Volume 22, Issue 2 (9-2025)                   JSDP 2025, 22(2): 65-78 | Back to browse issues page


XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Amoli F, Bastam M, Ataei E. A Blockchain-Driven Approach to Automating Event Log Data Integrity and Confidentiality. JSDP 2025; 22 (2) : 4
URL: http://jsdp.rcisp.ac.ir/article-1-1451-en.html
Assistant Professor, Department of Computer Engineering, Faculty of Engineering and Technology, University of Mazandaran, Babolsar, Iran
Abstract:   (215 Views)
With the rapid rise of cybersecurity threats and the increasing complexity of digital security, event log data serves as a critical source for identifying and analyzing cyberattacks and threats. This data provide key insights into system activities, essential for detecting unauthorized intrusions, analyzing suspicious behaviors, and conducting security investigations. However, any alteration or tampering with the data can disrupt the analysis and detection processes, leading to incorrect security decisions.
Blockchain technology, with its unique features such as decentralization, immutability, and transparency, has been recognized as a reliable and secure platform for storing and protecting data. This technology enables the storage of data hashes in a way that any changes can be easily detected. However, directly storing the vast volume of event log data on the blockchain faces challenges such as high costs and storage space limitations.
In this research, an innovative model has been presented to automate the assurance of event log data integrity and confidentiality using the public Ethereum blockchain and smart contracts. Instead of storing event log data directly, only their hashes have been saved on the blockchain. This approach not only reduces storage costs but also ensures data confidentiality.
The automated data integrity assurance process in this model occurs in two stages:
  1. Stage One: Event log data hashes have been periodically stored on the blockchain and compared with previous hashes.
  2. Stage Two: Over longer intervals, all stored hashes have been reviewed and validated to prevent any potential tampering.
In this study, the costs associated with implementing this model on the Ethereum Sepolia test network had been precisely calculated. The analysis indicates that operational costs and computational overhead have been optimized across different time intervals, demonstrating the model's feasibility for large-scale deployment.
Ultimately, this research tries to introduce a novel and practical model, taking a significant step toward automating the assurance of event log data integrity and confidentiality, providing a reliable solution for real-world applications.
Article number: 4
Full-Text [PDF 2284 kb]   (79 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2024/12/16 | Accepted: 2025/07/21 | Published: 2025/09/13 | ePublished: 2025/09/13

References
1. پارسائیان، محمودرضا و صمیمی، حسین، «رویکردی نوین برای جلوگیری از آسیب‌پذیری در قراردادهای هوشمند و مقابله با حملات Reentrancy بر بستر بلاک‌چین»، یازدهمین کنگره ملی سراسری فناوریهای نوین در حوزة توسعة پایدار، ایران، تهران، 1400. https://civilica.com/doc/1469930
1. M. R. Parsaeian and H. Samimi, "A Novel Approach to Prevent Vulnerabilities in Smart Contracts and Counter Reentrancy Attacks on Blockchain Platform," in Proc. 11th National Congress of New Technologies in Sustainable Development, Tehran, Iran, 2021. Avialable: https://civilica.com/doc/1469930
2. تیموری، احمد، دی پیر، محمود، «سامانه دو سطحی تشخیص نفوذ برای شبکه اینترنت اشیا مبتنی بر یادگیری عمیق»، پردازش علائم و داده‌ها، دورة 21، شمارة 3، ص 3-22، 1403.
2. A. Teymouri and M. Deypir, "Two-level intrusion detection system for Internet of Things network based on deep learning", Signal and Data Processing, vol. 21, no. 3, pp. 3-22, 2024. [DOI:10.61186/jsdp.21.3.3]
3. س. کدخدا ده خانی, ح. زنگی آبادی زاده, م. قاسمی, م. رحمانی, و ف. وظیفه دوست, «فناوری بلاکچین: مروری بر مفاهیم، چالش‌های بلاکچین در خدمات عمومی و طبقه‌بندی توکن‌های بلاکچین»، دو فصلنامة محاسبات و سامانه‌های توزیع شده، شمارة 6، 118-136، 1402.
3. S.kadkhodadehkhani, H.Zangiabadi Zadeh, M.Ghasemi, F.Vazifehdoost, M.Rahmani. Blockchain Technology: A Review of Concepts, Blockchain Challenges in Public Services, and Blockchain Token Classification, Journal of Distributed Computing and Systems (JDCS), Vol 6, Issue 1, Page 118-136, 2023.
4. ب. پورولیخان نوخندان, «یک طرح ذخیره‌سازی توزیع‌شده بر اساس بلاکچین و IPFS برای داده‌های IoT آتش‌نشانی»، ششمین همایش و نمایشگاه بین‌المللی آتش‌نشانی و ایمنی شهری، 1403. https://civilica.com/doc/2059774
4. B. Pourvelikhan Noukhendan, "A Distributed Storage Scheme Based on Blockchain and IPFS for Fire Department IoT Data," in Proc. 6th International Conference and Exhibition on Fire Fighting and Urban Safety, Iran, 2024. [in Persian] Available: https://civilica.com/doc/2059774
5. پورعسکری، حسن، خطیبی بردسیری، عمید، محمدی قنات قستانی، مختار «حفظ حریم خصوصی در اینترنت اشیا برای انتقال داده‌ها در حوزه سلامت با استفاده از زنجیره بلوکی»، پردازش علائم و داده‌ها، دورة 21، شمارة 3، ص 149-178، 1403.
5. A. Hassan Pour Askari, A. Khatibi Bardsiri, and M. Mohammadi Ghanat Ghestani, "IoT privacy for the transmission of data in the field of health using blockchain," (in eng), Signal and Data Processing, Research vol. 21, no. 3, pp. 149-178, 2024. doi: 10.61186/jsdp.21.3.149. [DOI:10.61186/jsdp.21.3.149]
6. M. H. Rakib, S. Hossain, M. Jahan, and U. Kabir, "A blockchain-enabled scalable network log management system," Journal of Computer Science, vol. 18, no. 6, p. 496.508, 2022. [DOI:10.3844/jcssp.2022.496.508]
7. P. Jain, "Decentralize log file storage and integrity preservation using blockchain," International Journal of Computer Science and Information Technologies, vol. 11, no. 2, pp. 21-30, 2020.
8. N. Salunke, S. Sonawane, and D. Motwani, "Decentralized evidence storage system using blockchain and IPFS," in International Conference on Information, Communication and Computing Technology, 2023: Springer, pp. 259-280. [DOI:10.1007/978-981-99-5166-6_18]
9. M. Kumar, A. K. Singh, and T. S. Kumar, "Secure log storage using blockchain and cloud infrastructure," in 2018 9th International Conference on Computing, Communication and Networking Technolo gies (ICCCNT), 2018: IEEE, pp. 1-4. [DOI:10.1109/ICCCNT.2018.8494085]
10. W. Pourmajidi and A. Miranskyy, "Logc hain: Blockchain-assisted log storage," in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018: IEEE, pp. 978-982. [DOI:10.1109/CLOUD.2018.00150]
11. Y. Taguchi, A. Kanai, and S. Tanimo, "A distributed log management method using a blockchain Scheme," in 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020: IEEE, pp. 1-3. [DOI:10.1109/ICCE46568.2020.9043151] []
12. K. Awuson-David, T. Al-Hadhrami, M. Alazab, N. Shah, and A. Shalaginov, "BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem," Future Generation Computer Systems, vol. 122, pp. 1-13, 2021. [DOI:10.1016/j.future.2021.03.001]
13. H. Tian, J. Wang, C.-C. Chang, and H. Quan, "Public auditing of log integrity for shared cloud storage systems via blockchain," Mobile Networks and Applications, pp. 1-13, 2023.
14. M. Altulyan, L. Yao, S. Kanhere, and C. Huang, "A blockchain framework data integrity enhanced recommender system," Computational Intelligence, vol. 39, no. 1, pp. 104-120, 2023. [DOI:10.1111/coin.12548]
15. L. Li, D. Jin, T. Zhang, and N. Li, "A secure, reliable and low-cost distributed storage scheme based on blockchain and IPFS for firefighting IoT data," IEEE Access, vol. 11, pp. 97318-97330, 2023. [DOI:10.1109/ACCESS.2023.3311712]
16. H. Javed et al., "Blockchain-based logging to defeat malicious insiders: The case of remote health monitoring systems," IEEE Access, vol. 12, pp. 12062-12079, 2023. [DOI:10.1109/ACCESS.2023.3346432]
17. J. H. Khor, M. Sidorov, M. T. Ong, and S. Y. Chua, "Public blockchain-based data integrity verification for low-power IoT devices," IEEE Internet of Things Journal, vol. 10, no. 14, pp. 13056-13064, 2023. [DOI:10.1109/JIOT.2023.3259975]
18. B. Putz, F. Menges, and G. Pernul, "A secure and auditable logging infrastructure based on a permissioned blockchain," Computers & Security, vol. 87, p. 101602, 2019. [DOI:10.1016/j.cose.2019.101602]
19. Z. Liu, L. Ren, Y. Feng, S. Wang, and J. Wei, "Data integrity audit scheme based on quad merkle tree and blockchain," IEEE Access, vol. 11, pp. 59263-59273, 2023. [DOI:10.1109/ACCESS.2023.3240066]
20. A. Ali, A. Khan, M. Ahmed, and G. Jeon, "BCALS: Blockchain‐based secure log management system for cloud computing," Transactions on Emerging Telecommunications Technologies, vol. 33, no. 4, p. e4272, 2022. [DOI:10.1002/ett.4272]
21. W. Li, Y. Feng, N. Liu, Y. Li, X. Fu, and Y. Yu, "A secure and efficient log storage and query framework based on blockchain," Computer Networks, vol. 252, p. 110683, 2024. [DOI:10.1016/j.comnet.2024.110683]
22. P. Jiang, B. Qiu, and L. Zhu, "Toward reliable and confidential release for smart contract via ID-based TRE," IEEE Internet of Things Journal, vol. 9, no. 13, pp. 11422-11433, 2021. [DOI:10.1109/JIOT.2021.3126340]
23. او شیلدز, رجی, ناصر, مهدی, صادقی, حسین. «قرادادهای هوشمند: توافقات حقوقی در پرتو بلاکچین»، پژوهش‌های حقوقی، مجلة 18، شمارة 37، صص 261- 288، 1398. 10.48300/jlr.2019.91607
23. O. Shields, R. Naser, and H. Sadeghi, "Smart Contracts: Legal Agreements for the Blockchain", Journal of Legal Research, vol. 18, no. 37, pp. 261-288, 2019. [in Persian]10.48300/jlr.2019.91607
24. J. Zhu, S. He, P. He, J. Liu, and M. R. Lyu, "Loghub: A large collection of system log datasets for ai-driven log analytics," in 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), 2023: IEEE, pp. 355-366. [DOI:10.1109/ISSRE59848.2023.00071]
25. M. Bartoletti, F. Fioravanti, G. Matricardi, R. Pettinau, and F. Sainas, "Towards benchmarking of Solidity verification tools," arXiv preprint arXiv:2402.10750, 2024.
26. J. Jiang, X. Zhang, and Z. Yuan, "Feature selection for classification with Spearman's rank correlation coefficient-based self-information in divergence-based fuzzy rough sets," Expert Systems with Applications, vol. 249, p. 123633, 2024. [DOI:10.1016/j.eswa.2024.123633]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing