Abstract
This chapter provides a comprehensive overview of Data Authenticity in Web3 ecosystem using blockchain oracles, including their types, examples of data oracle providers, use cases, design considerations, and security attacks with their countermeasures. The chapter covers five types of blockchain oracles, including input, output, cross-chain, compute-enabled, and other types. Examples of data oracle providers are provided, along with their use cases, such as decentralized finance, dynamic NFTs and gaming, insurance, enterprise supply chain management, prediction markets, and sustainability. The chapter also discusses the design considerations that should be taken into account when building blockchain oracles. Additionally, it covers security attacks on oracles, including insider attacks, oracle bribery, oracle front-running, and oracle extortion. Finally, countermeasures to these security attacks are presented to mitigate the risks of oracle manipulation and ensure the integrity of blockchain networks. This book chapter is a valuable resource for anyone interested in understanding the importance of oracles in blockchain networks and how to design and secure them effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arbol. (2021, January 12). Businesses and farmers can now hedge weather risk through the Arbol platform and Chainlink data. Arbol. Retrieved March 14, 2023, from https://arbolmarket.medium.com/businesses-and-farmers-can-now-hedge-weather-risk-through-the-arbol-platform-and-chainlink-data-d6f36506146c
Balakrishnan, A. (2020, September 14). bZx recovers $8.1M lost in third exploit. Crypto Briefing. Retrieved March 16, 2023, from https://cryptobriefing.com/bzxs-third-exploit-2020-ends-with-8-million-lost/
BusinessWire. (2017, June 15). AIG, IBM, standard chartered deliver first multinational insurance policy powered by Blockchain. Business Wire. Retrieved March 14, 2023, from https://www.businesswire.com/news/home/20170615005586/en/AIG-IBM-Standard-Chartered-Deliver-First-Multinational-Insurance-Policy-Powered-by-Blockchain
Cuenca, O. (2022, January 21). Etherisc launches automated blockchain travel insurance. ITIJ. Retrieved March 14, 2023, from https://www.itij.com/latest/news/etherisc-launches-automated-blockchain-travel-insurance
Devitt, C. (2023, March 10). Crypto hackers stole $386,200,000 from DeFi protocols via ‘Oracle manipulation attacks’ in 2022: Chainalysis. The daily Hodl. Retrieved March 29, 2023, from https://dailyhodl.com/2023/03/10/crypto-hackers-stole-386200000-from-defi-protocols-via-oracle-manipulation-attacks-in-2022-chainalysis/
Lohrmann, D. (2020, September 25). Could Estonia be the model for secure online voting? Government technology. Retrieved March 29, 2023, from https://www.govtech.com/blogs/lohrmann-on-cybersecurity/could-estonia-be-the-model-for-secure-online-voting.html
Sharma, S. (2022, September 8). 5 examples of Blockchain in supply chain management. OyeLabs. Retrieved March 14, 2023, from https://oyelabs.com/examples-of-blockchain-in-supply-chain-management/
Shaw, J. (2020, January 27). Making smart contracts a reality with Blockchain technology. Oracle Blogs. Retrieved March 14, 2023, from https://blogs.oracle.com/blockchain/post/making-smart-contracts-a-reality-with-blockchain-technology
Todd, R. (2019, June 24). Synthetix suffers oracle attack, more than 37 million synthetic ether exposed. The Block. Retrieved March 29, 2023, from https://www.theblock.co/linked/28748/synthetix-suffers-oracle-attack-potentially-looting-37-million-synthetic-ether
Williams, A. D., & Kaplan, R. P. (2017, December 22). Diamonds on the Blockchain: Building a global digital ledger for valuable assets. DEEP Centre. Retrieved March 29, 2023, from https://deepcentre.com/wordpress/wp-content/uploads/2019/10/DEEP-Centre-Diamonds-on-the-Blockchain-December-2017.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Huang, K. (2023). Data Authenticity. In: Huang, K., Budorin, D., Tan, L.J., Ma, W., Zhang, Z.W. (eds) A Comprehensive Guide for Web3 Security. Future of Business and Finance. Springer, Cham. https://doi.org/10.1007/978-3-031-39288-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-39288-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-39287-0
Online ISBN: 978-3-031-39288-7
eBook Packages: Business and ManagementBusiness and Management (R0)