Blockchain Security: A Framework For Trust and Adoption
Blockchain Security: A Framework For Trust and Adoption
Security
A Framework for Trust and Adoption
www.dutchblockchaincoalition.org
2 Dutch Blockchain Coalition
Authors:
Nicolas Castellon, CGI Nederland
Peter Cozijnsen, CGI Nederland
Tjerk van Goor, CGI Nederland
The authors would like to thank the following people for their input in
the different stages of defining this framework:
Pawel Szalachowski, Singapore University of Technology
Virgil Griffith, Ethereum Foundation
Sofie Berns, Berenschot
Tommy Koens, ING
Tey El-Rjula, Tykn
Idius Felix, Zorginstituut Nederland
3
Executive Summary
With the current rise in popularity of blockchain, more organizations are beginning to consider this technology to
innovate their IT environments. With every new technology, security risks are amplified or diminished depending on its
characteristics. This whitepaper provides a framework on the major security considerations to consider when adopting
blockchain technologies. The framework was written to be used by decision makers in organizations that are planning to
adopt blockchain technology. The framework is meant to be a high-level practical guide of the top security concerns an
organization should consider when starting their own blockchain application or migrating a current application to this new
environment.
The following are the top 18 security risks to consider when adopting the technology:
1. Security of Smart Contracts
2. Forks
3. Crypto Algorithms
4. Cryptographic key management
5. Access Control
6. Scalability
7. Intrusion Detection
8. Targeted attach resistance
9. Data Propagation attach resistance
10. Operations & Communications security
11. System Acquisition, Development, and Maintenance
12. Asset management
13. Human resource security
14. Supplier relationships
15. Incident management
16. Organization of Information Security
17. Information Security Policies
18. External/Internal Compliance
The following are the top 6 security risks to consider when migrating a current application to this new environment:
1. Choosing the right blockchain
2. Special considerations for testing
3. Awareness and training
4. Contingency planning
5. Simplicity as a security measure
6. Privacy
These considerations will offer organizations a strong base upon which to adopt blockchain technology and do so in
a secure manner. With these 24 security recommendations, organizations can begin trusting this technology and find
innovative ways to use it in their IT environments.
No? Consider: E-mail/Spreadsheets No? Consider: Database Yes? Consider: Database No? Consider: Database
No? Consider: Managed Database No? Consider: Managed Database No? Consider: Database
Considerations
Smart contracts
Risks lie in life cycle of contract. Since
code cannot be changed, through
testing of the functionality is required.
Scalability Security
Cryptography
In public blockchains, the
algorithm is pre-determined by
the creators of the blockchain and Remember to consider how
will rely on the community using decentralization and scalability affect
the chain. the security of the application.
Privacy
It is highly advised to not have any personal user
data on the blockchain itself
Public VS Private
Commonly used are “Proof of Stake” and Consensus algorithm Agreed-upon with pre- defined rules. “Proof
“Proof of Work” of Authority” mostly used in Netherlands
Scalability
High number of nodes
Low
5
6 Dutch Blockchain Coalition
Contents
1. Introduction 8
2. Understanding the Technology 10
3. Do You Really Need a Blockchain? 16
4. Blockchain Security Framework 18
5. Risks when Migrating 28
6. Considerations for Privacy 32
7. Use-Cases 36
8. Endnotes 42
Abbreviations
7
1. Introduction
Identifying risks for new technologies entails It is important to note that blockchain technology
examining the technology and assessing how is in its infancy, and we are only beginning to
it can amplify or reduce certain risks. As more understand how its different characteristics can
organizations begin to consider blockchain be used to innovate and improve our IT systems.
technology as a possible solution to innovate This also means that we are only beginning to see
their IT infrastructure and applications, it is the security implications that come with this new
important to consider the security risks of this technology. We invite the reader to see blockchain
new environment. For blockchain, this will as another information technology, and we aim to
concern risks brought by its key characteristics. highlight the characteristics of this new technology
These characteristics are its distributed nature, that amplify or reduce certain security risks. No
its cryptographic seal, its immutability, and technology is 100% secure and this certainly also
its transparency to name a few. These new applies to blockchain. Understanding the security
characteristics are at the core to understand what risks is a first step in instating trust in blockchain
the security risks are for this new technology. and therefore stimulating its further adoption.
9
2. Understanding
the Technology
11
of the most prominent consensus mechanisms
are known as Proof of Work (PoW) and Proof of
Stake (PoS). There are many other widely used
consensus mechanisms at the moment, including
Proof of Identity, Proof of Capacity, Proof of
Burn, and Proof of Authority (PoA). Consensus
mechanisms ensure that all transactions within
a block are agreed upon before adding a new
block. As part of this wider verification, blockchain
technology makes use of miners that create new
blocks and to verify these transactions, very much
Security: This attribute concerns the risks that in the same way we may hire an accountant to
particular blockchain technology is susceptible review financial information. Miners are selected in
to. In a general sense, the security concerns accordance with the chosen consensus mechanism,
the Confidentiality, Integrity, and Availability of and the miners who successfully respond will verify
the technology. For blockchain, confidentiality transactions and also create new blocks on the
means the authentication of the user or node on blockchain. Various consensus mechanisms will do
the chain; integrity means the data on the chain is this in different ways.
immutable and authentic, and availability means the
reliable use of the data stored and handled by the Proof of Work does this by letting miners solve
blockchain. encrypted puzzles. The first miner to solve the
encrypted puzzle will verify the transaction, create
The blockchain trilemma suggests that increasing a new block, and announces the solution to the
any two of these attributes will have a decrease entire network. In return for this work, the miner
on the third. Choosing to have a highly scalable gets a reward in the form of an amount of the
blockchain may mean the widening of the attack crypto-currency being transacted. Without the
surface, while decentralization means losing the reward system, miners would not be willing to
control and authority over data. Though these are solve the puzzles, so it is important to be aware of
presented as security risks, these characteristics the importance of the reward system. Hardware
may make a chain more secure, such as scalability to mine transactions is expensive and requires a
providing more resilience for the application and significant amount of electricity to power. This leads
decentralization spreads the risk of a single point to miners operating in consortiums known as Mining
of failure. Taking this dilemma into account, we Pools. These offer miners the opportunities to pool
encourage the user of blockchain technology to resources to mine a block, spread the risks, and
use the security of the blockchain as a parameter split the rewards.
to measure the attributes and characteristics of this
technology, especially when using data linked to Proof of Stake differs significantly from a proof of
personally identifiable information. work system. Instead of building blocks through
work output, the share or stake in a cryptocurrency
2.3 Consensus Mechanisms determines the creator of a block. In other words,
the bigger the share that a miner owns, the more
Blockchain technologies make use of consensus mining capabilities a miner will have. This allows a
mechanisms to achieve an agreement on a single miner to only mine a percentage of the transactions
data value without a centralized authority. Two that are similar to its own share.
Commonly used are Proof of Stake and Proof of Agreed upon with pre-defined rules. Proof of
Consensus algorithm
Work Authority mostly used in the Netherlands
Scalability of the network
Low High
(Txs/second)
Mostly Permissioned. A defined group of partic-
Participation in network Mostly Permissionless. Users are free to join
ipants
Blockchain technology can be explained in terms of Hybrid Blockchain: A hybrid blockchain, also
access to a transaction, defining public, private, and known as a consortium blockchain, uses attributes
hybrid blockchains, and can be defined by access of both private and public chains. It refers to a
to transaction processing creating the distinction closed environment in which various parties work
between permission and permissionless blockchain together in sharing data and transactions. Members
network. can also determine which transactions can remain
public and which have to be restricted to a smaller
Permissionless Blockchain: In permissionless group of members.
networks, any user is able to join and begin interac-
ting with the network, such as submitting transacti-
Table 1 provides a quick overview of the differences
ons, adding entries to the ledger, running nodes on
between public and private blockchain types and
the system, and verifying transactions.
their characteristics.
Permissioned Blockchain: In a permissioned
blockchain, the network owner decides who can join
the network and only a few members are allowed to 2.5 Blockchain in your corporate
verify blocks. network
Public Blockchain: A public blockchain has When considering blockchain for your IT processes
entirely an open read access and anyone can join and application, it is important to have an
and write in the network. Public blockchains often understanding of how the blockchain network will
work with Proof of Work consensus mechanisms to relate to IT systems already in place. Diagram 1
incentivize participation. exemplifies how multiple participants interact in
a blockchain network and connect to a central
Private Blockchain: A private blockchain often application.
is the opposite of a public blockchain and only
authorized participants have read access and can In case of a public blockchain, there will be several
write and join the network. Often this requires an participants, shown in diagram 1 as participants A
13
and B in the network that connects their system with be halted. When there is an off-chain database
a blockchain infrastructure through an Application used, there must also be a process in place to
Blockchain Interface (ABCI). In the case of the synchronize the blockchain with the off-chain
Bitcoin network, a user installs the Bitcoin wallet database on a regular basis.
software on their device, creating a transaction node Blockchain technology is praised for the fact
and mining node that will allow the user to transact that there is no need for a lead organization.
Bitcoins. Nevertheless, in practice, hybrid or private
blockchains often do have a lead organization. If
In case of a private blockchain or a hybrid an organization uses a private blockchain for the
blockchain, there can be a separate authority that distribution of information across its suppliers, it can
can host a central application for an optional off- optionally host a central application on which all
chain database. There is often an organization that other users will connect to its server and then on to
initiates the blockchain, and can therefore be seen the central application. In this setup, an organization
as the lead organization. This organization will also would then be able to store the data off-chain for
most likely be the host of the optional off-chain the case as described above concerning the backup
database. This optional off-chain database can be system. This authority may also host an optional
used as a backup system to verify data in relation mining node and a transaction node to contribute to
to data that is stored on the blockchain when the the blockchain infrastructure itself.
gateway to the blockchain is not available for a
moment in time and the business process cannot
Really Need a
In order to determine if blockchain technology is
ideal for the IT system or process in question, we
Blockchain?
suggest using the diagram bellow developed by
IEEE.2
Blockchain can be simply described to be the This diagram will walk the user through the
orchestration of three technologies- the internet, different considerations to take into account
private key cryptography and a protocol governing when wanting to adopt blockchain technology
incentives. This all results in a secure system for
1
more generally. These considerations include the
digital interaction without the need for a trusted satisfaction with using traditional databases, the
third party to facilitate digital relationships. In this number of participants that will contribute data, the
way, blockchain technology should be seen as level of trust among participants, and the level of
a consortium of current technologies applied in privacy and control needed over the data.
Diagram 2: IEEE
Blockchain Decision
Tree, 2017
17
4. Blockchain
Security
Framework
Security
requested. For a high-level overview of these
security controls, it is recommended to use
Framework
ISO/IEC 27001:2013 or NIST version 1.1 as a
baseline. This framework presents 14 security
considerations for secure blockchain applications,
Like all other technologies, blockchain faces a of which are divided into four categories:
number of security risks that are amplified and
minimized accordingly to its unique characteristics. Blockchain specific:
An example of this can be seen in blockchain’s This category will describe security issues that
consensus mechanism, where it both amplifies are most amplified by blockchain technology. The
and reduces different security risks. In terms of issues presented in this category are not unique
amplifying threats, consensus mechanisms may to blockchain technology but are amplified by the
make certain types of blockchains vulnerable to technologies characteristics. These will include
a 51% attack where an attacker can overpower smart contracts, forks, cryptographic algorithms,
the network and effectively monopolize and and cryptographic key management.
control the application. By controlling the
network, attackers would be able to prevent new Network and Infrastructure:
transactions from gaining confirmations, allowing This category will describe how blockchain
them to halt payments between some or all users. should be considered for operations and the
They would also be able to reverse transactions general IT infrastructure of an organization.
that were completed while they were in control of These considerations will consist of access
the network, meaning they could double-spend control, scalability, intrusion detection, targeted
cryptocurrencies. In terms of minimizing security attack resistance, and data propagation attack
risks, this attribute ensured that altering data on resistance.
a chain is significantly more difficult as the data
has been encrypted and cross-checked by other Operational and Organizational:
peers in the network. There are several more This category will highlight security issues
examples of this sort, where blockchains specific that affect an organization at an operational
characteristics can reduce and at the same time and organizational level. These security
increase security risks. For this reason, it is considerations are not unique to blockchain,
recommended to assess this technology with a but must not be forgotten when implementing
minimum set of security controls. or adopting this technology. These include
operations and communications security, system
This minimum set of controls take care of acquisition, development and maintenance, asset
common security risks ranging from operational management, human resource security, and
such as access control and secure system supplier relationships.
development, to strategic such as security policies
for your organization. If an organization is not Management-level:
developing or maintaining information systems, This category will highlight considerations for an
it is recommended to have a basic level of organization’s management level. They are also
understanding of what are common security good not unique to this technology but are crucial for
practices. This understanding allows organizations establishing a culture of secure development,
19
Public Private
Blockchain Specific
1 Security of Smart Contracts + +
2 Forks - +
3 Crypto Algorithms - +
6 Scalability - +
7 Intrusion Detection - +
12 Asset Management + +
14 Supplier Relationships - +
15 Incident Management - +
Management Level
16 Organization of InfoSec - +
18 External/Internal Compliance + +
Blocks from
nonupgraded Follows Follows Follows Follows
nodes old rules old rules old rules old rules
Blocks from
Follows Follows Follows Follows
upgraded
new rules new rules new rules new rules
nodes
A Hard Fork: Non-upgraded nodes reject the new rules, diverging the chain
21
Blocks from
nonupgraded Follows Follows Follows old rules but Follows
nodes old rules old rules violates new rules old rules
Blocks from
Follows old Follows old
upgraded
& new rules & new rules
nodes
A Soft Fork: Blocks violating new rules are made stale by the upgraded mining majority
not compatible with the older network. In other newer blockchain gaining recognition as the ‘true’
words, a hard fork can be thought of as a software blockchain.
upgrade that is not compatible with previous
versions of the software. All network participants When two or more miners find blocks at nearly the
are required to upgrade to the latest version of same time, the blockchain temporarily diverges
the software in order to continue verifying and into two chains, which can also be seen as a soft
validating new blocks of transactions. Under a fork. This ambiguity is resolved when subsequent
hard fork, blocks that are confirmed by nodes blocks are added to one, making it the longest
that are not yet upgraded to the latest version chain, while the other block gets “orphaned”, or
of the protocol software will be invalid. Nodes abandoned, by the network.
running the previous version of the software will
have to follow the new set of consensus rules An example of a soft fork would be the
in order for their blocks to be valid on the forked implementation of a new consensus rule changing
network. In the event of a hard fork, if there is still the network block size from 1MB to 500KB.
mining support for the minority chain, then two Nodes that have not upgraded will continue to see
blockchains can continue to exist simultaneously. incoming transactions as valid, as these nodes
follow the old set of consensus rules as well as
Soft Forks: A soft fork is a backward compatible the new (500KB is less than 1MB). Mining nodes
method of upgrading a blockchain. In other words, that have not upgraded to the new consensus rule
a soft fork is software upgrade that is backward and attempt to mine new blocks will have these
compatible with previous versions of the software. blocks rejected, as it does not conform to the new
Soft forks do not require nodes on the network set of consensus rules (block sizes of 500KB).
to upgrade to maintain consensus, because all Thus, the blockchain with 1MB sized blocks is
blocks on the soft-forked blockchain follow the likely to fall into disuse as miners enforce the new
old set of consensus rules as well as the new consensus rule of 500KB.
ones. Blocks produced by nodes conforming to
the old set of consensus rules may violate the Forks can lead to the following risks:
new set of consensus rules, and as a result, will When a soft fork is supported by only a minority
likely be made stale by the upgrading mining of the nodes in the network, it could become
majority. For a soft fork to work, a majority of the shortest chain and consequently become
miners need to recognize and enforce the new orphaned by the network.
set of consensus rules. If this majority is reached,
then the older network will fall into disuse, with the In the case of a hard fork, the chain can be split
23
compromised or lost. It is important to note that applications and information of the organization.
blockchain technology is not similar to Public Key Special thought is needed for the joiners and
Infrastructure Architecture (PKI) where a private leavers of the organization. Withdrawing access
key can be easily replaced. In PKI architectures, an rights of people leaving the organization is
old key can be placed on a Certificate Revocation essential.
List. In blockchain architecture, this process of
revoking keys is not possible. When a private key The implementation of access control allows
used for accessing cryptocurrencies is lost, the an organization to mitigate unauthorized use of
cryptocurrency may often also be considered lost. applications or information.
The level of influence an organization can have The level of influence an organization can have in
in mitigating the crypto key management security mitigating access control security considerations
considerations for public and private blockchains are: for public and private blockchains are:
4.2
Infrastructure and Network 6) Scalability
The nodes in the blockchain network need to
5) Access control be scalable. If an application of the blockchain
Using private blockchain allows for the regulation network generates more transaction then was
of different types of permissions, such as how foreseen, the nodes in the network must have
to add a node to the blockchain network, and the availability to easily scale up their computing
what kind of transactions can neb performed on power. This should be done to prevent the
the network and by which users. In regards to blockchain network to become very slow, or even
access controls, the following aspects should be come to a halt. When using a private blockchain,
considered: this can be achieved by making contractual
agreements with the participants of the private
The assigning of authentication and authorities to blockchain and a constantly monitor the nodes
employees that need access to a node or nodes in the network. When using a public blockchain,
on the blockchain network. one must rely on trusting the wider community.
The level of influence an organization can have in
Implementation of separation of duties. An mitigating scalability security considerations for
organization should have several levels of public and private blockchains are:
authorization, based on the different roles that
Public Private
need to be in place. It is not advised for every
employee to have all possible authorizations. Scalability - +
25
a contractor. The level of influence an organization may provide an advantage to a party in the contract
can have in mitigating system acquisition, dev and (see section 4.13 for smart contracts). The level
maintenance security considerations for public and of influence an organization can have in mitigating
private blockchains are: human resource security considerations for public
and private blockchains are:
Public Private
System Acquisition, Public Private
+ +
Dev and Maintenancet
Human Resource security - +
27
5. Risks when
Migrating
Migrating
no possibility to test the code further to weave
out bugs. In the case of private chains, it is
conceivable that a central authority tests the chain
Migrating an application or process to a and periodically moves over to a newer version,
blockchain architecture will require an additional consolidating all previous transaction in the new
list of topics to be considered. Though this new chain.
technology has attributes that make it different
than other architectures, it should be assessed Application testing should be considered one of
like any other technology. The following is a the most important considerations when migrating
list of comprehensive operational security risk a process to a blockchain architecture. It is a good
considerations. It is important to note that the organizational practice for organizations to have
considerations have been formulated under the testing procedures and methodologies in place.
assumption that organizations will be adopting In order to enhance the security of the testing, it
a blockchain technology and not developing a is highly recommended for organizations to use
proprietary chain. frameworks such as the Open Web Application
Security Project (OWASP) to make sure all
5.1
Choosing the right blockchain industry standards are considered and covered.
Organizations have less control over the entire
As previously described in chapter 2 of this infrastructure when they use public blockchain,
framework, there are different sorts of blockchain and testing might become difficult. In that case, it’s
and different consensus mechanisms to consider. recommended to implement extra monitoring and
When an organization is engaging with blockchain control on business processes. This can be done
for the first time, it is highly recommended to start to ensure that abnormal behaviors are detected in
with a private blockchain. In private blockchains,
4
time.
the organization has full control of the architecture,
nodes, and access to the blockchain. This type of For one of the uses cases in chapter 7, load-
blockchain is recommended so that in the case testing was executed to test the boundaries of the
of a security breach, the organization can still architecture. For two other uses cases, external
have an overview of everything under control, and expertise was brought in to review and audit.
quickly identify the origin of the breach. Asides
from the Grain Initial Coin Offering, all other uses 5.3
Awareness and Training
cases described in chapter 7 are implemented on
a permissioned blockchain. Security training is critical for any user. While
there are some security capabilities inherent in
5.2
Special considerations for testing blockchain technologies, it is important to have
a training plan to ensure users understand what
Testing is an essential part of ensuring the they are permitted to do with the solution. A
reliability and security of an application. In non- training plan likely exists for most environments;
blockchain technology environments, it is a while users may not know that they are using a
normal practice to carry out further testing while solution that runs on the blockchain, the security
the application is in production environment. This training plan may need to be updated to include
means bugs can be fixed and a new version can unique aspects of the blockchain implementation.
29
Organizations should consider whether there is
any training in place to educate system owners Organizations considering to use blockchain
and users on blockchain technology and the to process attributes of personally identifiable
security risks that come with it. information must ensure to have a mature level
of information security. It is highly recommended
5.4
Contingency planning for organizations to not keep any personally
identifiable information on a blockchain, whether
Organizations should develop a contingency plan it be public or private. For private blockchains,
for information systems that meet the following storing the personal information off-chain and
criteria: using the blockchain to reference the data is
conceivable under certain circumstances. There
Systems that identify essential missions and are three main privacy considerations to take into
business functions and associated contingency account when moving a process to a blockchain
requirements. environment:
Provide recovery objectives, restoration Inform the users of how their data will be
priorities, and metrics. processed and by what organization if a new
supplier has been sought.
Address contingency roles, responsibilities,
assigned individuals with contact information. Inform users of how their rights will be
considered in regards to the right to erasure,
Address maintaining essential missions and right to be forgotten, and right to correct their
business functions despite an information data.
system disruption, compromise, or failure.
Use the most modern and applicable
Address eventual, full information system cryptographic technology to secure the user’s
restoration without deterioration of the security data attributes.
safeguards originally planned and implemented.
For all uses cases described in chapter 7, privacy
5.5
Simplicity as a security measure was an important security consideration. These
were implemented in the form of hashes for
When smart contracts are used, create guidelines documents or encrypted external file storage
that will help the developers keep the smart connected to the blockchain application. The
contracts as simple as possible. This will prevent next chapter will elaborate further on privacy
security breaches that may result from too implications related to the General Data Protection
much complexity in the code of smart contracts. Regulation.
Organizations should be sure to have a review
process in place, starting with peer-reviews.
for Privacy
presumes that there is no hierarchical relationship
between the participants. Each participant is
therefore equal and able to contribute and make
It is a current trend for privacy concerns in Europe use of the date as seen fit.8 If there are other
to be automatically linked to the General Data agreements in place, this could prove to be the
Protection Regulation (GDPR), which became exception.
directly applicable in all member states on 25
May 2018. Given its importance, we will focus For blockchain applications, a controller can
on illustrating the applicability of the GDPR, be defined as the participants of a blockchain
understanding the roles of Data Processor and who have the right to write on the chain and who
Data Controllers in this context, and the risks to decide to send data for validation by the miners.9
personal data.5 This chapter will take a closer More specifically, a controller can be more closely
look at the roles of the data processor and data defined as a participant that is seen as a natural
controller, the preferred type of blockchain in person that processes personal data related to
terms of privacy, the rights of the data subjects in a professional or commercial activity or when
the context of a blockchain application, and will a participant is a legal person that registers
discuss hashes in the context of the GDPR. personal data in a blockchain.10 In other words,
the participants that define the purpose and
The GDPR poses serious challenges for means of processing are the controllers, thus
organizations that have to comply in order excluding miners from being a controller. The
to avoid fines. Blockchain technology is not controller has different obligations under the
exempted from this obligation if personal or GDPR, such as reporting a data leak. If a group
pseudonymous data is involved in the process. of participants decides to carry out processing
One has to be aware of the fact that the GDPR operations with a common purpose, this would
still causes uncertainty about the interpretation lead to practical issues with regard to governing
of certain articles in it. Organizations face the these responsibilities. This should be addressed
same challenges with blockchain applications. in various ways. One way to do this is by
When considering blockchain technologies, it is identifying one participant as the decision maker
important to consider the relationship between by reaching an agreement on how to govern as
controller and processor and the user’s rights. joint controllers. Another way to achieve this is
by creating a legal persona such as an economic
6.1 Controller vs. Processor interest group or association.11 This issue can
likely be solved within a blockchain that is
The first main concern lies in defining the roles governed by one or a few parties.
of controller and processor for the blockchain
application. In the GDPR the controller is defined If parties that do not necessarily exchange
as the natural or legal person, public authority, personal data, but are contributing as nodes to
agency or other body which, alone or jointly with the blockchain network, it can be assumed that
others, determines the purposes and means of the these parties can be considered processors.12 In
processing of personal data.6 The processor can other words, one could say that all the nodes that
be defined as the natural or legal person, public are not specifically defined as being controllers
authority, agency or other body which processes could be considered processors since they all
33
contribute as a node to the processing, creation, at the core of the GDPR and present the biggest
and maintenance of the data on the chain. concerns as there are no exemptions to their
Consequently, all the controllers have to enter into compliance.
a processing contract with the processors. In a
small private blockchain this is quite manageable, Right to Erasure
yet in a larger private or public blockchains, this is The right to erasure is the first data subject right
a more complicated matter. Organizations should that becomes complicated when approaching
be aware that there is no legal precedence on blockchain applications. It is an inherent feature
this matter, thus European case law could lead to of blockchain applications to ensure that data
different interpretations. For this same reason, it is cannot or should not be deleted. In a way, this
currently unclear what the definition of processors undermines the actual purpose of a blockchain
could mean for public blockchains and what solution, making it impossible to adhere to the
legal obligations controllers have with regard to right of erasure. In a private blockchain, it is
processors. possible to make arrangements with participating
organizations to make erasure technically
From a privacy perspective, permissioned and feasible, yet again undermining the characteristics
private blockchain applications are the safe choice of blockchain. For the right to erasure, an
for organizations wanting to adopt this technology. organization should try to delete as much as
These two types of blockchain make it easier to possible and take proper steps to mitigate risks
identify controllers and processors. In return, this for the data subject as much as possible, within
makes the governance of legal obligations for the boundaries of blockchain. Consequently, for
controllers and processors more manageable, blockchain solutions that are programmed to
as well as taking care of the contractual not enable removal, this means that they should
obligations between controllers and processors. pursue this. This can be done by encrypting the
It is very difficult to identify all the controllers personal data, deleting the original data, and
and processors in a public blockchain, making it throw away the key. A log file that the data is
questionable if it is legally possible to adhere to actually encrypted can be added to provide proof.
the GDPR when using a public blockchain. Assuming that an advanced form of encryption
is being used and thus deemed most adequately
6.2 Data Subject Rights secure, this could be a reasonable solution for the
right to erasure.14 Nonetheless, taking the inherent
An important component of the GDPR concerns features of blockchain into account, it is not
the data subject rights. A data subject has six recommended to store personal data in plain-text
different rights under the GDPR: the right of on a blockchain.
access and rectification, the right of erasure,
the right to restrict processing, the right of data Right to Rectification
portability, the right to object, and the right to not The right to rectification also poses a problem
be subject to automated processing. 13
with regard to blockchain applications. Similar to
the right to erasure, this undermines the whole
We will be focusing on three of these rights idea of blockchain. This leads to the question of
and how they present challenges to the use of how you can do this if you want to completely
blockchain technology. These three rights are the rectify the information without keeping the original
right to erasure, the right to rectification, and the faulty information. In other words, blockchain
right to limit processing. Data subject rights are applications usually will allow rectification, yet the
35
7. Use-cases
37
Patients Only use hashes and pointers in transactions
Doctors (section 4.3 of the framework).
Laboratories
Pharmacies Authentication/Authorization (2FA) handled
Personal healthcare environments by Microsoft Azure B2C (section 4.2 of the
framework).
In the process, a patient visits the doctor, who
advises on a performed feces analysis. This All data that is passed to the backend systems
analysis is then sent to a laboratory after being are to be sanitized in order to prevent NoSQL/
paid by the patient. When the analyses report is SQL injections (section 4.2 of the framework).
ready the patient and doctor receive a notification
with the results. The doctor and patient meet again As an addition to the security audit on the system
and the doctor creates a personalized prescription, from an external company, the development team
that is sent to the pharmacist once it has been hired internally an experienced cyber security
paid. The pharmacy creates the prescription and specialist to their development team in order to
sends the patient a notification with a tracking review system components.
code. This complete flow is managed by a
blockchain application, as the agreements are 7.3 Loek! Real estate management
handled by smart contracts.
Market: Real estate
The system is a permissioned Ethereum The Loek blockchain system was implemented
blockchain, using PoA. The nodes are run by the to connect data from multiple sources and grant
following stakeholders: the authenticity of building dossier documents.
The focus of the Loek application is to focus
Doctors on the management of buildings. The different
Pharmacists application users store all information regarding
Laboratories a building from a single online location, which is
Microbiome center Nederland a designated digital building file. As a result, the
LedgerLeopard user has all the relevant information at hand at
all times. Loek is connected to a blockchain in
Security Implications order to generate hashes and reference points to
Having had the experience of developing the “Mijn the digital building dossier. The system creates a
Zorg Log” application, the developers had an “fingerprint” to prove the structure of a document
idea of what security considerations to take into on a specific moment and a hashed pointer to the
account. The new challenge in this project was location, for role-based access.
the security of the following external connections
linked to section 4.2 of this framework: The system is a permissioned Ethereum
blockchain using PoA, where the nodes are run by:
Laboratory API
Payment systems Loek
Pharmacy API Connected buildings
39
with the patient. This simply means that if a Secure external connections with hospital
patient in hospital X has data, for example of an systems. (section 4.2 of the framework)
antibiotic allergy, this fact is not readily available if
the patient unexpectedly reaches the emergency Hashes and pointers for users and system
department of hospital Y. in addition to this, the connections. (section 4.2 of the framework)
patient would also need to provide consent in
advance to hospital X.
Security Implications
The major security risk identified for this
application concerns the possibility of a breach
that may cause a change in the consent for
medical data between the patient and the hospital.
For handling the consent of the users, the
developers took the following security precautions:
Authentication/Authorization to be handled by
the proven systems used by hospitals. (section
4.2 of the framework)
43
info@dutchblockchaincoalition.org
www.dutchblockchaincoalition.org