Decentralization as a Tool for Securing Ecommerce and Business Processes

Ken Alabi
{"title":"Decentralization as a Tool for Securing Ecommerce and Business Processes","authors":"Ken Alabi","doi":"10.2139/ssrn.3071128","DOIUrl":null,"url":null,"abstract":"A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of decentralization in blockchain networks that have made on chain compromise of the entire network harder to accomplish as an attacker would need to overwhelm several diverse and independent nodes, compared to the centralized equivalent where the attacker can focus attack on a single node. In the application of the method to processes, several independent random task operators would serve a vulnerable task instead of a single central operator. Mathematical models of the method’s potential for greater security and cost savings are presented, as well as a discussion of likely impact on the process delivery times. The potential enhancement to process security from this process is desirable given the economic impact of process compromise in many human, business, and financial applications.","PeriodicalId":370988,"journal":{"name":"eBusiness & eCommerce eJournal","volume":"38 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"eBusiness & eCommerce eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3071128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of decentralization in blockchain networks that have made on chain compromise of the entire network harder to accomplish as an attacker would need to overwhelm several diverse and independent nodes, compared to the centralized equivalent where the attacker can focus attack on a single node. In the application of the method to processes, several independent random task operators would serve a vulnerable task instead of a single central operator. Mathematical models of the method’s potential for greater security and cost savings are presented, as well as a discussion of likely impact on the process delivery times. The potential enhancement to process security from this process is desirable given the economic impact of process compromise in many human, business, and financial applications.
分散作为保护电子商务和业务流程的工具
提出了一种对电子商务和业务流程的易受攻击任务进行潜在防御的方法。该过程涉及分散易受攻击的任务,以分散流程对手可用的攻击面。这借鉴了区块链网络中去中心化的一些观察到的成功,这些成功使得整个网络的链妥协更难完成,因为攻击者需要压倒几个不同和独立的节点,而集中式攻击者可以将攻击集中在单个节点上。在将该方法应用于进程时,多个独立的随机任务算子代替单一的中心算子为脆弱任务服务。提出了该方法具有更高安全性和成本节约潜力的数学模型,并讨论了对过程交付时间的可能影响。考虑到在许多人力、业务和财务应用程序中流程折衷的经济影响,该流程对流程安全性的潜在增强是可取的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信