Open Access
ARTICLE
Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications
1 Department of Information Management, National Taiwan University of Science and Technology, Taiwan
2 Department of Information Management, National Dong Hwa University, Hualien, Taiwan
3 Department of Computer Science and Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan
* Corresponding Author: Kuo-Hui Yeh. Email:
Computers, Materials & Continua 2022, 73(2), 2731-2755. https://doi.org/10.32604/cmc.2022.029161
Received 26 February 2022; Accepted 20 April 2022; Issue published 16 June 2022
Abstract
As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications with respect to these security domains. In addition, a case study, including a security testing and risk evaluation on each stack of a specific organization, is demonstrated as an implementation instruction of our proposed risk management framework. According to the best of our knowledge, this study is one of the pioneer researches that provide a means to evaluate the security risks of permissioned blockchain applications from a holistic point of view. If users can trust the applications that adopted this framework, this study can contribute to the adoption of permissioned blockchain-enabled technologies. Furthermore, application providers can use the framework to perform gap analysis on their existing systems and controls and understand the risks of their applications.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.