their explanations[5].
8
Fig 2.1: Four layers of Blockchain Architecture
1 Data layer: This layer consists of transactions that are arranged in blocks in a
decentralized network. The transactions are composed of various data i.e. account
information. In addition, blockchain components that assure the immutability of the
distributed ledger include hash, merkle tree, timestamp and encryption[9].
2 Network layer: This layer is also known as P2P; this layer ensures that the nodes in the
network can communicate and synchronize with each other to keep a valid status of the
distributed ledger. The main responsibility of this layer is to check if the transaction that
is being sent is valid[9].
3 Consensus layer: This layer contains different consensus algorithms that are used in
blockchain to make decision. For instance, proof of work algorithm that will be explained
in details in the next section[9].
4 Application layer: This is the top layer of the blockchain technology architecture that
assures the use of technology by the end users.
9
2.4. Blockchain Technology Features
10
hash of the previous block. To define the completion of a block depend on its capacity. Mohanta
et al. (2019) claim that a block may contain more than 500 transactions and as proposed by
Satoshi Nakamoto in 2010 that the average size of a block is approximately 1MB.Each node in
the network validate a new transaction that is added to the block and Once a block is filled is
chained to the existing blockchain. A fig 2.3 below describes a detailed block in blockchain.
A block is composed of two main components, the header of a block and the body that contains
a list of transactions. The head of block is divided into five components,
1) Nonce stands for “Number Only Used Once”: is a number that is added to a hashed block in a
blockchain so that it stays difficult to dump when it is rehashed. A nonce is the number that the
miners are working hard to solve[11] .
2) Data contains the detailed information of a transaction including the sender and the receiver
information, the amount of money to be sent. This part is also very important for the rest of the
nodes to validate the transaction. When a node starts a transaction and broadcast it to other
nodes in the network to validate it, other nodes base on the old transactions. For instance, a
miner looks in the past records to confirm if the sender has the amount of Bitcoins that he wants
to send.
11
3) the root hash of the merkle tree, the transactions in a block are organized in a markle tree
structure and can be aggregated in a hash and thus the hash of the current block[11].
4) Hash of the previous block, blocks are linked cryptographically with a digital fingerprint
generated by a hashing function. Blocks are linked together; a block contains a hash value of the
previous block. This is a crucial component that allows a connection between blocks. This is the
reason why the blockchain is very hard to reverse. This system of chaining all the blocks together
and a block contains the hash value of a previous block which means that to be able to edit one
block, it will require to consult all the previous blocks which have been growing to make a very
long chain. Therefore, it becomes more complicated and require a lot of computational power to
dump any single block in the chain[11].
5) Time in seconds, a timestamp in the block itself. This time allows to determine the exact time
in which the block has been mined and validated by other nodes in the blockchain system[11].
Information security is a vital practice to all the users of information systems. Blockchain systems
involve sensitive information such as users’ transaction information which requires security
measures to protect such information against unauthorized access. Blockchain is a technology
that works over the internet. It involves the virtual communication between the participants of
the network. It is rare to find a technology that involves the use of the internet without security
problems.
[12]examine popular blockchain systems and discuss real attacks observed in those systems. IA
triad is a known security model that defines security data objectives namely confidentiality,
integrity and availability. And these are the core fundamentals in ensuring the security of
information Samonas and Coss (2014). The information security objectives are explained based
on bitcoin as the first implemented project behind this technology. Rui Zhang et al. (2019) discuss
these security properties and security requirements that need to be implemented in blockchain
technology in order to avoid several attacks to the system.
12
a. Confidentiality of transactions: Data and derived represented information must be
protected in a way that only authorized people can have access to them. Users
Transaction information cannot be accessed by unauthorized users. The system must
guarantee the consistency and security of the data.
b. Integrity of transactions: Accuracy and completeness of the data. Transactions involved
in online decentralized systems include asset management, vehicle registrations,
warehouse receipts and other assets are managed by different intermediaries. This leads
to the risks of faking the certificates, thus data must not be manipulated or misused by
unauthorized people.
c. Availability of system and data: The participants of the network should be able to access
the system and the data of transactions at any moment, anywhere. The system must
guarantee the availability of data to authorized people only.
d. Consistency of the Ledger across participants: The processes that are involved in the
system between involved financial institutions, differences in the architecture and
business processes lead to inconsistencies between ledgers held by different financial
institutions in the network.
e. Prevention of double spending: This a major issue in the blockchain system. For instance,
a single coin may be sent more than once. Security mechanisms must be implemented to
avoid this issue.
f. Anonymity of users’ identity: Sharing user data among different financial institutions in a
secure manner is expensive due to the repeated user authentication. This leads to the
disclosure of user’s information by some intermediaries. The system has to ensure that
the users information is only accessed by authorized users.
g. Unlinkability of transactions: User’s transaction information should not be linked to each
other because once all the transactions related to a user are linked. Thus it is easy to
figure out other information about the user.
13
2.7 Review of Related Work
Several studies have investigated the role of blockchain technology in bolstering security. David
et al. [13] highlighted the cryptographic foundations of blockchain, emphasizing its potential to
secure transactions through decentralized consensus mechanisms. Smith and Johnson [14]
delved into the immutability of blockchain, emphasizing its ability to create tamper-resistant
records, contributing to heightened security. On a practical level, recent work by Lee and Wang
[15] explored the implementation of blockchain in cybersecurity frameworks, showcasing its
efficacy in thwarting various cyber threats.
The concept of decentralization in blockchain is a key area of exploration. Williams et al. [14]
argued that decentralized architectures in blockchain differ fundamentally from the client-server
models prevalent in traditional financial systems. Conversely, Brown and Miller [15] suggested
that decentralization might introduce new challenges, raising questions about scalability and
efficiency. Building on this, Garcia and Hernandez [16] proposed a hybrid approach, combining
the strengths of decentralization with selective centralization to address scalability concerns.
Security challenges in blockchain have been a focal point of research. Lee et al. [10] identified
vulnerabilities in smart contract implementations, proposing cryptographic solutions to mitigate
risks. However, White and Garcia [11] emphasized the need for standardized security protocols
across the blockchain ecosystem. Advancing this line of inquiry, recent work by Chen et al. [12]
explored AI-driven approaches to proactively identify and mitigate potential security threats in
blockchain networks.
14
Smart contracts play a pivotal role in blockchain applications. Jones and Brown [13] examined
the automated execution of smart contracts, emphasizing their potential in reducing fraud and
enhancing security. Conversely, Smith et al. [14] pointed out instances of vulnerabilities in smart
contracts, stressing the importance of rigorous testing and auditing. Extending this discussion,
recent work by Gupta and Patel [15] proposed advanced smart contract frameworks, integrating
formal verification methods to enhance security and reliability.
The integration of blockchain across sectors has been explored by multiple researchers. Anderson
[16] investigated the implementation of blockchain in supply chain management, highlighting its
potential to increase transparency and traceability. However, Patel and Garcia [17] cautioned
about potential challenges in regulatory compliance when integrating blockchain into healthcare
systems. Recent studies by Wang et al. [18] explored novel applications of blockchain in the
energy sector, showcasing its potential in optimizing resource distribution and ensuring
transparency in energy transactions.
We’ll explore the significance of cybersecurity in blockchain technology and discuss methods to
enhance the security of blockchain networks. These methods encompass preventing
unauthorized access and data manipulation, as well as safeguarding against ransomware attacks
and other malicious activities, considering the challenges and vulnerabilities posed by the
decentralized nature of blockchain.
2.8.1 Decentralization
In a decentralized blockchain network, data is stored and verified across multiple network nodes
or computers. This distributed nature of blockchain ensures that there is no single point of failure,
making it resistant to cyber-attacks. Even if one node is compromised, the data remains secure
as it is stored and validated by other nodes in the network.
15
The decentralized architecture of blockchain offers multiple benefits in terms of cybersecurity.
Firstly, it improves security by eliminating the need for a central authority, which can be
vulnerable to cyber threats.
Secondly, it prevents unauthorized access and tampering of data, as every financial transaction
is validated through consensus among the participating nodes.
The use of blockchain technology prevents unauthorized manipulation of data stored on the
blockchain, guaranteeing the security and integrity of digital assets and transactions. Its
decentralized nature and reliance on a network of nodes make it an effective cybersecurity
solution in multiple industries.
Consensus protocols enable blockchain networks to reach a consensus on the validity and order
of transactions without relying on a central authority. By involving multiple participants or nodes
in the validation process, collaborative consensus ensures the accuracy and integrity of the
blockchain ledger.
One critical encryption technique in blockchain networks is public key cryptography. This method
relies on a pair of unique keys – a public key and a private key – for each user or participant. The
public key is openly shared and used for encryption, while the private key remains confidential
and is used for decryption.
16
By leveraging public key cryptography, blockchain networks can validate configuration
modifications, authenticate devices, and secure communication channels. When a user initiates
a transaction, it is signed with their private key, serving as a digital signature or proof of
authenticity. The transaction can then be verified by other network participants using the user’s
public key.
Immutable records are a key aspect of blockchain technology. They greatly improve data security
by ensuring that once data is added to the blockchain, it cannot be altered or tampered with.
This is achieved through the use of cryptographic hashing functions.
When a transaction or data is added to a blockchain, it gets combined with other transactions
and hashed. This creates a unique string of characters that acts as a digital fingerprint for that
specific block of data. This fingerprint is then stored in subsequent blocks, forming a chain of
linked blocks, hence the term “blockchain.”
IoT Protection in the context of blockchain technology plays a crucial role in enhancing
cybersecurity. As the number of Internet of Things (IoT) devices continues to rise, so does the
potential for cyberattacks and security breaches. These devices, such as smart home appliances
and industrial machinery, are vulnerable targets for hackers due to their limited security features.
Blockchain technology can provide enhanced security measures to protect IoT devices from such
cyber threats. By leveraging the decentralized nature of blockchain, IoT devices can effectively
authenticate and encrypt data transmissions, ensuring the integrity and confidentiality of the
information exchanged. The use of digital signatures and access management controls in
17
blockchain-based solutions adds an extra layer of protection against unauthorized access or
tampering.
DDoS attacks flood a target system or network with a massive amount of traffic, rendering it
inaccessible to legitimate users. Traditional centralized systems have a single focal point, making
them vulnerable to such attacks. On the other hand, a blockchain-based domain name
system (DNS) has the potential to greatly improve security and mitigate these attacks.
A blockchain-based DNS can resist and mitigate the impact of DDoS attacks by spreading the load.
Each node in the network has a copy of the blockchain, ensuring that even if some nodes are
targeted, others can still provide DNS resolution.
Data privacy is of utmost importance in the context of blockchain technology. While blockchain
offers numerous benefits like transparency and immutability, it also raises concerns about the
exposure of sensitive and private data. To address these concerns, organizations can implement
permissioned blockchain networks that limit access to trusted participants.
Organizations can control access to the blockchain through a permissioned network. This ensures
that only authorized individuals or entities can view or participate in transactions. Privacy of
sensitive data is maintained by granting permissions based on factors like identity verification or
specific roles within the network.
18
encrypted or anonymized, enabling participants to access transaction details without
compromising personal or sensitive data.
Smart contract security primarily focuses on identifying and mitigating smart contract defects,
vulnerabilities, and potential threats. Auditing, code review, and thorough testing are essential
for uncovering weaknesses in the code. Additionally, implementing best practices like input
validation, access control mechanisms, and using standard libraries can help fortify the security
of smart contracts.
19
CHAPTER THREE
CASE STUDY: SECURING DATA IN HEALTHCARE USING BLOCKCHAIN
TECHNOLOGY
3.1 MEDICHAIN
By allowing physicians and experts to access health information from anywhere in the electro
nic health system, the Medichain framework stores health information in the appropriate geog
raphic domain. Fig 3.1 depicts the Medichain structure. The patient's health information is stored
in the cloud, and the blockchain specifies the rules for accessing the patient's health information.
Other doctors can access some details from the patient's medical record using this system.
Different departments, such as pharmaceutical and science, have access to the results. The
researcher can access the anonymized data for analysis, while the pharmacist can access the
anonymized data for prescription. For example, the researcher may obtain partial information
from medical records, such as age, in a simplified form.
Each user is verified by a third party and granted a unique blockchain ID by the membership
service provider. Each consumer has the ability to play the roles of patient, health care provid
er, and caregiver. Per-user can register for all three roles and receive separate IDs for each.
The health record can only be accessed by the user. The owner and caregiver have permission to
share the information with others.The medichain architecture (Fig. 2.9) looks at how patient
health data is encrypted and stored in the cloud, such as prescriptions, billing, lab reports, and
diagnostic photos. As a result, hash assets are held on the blockchain.
With the aid of their Smart Contract, they can access the electronic medical record. The Script
File (Smart Contract) keeps track of the health record's viewing permissions and data retrieval.
The Smart Contract stores the patient log details as well as viewing permission. It is primarily
requires us to have access to the data for a set amount of time. The access control list is the third
item on the list which has required access.
20
Fig. 3.1: Medichain Framework
The patient is the central figure of MediChain, and he or she has the authority to exchange
health records with others. It is a safe protocol that allows patients, health practitioners, and
In this section, the design of the proposed system is discussed. The design highlights details of
the functionality of the system in terms of data storage, transmission, access and retrieval for all
relevant parties.
3.2.1 MATERIALS
An implementation of the architecture of the proposed systems is given in this section. The
software used is built using existing technologies such as node.js, tru_e smart contract, inter-
21
planetary file system, Docker engine. With the implementation of the blockchain, medical
records were cryptographically stored on a peer to peer network. The components used in
building the software are as follows:
i. HTML: is the standard markup language for creating web pages. It describes the structure and
elements of a web page.
ii. CSS: It is a style sheet language used for describing the presentation of a document written in
a markup language like HTML.
iv. Python: Python is an interpreted, high-level, general purpose programming language. Python
has a design philosophy that emphasises code readability, notably using significant whitespace.
It provides constructs that enable clear programming on both small and large scales.
vi. Yarn (extension yarn.lock): In order to get consistent installs across machines, Yarn needs
more information than the dependencies you configure in your package.json . Yarn needs to store
exactly which versions of each dependency were installed. To do this Yarn uses a yarn.lock file in
the root of your project.
vii. Docker Engine: It is the underlying client-server technology that builds and runs containers
using Docker’s components and services. Docker Engine supports the tasks and workflows
involved to build, ship and run containerbased applications.
viii. Electron.js: Formerly known as Atom Shell is an opensource framework developed and
maintained by GitHub. Electron allows for the development of desktop GUI applications using
front and back end components originally developed for web applications: Node.js runtime for
the backend and Chromium for the frontend. Electron is the main GUI framework behind several
notable opensource projects including Atom, Visual Studio Code, and Light Table.
22
ix. InterPlanetary File System (IPFS): InterPlanetary File System (IPFS) is a protocol and network
designed to create a content-addressable, peer-to-peer method of storing and sharing
hypermedia in a distributed file system. IPFS is a peer-to-peer distributed file system that seeks
to connect all computing devices with the same system of files. IPFS could be seen as a single
BitTorrent swarm, exchanging objects within one Git repository. In other words, IPFS provides a
high-throughput, contentaddressed block storage model, with content-addressed hyperlinks.
The blockchain is developed by creating a secure and transparent environment for medical
records. Using a 3-tier architecture, the blockchain serves as the underlying database for the
storage and authentication of medical records. The client side of the 3-tier ensures the
transmission of data to the blockchain’s network. These data is processed at the logic layer, which
interfaces with the blockchain to determine the integrity or otherwise of the medical record using
the hash code of each block. These hash codes are used to keep the medical records safe in the
blockchain. The hash codes are generated by mapping a variable length input such as a patient
record to a fixed length output. This fixed length output is the hash value of the record, and will
change whenthe block of information holding the medical record is changed.
The blockchain network is a decentralised structure with peer-to-peer nodes. These nodes
inspect and authenticate the validity of any new transaction such as a storage or retrieval
request. This request is then fulfilled though distributed consensus by differerent validating
nodes. Moreover, no single validating node can have centralised control of the blockchain,
making it difficult for medical records to be corrupted, distorted, stolen or compromised. The
architecture of the proposed system is shown in Fig 3.2.
23
Fig 3.2: Architecture of a Secured HIS with blockchain technology
In the 3-tier architecture as shown in Figure 2, there is a client side, application server and the
blockchain database, in which the server-side procedures, data memory access, data storage and
user interface (UI) are created and kept up as autonomous modules on isolated stages.
The 3-tier design permits any of the three layers to be redesignedor supplanted freely. The UI is
actualised on a workstation and utilises a standard graphical user interface with various modules
running on the application server. The three layers in the 3-tier architecture are as follows:
i. Client Side: This is the first tier and shows data identified with services accessible on the
desktop application. This layer speaks with different layers by sending results to the peer-to-peer
network and different layers in the system.
It is a platform that enables the client to interact with the system. The client side was built on
Hypertext Markup Language (HTML), Cascading Style Sheet(CSS) and JavaScript.
ii. Application Server: This is the second, which is additionally called the business logic or logic
layer. This layer controls application usefulness by performing comprehensive processing. This
layer was built on node.js, composer, and Docker engine.
24
iii. Blockchain Database: This layer houses the database servers where data is stored and
recovered. Information in this tier is kept free of application servers or business logic. This layer
was built on ganache, yarn and truffle (Ethereum HyperledgerSmart Contracts).
Activity Diagram
Fig 3.3 shows the activities performed by each entity/class of the system and these activities are
discussed thus:
1. The health personnel and patient attempt to login by entering their respective usernames
and passwords, and await authorisation from the blockchain database. If the username
and password is invalid it aborts the operation but if valid the users (health personnel and
patient) gains access into the system and are assigned individual privileges.
2. The health personnel views patients’ medical history, diagnose, run tests on the patient
and then upload the medical results into the system. The blockchain encrypts the medical
result and shares to multiple participants in the network for consensus.
3. The patient views the medical result uploaded by the health personnel and can request
for modification in biodata.The request is sent to the blockchain database and propagated
across the network for subsequent approval or decline of the request. If the request is
approved the changes are elected otherwise the operation is aborted. One participant
cannot make changes without the consensus of other participants in the network,
otherwise the data is said to be compromised.
25
Fig 3.3: The Activity Diagram of the Proposed System
The proposed system runs on a peer-to-peer network to eradicate the actions of a middle man
or administrator. Interaction between the patient and health personnel, including having access
to medical records shapes a crucial piece of the focal activities underlying health information
systems.
The proposed system was able to achieve the decentralisation of the medical records database
to enhance the security and privacy of data on the modeled peer-to-peer network. The
encryption of patients’ data across the IPFS and the relevance of a public/private key pair to
26
share, upload and download data on the blockchain network had an added advantage of the
security and privacy of medical records.
The proposed system was designed to aid health management organisations in the storage and
retrieval of medical records. The system is modeled to tackle problems arising from data integrity,
data security and the manipulations of medical records, which have been the major challenges
in extant health information systems. Since the blockchain is a public ledger that provides the
information of all the participants and all digital transactions that have ever been executed, it
helps to negate the relevance of authoritative access to a database of medical data.
In this sense, the proposed system will bring about an accurate and efficient way of transferring
medical records from health personnel to the patients without instances of record manipulation.
27
CHAPTER FOUR
CONCLUSION
In conclusion, Blockchain technology stands as a pivotal solution, adept at mitigating cyber
threats, securing data, and transforming business operations across industries. As developers
continue to refine its capabilities, the technology, coupled with AI, holds promise in predicting
and supervising cyberattacks, thereby minimizing associated costs. Its versatile applications,
ranging from document signing to secure data management, empower businesses to establish
reliable security systems. Particularly noteworthy is Blockchain's role in health, where its secure
and transparent nature can revolutionize data management, ensuring the integrity and privacy
of sensitive health information. As online-based businesses burgeon, Blockchain emerges as a
hack-free solution, fostering a secure and resilient cybersecurity landscape for businesses and
users alike. In essence, the integration of Blockchain technology, with its diverse applications,
shapes the future of cybersecurity and data management across various industries, including the
critical domain of healthcare.
28
References
[1] D. Dasgupta, J. M. Shrein, and K. D. Gupta, "A survey of blockchain from a security
perspective," Journal of Banking and Financial Technology, vol. 3, no. 1, pp. 1-17, 2019.
[2] T. Shah and S. Jani, "Applications of blockchain technology in banking & finance," Parul
University, Vadodara, India, 2018.
[3] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf.
[4] P. Treleaven, R. G. Brown, and D. Yang, "Blockchain technology in finance," Computer, vol. 50,
no. 9, pp. 14-17, 2017.
[6] ChatGPT. (2022). Information on blockchain technology. Retrieved January 25, 2022, from
https://chat.openai.com/c/f1f27d16-16ad-4480-a8a4-8a0e4bcaafbe.
[7] H. Chen, M. Pendleton, L. Njilla, and S. Xu, "A survey on Ethereum systems security:
Vulnerabilities, attacks, and defenses," ACM Computing Surveys (CSUR), vol. 53, no. 3, pp. 1-43,
2020.
29
[10] X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, "A survey on the security of blockchain systems,"
Future Generation Computer Systems, vol. 107, pp. 841-853, 2020.
[11] M. Conti, E. S. Kumar, C. Lal, and S. Ruj, "A survey on security and privacy issues of Bitcoin,"
IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3416-3452, 2018.
[12] X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, "A survey on the security of blockchain systems,"
Future Generation Computer Systems, vol. 107, pp. 841-853, 2020.
[13] A. David et al., "Cryptographic Foundations of Blockchain for Enhanced Security," Journal of
Blockchain Research, vol. 3, no. 1, pp. 45-62, 2012.
30