A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions

  • Leonardo Aniello
  • Roberto Baldoni
  • Federico Lombardi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 717)

Abstract

We are witnessing an ongoing global trend towards the automation of almost any transaction through the employment of some Internet-based mean. Furthermore, the large spread of cloud computing and the massive emergence of the software as a service (Saas) paradigm have unveiled many opportunities to combine distinct services, provided by different parties, to establish higher level and more advanced services, that can be offered to end users and enterprises. Business-to-business (B2B) integration and third-party authorization (i.e. using standards like OAuth) are examples of processes requiring more parties to interact with each other to deliver some desired functionality. These kinds of interactions mostly consist of transactions and are usually regulated by some agreement which defines the obligations that involved parties have to comply with. In case one of the parties claims a violation of some clause of such agreement, disputes can occur if the party accused of the infraction refuses to recognize its fault. Moreover, in case of auditing, for convenience reasons a party may deny to have taken part in a given transaction, or may forge historical records related to that transaction. Solutions based on a trusted third party (TTP) have drawbacks: high overhead due to the involvement of an additional party, possible fees to pay for each transaction, and the risks stemming from having to blindly trust another party. If it were possible to only base on transaction logs to sort disputes out, then it would be feasible to get rid of any TTP and related shortcomings. In this paper we propose SLAVE, a blockchain-based solution which does not require any TTP. Storing transactions in a public blockchain like Bitcoin’s or Ethereum’s provides strong guarantees on transactions’ integrity, hence they can be actually used as proofs when controversies arise. The solution we propose defines how to embed transaction logs in a public blockchain, so that each involved party can verify the identity of the others while keeping confident the content of transactions.

Keywords

Blockchain Log certification Trustworthiness Multi-party transactions 

Notes

Acknowledgements

This work has been supported by the European Commission’s H2020 Programme under the SUNFISH project, grant N. 644666.

References

  1. 1.
    J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, Sok: research perspectives and challenges for bitcoin and cryptocurrencies, in IEEE Symposium on Security and Privacy (2015)Google Scholar
  2. 2.
    ENISA. Security Framework for Governmental Clouds (2015)Google Scholar
  3. 3.
    A.M. Froomkin, The essential role of trusted third parties in electronic commerce. Or. L. Rev. 75, 49 (1996)Google Scholar
  4. 4.
    E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone, Blockchain-based database to ensure data integrity in cloud computing environments, in Proceedings of the 1st Italian Conference on Cybersecurity (2017)Google Scholar
  5. 5.
    J. Garay, A. Kiayias, N. Leonardos, The Bitcoin Backbone Protocol: analysis and applications (Springer, Berlin Heidelberg, 2015)MATHGoogle Scholar
  6. 6.
    S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  7. 7.
    J.W. Palmer, J.P. Bailey, S. Faraj, The role of intermediaries in the development of trust on the www: The use and prominence of trusted third parties and privacy statements. J. Comput.-Mediat. Commun. 5(3) (2000)Google Scholar
  8. 8.
    F.P. Schiavo, V. Sassone, L. Nicoletti, A. Margheri (eds.), FaaS: federation-as-a-service (2016). Available at https://arXiv.org/abs/1612.03937
  9. 9.
    M. Sookhak, A. Gani, H. Talebian, A. Akhunzada, S.U. Khan, R. Buyya, A.Y. Zomaya, Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47(4) (2015)Google Scholar
  10. 10.
    B. Suzic, B. Prünster, D. Ziegler, A. Marsalek, A. Reiter, Balancing utility and security: securing cloud federations of public entities, in C and TC, volume 10033 of LNCS, (Springer, 2016), pp. 943–961Google Scholar
  11. 11.
    G. Wood, Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Leonardo Aniello
    • 1
  • Roberto Baldoni
    • 1
  • Federico Lombardi
    • 1
  1. 1.Research Center of Cyber Intelligence and Information Security Department of Computer Control, and Management Engineering “Antonio Ruberti”“La Sapienza” University of RomeRomeItaly

Personalised recommendations