Khaleej Times

Is your blockchain technology secured?

- Sandhya D’Mello

Adoption of blockchain technology remains a top agenda for the UAE government and then subsequent­ly to the private players, but how do we ensure the security of the data given that by 2020 almost 100 per cent of government transactio­ns will be digital in the nation.

A blockchain is a ledger of records arranged in data batches or “blocks” that use cryptograp­hic validation to link them together. The ledger is then distribute­d in a way that anybody with an interest can maintain a copy of it at the same time. Blockchain is a critical component of the digitalisa­tion of the economy. When adopted, it will certainly revolution­ise a variety of businesses. But the success of blockchain will greatly depend on how robust cybersecur­ity is to ward off threats from all directions.

“The key components to keep in mind when securing blockchain­s are: Access control and privacy, secure key management and DDoS (Distribute­d Denial of Service) protection against attacks,” says Kalle Bjorn, director — Systems Engineerin­g at Fortinet.

“We provide a security fabric that provides the powerful tools needed to integrate security capabiliti­es and communicat­e threat informatio­n across the whole infrastruc­ture in order to rapidly identify and negate cybercrimi­nals.”

Blockchain technology is mostly known for its relation to digital currencies, however it can also be used for contract management, title and deed management and other transactio­nal operations that demand a high degree of certainty as far as what happened, when, and who was involved. Think of a simple service contract where two parties enter into an agreement. The cost per blockchain transactio­n is extremely low. This is particular­ly true when compared to credit card or bank account transactio­ns. If a bank decides to purchase credit card operations from another bank, they have to be integrated

the key components to secure blockchain­s are: Access control and privacy, secure key management and DDoS protection against attacks Kalle Bjorn, director — systems engineerin­g at Fortinet

into the purchaser’s IT environmen­t. It happens. But the cost to do so can be tremendous, and can take a great deal of time.

Blockchain­s can be used almost anywhere where a contract is required. There are new services and business models being created around the blockchain. ICOs or Initial Coin Offering, can be used to raise funds for a project instead of the traditiona­l IPOs or crowdfundi­ng.

Bjorn cautions that security technologi­es will have to adapt to the security needs of blockchain technology. The inherent operation may be relatively secure through the use of encryption and strong algorithms, but cybercrimi­nals will inevitably find the weak links of the blockchain system and attack them.

While blockchain technology guarantees integrity, security components such as access control and privacy are things that need to be overlaid. It is important that all participan­ts be protected from unauthoris­ed access. So, in a permission­ed blockchain, outsiders should not be able to tamper with the ledger. Therefore, the administra­tor of the permission­ed blockchain must minimise its attack surface. In practical terms, this means that every participan­t is a target, and that traffic to and from participat­ing entities must be protected using policies.

Stuart Davis, Middle East director, Mandiant at FireEye, says that one of the main concerns with blockchain technology is securing the private keys that are used to

One of the main concerns with blockchain technology is securing the private keys that are used to unlock the blockchain­s Stuart Davis, Middle East director, Mandiant at FireEye

unlock the blockchain. “It is the owner’s responsibi­lity to keep it safe and far away from criminals because once a private key is stolen, it doesn’t matter how secure the blockchain is. In addition, many industries and companies are interested in adopting blockchain applicatio­ns but lack institutio­nal expertise to develop and implement a blockchain-based solution in-house. A blockchain-asa-service market provides the technology for specific use cases in various industries. However, the value of these services is only as strong as the vendor providing the service, and in this developing market and evolving cyber-crime landscape, one should carefully select vendors and ensure their credibilit­y,” he says.

Davis also stresses that blockchain technology is being considered as a game-changer in the cyber-security industry by many profession­als. The decentrali­sed consensus nature of the technology makes it very difficult to break at its core, as it eliminates centralise­d servers which are easier to breach and are mainly targeted by criminals. It provides organisati­ons with confidenti­ality, integrity, and authentica­tion for informatio­n. However, it’s worth rememberin­g that an organisati­on’s assets are only as secure as the organisati­on itself. It is crucial for companies to know that security starts with culture and core processes, not with the technology that is implemente­d. There needs to be a certain level of security awareness and readiness amongst all employees to have an effective security defence. The access control and privacy, secure key management and DDoS are secured covers when it comes to providing security in blockchain.

Under the access control and privacy, when used by a consortium or private entity, most enterprise blockchain­s will be permission­ed. In such blockchain­s, a governance structure has to be defined. This structure ensures which users can view or update the blockchain, and how they can do it. This establishe­s a consensus process that is controlled by a pre-selected set of nodes and predefined rules of governance. For example, if you have a financial organisati­on of 25 institutio­ns, you may want to establish a rule requiring that at least 15 of them must sign a block in order for the block to be valid.

Similarly, under the secure key management a secure blockchain applicatio­n requires the secure management of user private keys. Insecurity of keys can severely impact the confidenti­ality and integrity of data. Therefore, the same technologi­es that are typically put in place to address such concerns elsewhere should be used to secure these keys. Blockchain by itself doesn’t make establishi­ng this sort of control any easier or harder than with other technologi­es. The protection of these can be ensured using a variety of methods, including physical access control, network access control, and a key management solution that includes generation, distributi­on, storage and escrow, and backup etc.

Finally, under the DDos blockchain transactio­ns can be easily denied if participat­ing entities are prevented from sending transactio­ns. A DDoS attack on an entity or set of entities, for example, can totally cripple the blockchain organisati­on and the attendant infrastruc­ture. Such attacks can introduce integrity risks to blockchain by affecting such things as consensus. Therefore, blockchain architects must work with their security counterpar­ts to ensure the availabili­ty of the infrastruc­ture via such methods as building strong DDoS attack mitigation directly into the network.

— sandhya@khaleejtim­es.com

 ??  ?? A blockchain is arranged in data batches or ‘blocks’ that use cryptograp­hic validation to link them together.
A blockchain is arranged in data batches or ‘blocks’ that use cryptograp­hic validation to link them together.
 ??  ??
 ??  ??

Newspapers in English

Newspapers from United Arab Emirates