{"title":"分散作为保护电子商务和业务流程的工具","authors":"Ken Alabi","doi":"10.2139/ssrn.3071128","DOIUrl":null,"url":null,"abstract":"A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of decentralization in blockchain networks that have made on chain compromise of the entire network harder to accomplish as an attacker would need to overwhelm several diverse and independent nodes, compared to the centralized equivalent where the attacker can focus attack on a single node. In the application of the method to processes, several independent random task operators would serve a vulnerable task instead of a single central operator. Mathematical models of the method’s potential for greater security and cost savings are presented, as well as a discussion of likely impact on the process delivery times. The potential enhancement to process security from this process is desirable given the economic impact of process compromise in many human, business, and financial applications.","PeriodicalId":370988,"journal":{"name":"eBusiness & eCommerce eJournal","volume":"38 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Decentralization as a Tool for Securing Ecommerce and Business Processes\",\"authors\":\"Ken Alabi\",\"doi\":\"10.2139/ssrn.3071128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of decentralization in blockchain networks that have made on chain compromise of the entire network harder to accomplish as an attacker would need to overwhelm several diverse and independent nodes, compared to the centralized equivalent where the attacker can focus attack on a single node. In the application of the method to processes, several independent random task operators would serve a vulnerable task instead of a single central operator. Mathematical models of the method’s potential for greater security and cost savings are presented, as well as a discussion of likely impact on the process delivery times. The potential enhancement to process security from this process is desirable given the economic impact of process compromise in many human, business, and financial applications.\",\"PeriodicalId\":370988,\"journal\":{\"name\":\"eBusiness & eCommerce eJournal\",\"volume\":\"38 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"eBusiness & eCommerce eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3071128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"eBusiness & eCommerce eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3071128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Decentralization as a Tool for Securing Ecommerce and Business Processes
A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of decentralization in blockchain networks that have made on chain compromise of the entire network harder to accomplish as an attacker would need to overwhelm several diverse and independent nodes, compared to the centralized equivalent where the attacker can focus attack on a single node. In the application of the method to processes, several independent random task operators would serve a vulnerable task instead of a single central operator. Mathematical models of the method’s potential for greater security and cost savings are presented, as well as a discussion of likely impact on the process delivery times. The potential enhancement to process security from this process is desirable given the economic impact of process compromise in many human, business, and financial applications.