Vulnerabilities on Hyperledger Fabric

被引:45
作者
Andola, Nitish [1 ]
Raghav [1 ]
Gogoi, Manas [1 ]
Venkatesan, S. [1 ]
Verma, Shekhar [1 ]
机构
[1] Indian Inst Informat Technol Allahabad, Dept Informat Technol, Network Secur & Cryptog Lab, Allahabad 211012, Uttar Pradesh, India
关键词
Zero knowledge; Anonymity; Wormhole attack; Bilinear pairing; Hyperledger Fabric; SCHEME; EFFICIENT;
D O I
10.1016/j.pmcj.2019.101050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have precisely analysed Hyperledger Fabric and pointed out two security limitations with possible solutions. First, the identity of an endorser is known to all members within a channel, which opens a gateway for DoS attack on endorsers in order to either block transaction pertaining to a client, or to degrade network efficiency. Second, the technology is prone to wormhole attack i.e. within a channel, compromising a member leads to leakage of ledger information of all members, to everyone outside the channel. We have proposed a solution to remove the above mentioned weaknesses. We have proposed two different mechanisms to eliminate the first weakness. The first approach uses a random verifiable function to randomize endorsers, while the second approach uses pseudonyms to anonymize endorsers. To address the second weakness, we have anonymized sender and receiver identity inside a channel. We have used a group signature approach using bilinear pairing to hide the sender identity and a zero knowledge approach using bilinear pairing to anonymize the receiver. The approach is immune to a malleability attack. Proper security proofs have been provided for Signature Unforgeability and Unlinkability in Ciphertext (UN-C). We have provided experimental results to measure the impact of DoS attack on hyperledger network using Hyperledger Caliper. After applying DoS attack on two peers, the throughput is reduced from 125 tps to 100 tps at send rate 123 tps. The latency in increased from 1.396 s to 2.44 s at send rate 123 tps. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 21 条
[1]   An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[2]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[3]  
[Anonymous], MONERO PRIVACY BLOCK
[4]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[5]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839
[6]   Aspects of Pairing Inversion [J].
Galbraith, S. ;
Hess, F. ;
Vercauteren, F. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (12) :5719-5728
[7]  
Greenspan G., 2015, MultiChain private blockchain-White paper
[8]  
Han S, 2004, LECT NOTES COMPUT SC, V3262, P417
[9]   A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond ;
Vinel, Alexey .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :633-645
[10]   Privacy-preserving data aggregation scheme against internal attackers in smart grids [J].
He, Debiao ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
WIRELESS NETWORKS, 2016, 22 (02) :491-502