TY - CHAP
T1 - Obfuscating Network Structure from Blockchain Analysis
AU - Khalid, Asfa
AU - Óg Murphy, Seán
AU - Sreenan, Cormac J.
AU - Roedig, Utz
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025
Y1 - 2025
N2 - In the context of large-scale data collection like in the Internet of Things, Data Confidence Fabrics are expected to play an essential role in verifying and authenticating sensor data. To this end, metadata is generated at each network node and stored on the blockchain. However, storing metadata on the blockchain introduces significant privacy risks, as it can be exploited to reveal sensitive information, such as network structures and communication paths. This paper addresses these challenges by proposing two novel schemes to protect network structures: Hostname Mapping and Hostname Encryption. Our work demonstrates that the Hostname Mapping approach effectively conceals network patterns but introduces inefficiencies due to additional table storage and computational overhead. In contrast, the Hostname Encryption method eliminates the need for additional table management, offering a more efficient and secure alternative. Despite these advancements, the timestamp field in metadata could still allow attackers to infer patterns using machine learning, highlighting the need for further research to fully secure metadata. By combining encryption with some enhancements to timestamp obfuscation, our approach lays the foundation for additional privacy protection against metadata exploitation.
AB - In the context of large-scale data collection like in the Internet of Things, Data Confidence Fabrics are expected to play an essential role in verifying and authenticating sensor data. To this end, metadata is generated at each network node and stored on the blockchain. However, storing metadata on the blockchain introduces significant privacy risks, as it can be exploited to reveal sensitive information, such as network structures and communication paths. This paper addresses these challenges by proposing two novel schemes to protect network structures: Hostname Mapping and Hostname Encryption. Our work demonstrates that the Hostname Mapping approach effectively conceals network patterns but introduces inefficiencies due to additional table storage and computational overhead. In contrast, the Hostname Encryption method eliminates the need for additional table management, offering a more efficient and secure alternative. Despite these advancements, the timestamp field in metadata could still allow attackers to infer patterns using machine learning, highlighting the need for further research to fully secure metadata. By combining encryption with some enhancements to timestamp obfuscation, our approach lays the foundation for additional privacy protection against metadata exploitation.
KW - Blockchain forensics
KW - Data Confidence Fabrics
KW - Metadata Privacy
KW - Network Security
KW - Obfuscation techniques
UR - https://www.scopus.com/pages/publications/105003200887
U2 - 10.1007/978-3-031-87781-0_11
DO - 10.1007/978-3-031-87781-0_11
M3 - Chapter
AN - SCOPUS:105003200887
T3 - Lecture Notes on Data Engineering and Communications Technologies
SP - 95
EP - 104
BT - Lecture Notes on Data Engineering and Communications Technologies
PB - Springer Science and Business Media Deutschland GmbH
ER -