Utilizing Blockchain Technology to Secure Database from Unauthorized Modifications

  • Vĩnh Lộc Cù
Keywords: Blockchain, Hyperledger, Centralized Database Systems, Tamper Resistance Features

Abstract

Centralized database-based applications are frequently susceptible to internal threats. The data stored in a relational database can be changed by any user who has administrative access to the hosting server or database system. Moreover, this kind of user may alter the associated log files, which would make it very challenging to identify any illegal alteration. It would also be difficult to attribute the assault to privileged users as well. In this study, we propose a solution to build a service on the context of student score management based on Blockchain technology. A database system based on the Blockchain platform along with accompanying services is built to allow storage and query of student learning outcomes. The database security system operates in parallel with the current system while still ensuring transparency, security and integrity of data. We develop a verification module that uses Blockchain to verify the integrity of the corresponding tuples and identify any unwanted modifications. Oracle database, RESTful API, and Hyperledger Fabric have all been used in the implementation of our method. Our findings show that the overhead of integrity checking remains constant per tuple in the results of a query and increases linearly using real data and SQL queries of different types and complexity.
Published
2024-10-09