1 Introduction
1.1 Motivation
1.2 Contributions
1.3 Paper Roadmap
2 Background
2.1 Blockchain
2.2 Research Method
Table 1
Inclusion criteria | |
IC1 | Papers discuss security threats of THAs |
IC2 | Papers discuss blockchain-based countermeasures to mitigate security threats of THAs |
IC3 | Papers present security threats of BBHAs |
IC4 | Papers discuss countermeasures to mitigate security threats of BBHAs |
Exclusion criteria | |
EC1 | Papers published before 2008 and not available freely |
EC2 | Papers shorter than five pages and not written in English |
2.3 Related Work
2.4 Back-Pain Patients’ Healthcare Application Case
3 Security Threats Mitigated
3.1 Data Tampering
3.2 Data Theft
Table 3
Risk-related concept | Asset-related concept | Risk treatment concept | |||
Threat | Vulnerability | System asset | Business asset | Countermeasure | BC feature |
Data tampering | Weak centralized access control mechanism | Healthcare database, Access control | Medical records (1), Patient data (C) | Distributed access control mechanism | Access control |
Access control with cryptographic primitives (e.g. attribute-based encryption) | |||||
No mechanism to verify and validate the authenticity of data | Healthcare database, Medical transactions | Medical records (1), Patient data (C), Data validation (1, A) | Distributed (shared) and append-only ledger | Distributed | |
Proof of work-based consensus mechanism | Consensus | ||||
Data validation without requiring third party | |||||
Unique hash id of original data | Cryptography | ||||
HLF-based trusted authorized nodes | Permissioning | ||||
Decentralized and tamper-resistant | Decentralized & Tamper-evident | ||||
Immutable logging and data provenance | Provenance | ||||
Data theft | Improper security controls for centralized database | Healthcare system, Data access right | Healthcare database (1), Medical records (C) | Blockchain-based P2P network | Distributed |
Voting process to determine data access | Consensus | ||||
Permissioned settings to restrict data access | Permissioning | ||||
Access control with cryptographic primitives | Access control | ||||
Weak centralized access control mechanism | Access control | Medical records (C) | Distributed access control mechanism to control data leak | ||
No proper cryptographic controls | Healthcare system | Medical records (C) | Encrypts data and store on/off chain | Cryptography | |
Store the encrypted and obfuscated data | |||||
Medical records mishandling | Patients have weak control over their medical records | Data access right | Medical records (1, C) | Blockchain enables patients to control the access to their data | Permissioning |
Relying on a third-party | Healthcare database | Medical records (C) | Data validation without requiring third party | Decentralized | |
No guarantee of electronic medical records authenticity | Decentralized and tamper-resistant | Decentralized & Tamper-evident | |||
Consensus mechanism | Consensus | ||||
Counterfeit drugs | Weak traceability controls in pharmaceutical supply chain | Drugs details, Supply chain | Drug traceability (1) | Immutable and traceable drug trails | Provenance & Immutability |
Man in the middle attack | Weak controls to secure communication | Network, Data exchange | Communication (1) | Distributed IPFS for storage | Distributed & Cryptography |
P2P-based encrypted communcation | |||||
Lack of anonymization of patient medical records | Healthcare system | Medical records (1, C) | Blockchain anonymize the data | Pseudo-anony mous | |
Single point failure | Relying on centralized server | Healthcare database and system | Server (A), Services (A) | Decentralized distributed P2P network | Decentralized & Distributed |
Weak implementation to handle large number of requests | |||||
Repudiation | Weak controls to prove illegal data changes by authorized users | Healthcare system | Medical records (1) | Blockchain-based versioning scheme to track each performed operation | Provenance & Immutability |
Lack of immutable logs | Action logs | Medical records (1) | Immutable log of all performed activities | ||
Insurance fraud | No proper authenticity to verify the insurance claim | Medical bills, Insurance data | Insurance claim (1) | Decentralized verification of insurers | Permissioning |
Verified records are distributed among nodes | Distributed | ||||
Clinical trial fraud | Inadequate clinical trials data | Clinical trial data, Data access right | Data processing (1, C) | Distributed nature and use of cryptography | Cryptography |
Improper patient recruitment and lack of data access | Blockchain provides data ownership | Permissioning | |||
Data saved on blockchain cannot be altered | Immutability | ||||
Tampering device settings | Weak controls on settings of medical devices | loT devices | Device settings (1, A) | Storing devices settings in distributed immutable ledger | Immutability |
Social engineering | Possible to manipulate employess to get data access | Employees, Stakeholders | Medical records (1) | Only relevant employees have access to particular information or part of information | Permissioning |
3.3 Medical Record Mishandling
3.4 Counterfeit Drugs (Fake Medicine)
3.5 Man in the Middle (MitM) Attack
3.6 Single Point Failure
3.7 Repudiation
3.8 Insurance Fraud
3.9 Clinical Trial Fraud
3.10 Tampering Device Settings
3.11 Social Engineering
4 Security Threats Appeared
4.1 Sybil Attack
Table 4
Risk-related concept | Asset-related concept | Risk treatment concept | |||
Threat | Vulnerability | System asset | Business asset | Countermeasure | Strategy |
Sybil attack | Possible to create fake identities in the network | Nodes (miners). Nodes identity, P2P Network, Transactions | New nodes (A), Information flow (A), Ledger (I, A), Block generation (A) | Network joining fee | Detection |
Monitor nodes behaviour | Monitoring | ||||
Stake requirements in PoS consensus | Inform | ||||
Lack of computing power | Nodes, P2P Network, Computing power | Network reputation (I), Healthcare operations (A) | Increase computing power | Detection | |
Monitor computing power | Monitoring | ||||
No proper authentication of nodes | Nodes, P2P Network, Network reputation, Transactions | Transaction validation (I) | Network joining fee | Detection | |
Validating node connection | Detection | ||||
Monitor nodes behaviour | Monitoring | ||||
Double-spending | 51% vulnerability | Computing power, Nodes (miners), P2P network | Transaction (I), Ledger (I), Network resources (A) | Insert observers | Conceptual |
Use power monitoring tool | Monitoring | ||||
Transaction fee | Inform | ||||
Pluggable consensus | Conceptual | ||||
Accepting unconfirmed transactions | Transactions, Block confirmations | Fast transaction (I, A), Digital assets (I), Ledger (I) | Increase confirmed blocks | Detection | |
Closed-form formula probability | Conceptual | ||||
Enhance network policy | Inform | ||||
Listening period | Conceptual | ||||
Insert observers | Monitoring | ||||
Alerting honest nodes | Broadcasting | ||||
Eclipse attack | Poisoning nodes’ routing table | Nodes, IP addresses, Node connection. Transactions, Routing table | Communicating/ gossiping (A), Transaction validation (I), Transaction (I), Medical data (C, I) | Disable direct incoming connections | Inform |
White-listed nodes | Forwarding | ||||
Random outgoing connections | Conceptual | ||||
Deterministic random eviction | Detection | ||||
Incorporate feeler and anchor connections | Inform | ||||
Smart contracts attacks | Faulty and error-prone smart contracts | Smart contracts, Transaction validation, Ledger | Digital assets (I), Transaction (I), Medical data (C, I, A) | Smart contracts code analysers (e.g. SmartCheck) | Detection |
Penetration testing tool | Detection | ||||
Block withholding delay | Possible to delay the submission of valid blocks | Transaction validation, Blocks, Mining incentives | Medical operations (A) Information processing (A), Block confirmations (A) | Enforce immediate block submission scheme | Conceptual |
Increase risk of earning less incentives | Inform | ||||
Sybil-based DoS | Sybil nodes can participate in the consensus mechanism | Nodes, P2P network, Mining protocol | Medical operations (A) Mining process (A) | Use computational constraint-based techniques | Conceptual |
Dusting transactions | Transactions, P2P network, Ledger | Medical operations (A) Network resources (A) | Anti-dust model | Detection | |
Deanonymization attack | Network analysis and listening | Transactions. Medical data | Medical dala (C) | Use mixing techniques | Broadcasting |
Use anonymity uveilay nelwoiks (e.g. Toi) | Conceptual | ||||
Ring signatures and zero-knowledge Proofs | Detection | ||||
Quantum computing threats | Not using quantum-resistant cryptography schemes | Cryptography, Ledger | Transactions (I), Ledger (I), Medical data (C, I) | Quantum computing resistant cryptography | Conceptual |
Endpoint security threats | Lack of awareness and knowledge | Wallets, Keys, Computers/devices, User | Healthcare services (A), Digital assets (I), Medical data (C, I, A) | Multi-level authentication (MLA) method | Detection |
Security awareness | Inform | ||||
Hardware security module (HSM) | Detection |
4.2 Double-spending
4.3 Eclipse Attack
4.4 Smart Contracts Attacks
4.5 Block Withholding Delay
4.6 Sybil-Based DoS
4.7 Deanonymization Attack
4.8 Quantum Computing Threats
4.9 Endpoint Vulnerability
4.10 Other Security Threats
Table 5
Threat | Detail |
BGP hijacking | The attacker can intercept the blockchain network by manipulating the border gateway protocol (BGP), after which data can be routed, and the traffic can be modified in the attacker’s favour (Singh et al., 2021). |
Liveness attack | This attack can delay the transaction confirmation time and proceeds in three stages: preparation (build private chain), transaction denial (delay the genuine block), and blockchain delay (decrease the rate at which the chain transaction grows) (Singh et al., 2021). |
Timejacking | Timejacking exploits the handling of blockchains’ timestamps. The attacker can forge or broadcast a false timestamp of a transaction when connecting to a network node allowing him to change the node’s network time and trick it into accepting an alternative blockchain. This attack can cause a double-spending (Guru et al., 2021). |
Blockchain poisoning | The attacker adds stolen data (e.g. addresses, credit card numbers), illegal files (e.g. malware), and malicious content and force blockchain nodes to download such content (Banchhor et al., 2021). Blockchain poisoning can lead to DoS or DDoS attacks or disrupt the operations of a blockchain network. |
Transaction malleability | The attacker alters the transaction signature responsible for generating unique identifiers of the transaction. The attacker changes the transaction identifier before the transaction confirmation on the network to pretend the transaction did not happen. This technique causes the victim to pay twice (Banchhor et al., 2021; Guru et al., 2021). |
Selfish mining | This attack happens on mining pools to earn extra mining rewards. The attacker holds a mined block in his private chain. Once his chain is longer, he broadcasts the blocks in the network at once and makes other miners lose their blocks. The purpose of selfish mining is to waste the efforts and rewards of honest miners (Banchhor et al., 2021; Liu et al., 2019). |
Balance attack | Balance attack combines mining power with communication delay to affect fork-able blockchains (e.g. Ethereum). The attacker isolates a blockchain branch from one subgroup and convinces another competing subgroup to influence the branch selection process. This successful attack can lead to a double-spending (Singh et al., 2021). |
Race attacks | In race attacks, the attacker sends two or more conflicting transactions in the network and exploits the fast transaction mechanism where the merchant (a victim) accepts a transaction with 0 confirmations (Rahmadika and Rhee, 2018). |