{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:44:53Z","timestamp":1775367893312,"version":"3.50.1"},"reference-count":53,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["872570"],"award-info":[{"award-number":["872570"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Audit logs are a critical component in today\u2019s enterprise business systems as they provide several benefits such as records transparency and integrity and security of sensitive information by creating a layer of evidential support. However, current implementations are vulnerable to attacks on data integrity or availability. This paper presents a Blockchain-based audit trail mechanism that leverages the security features of Blockchain to enable secure and reliable audit trails and to address the aforementioned vulnerabilities. The architecture design and specific implementation are described in detail, resulting in a real prototype of a reliable, secure, and user-friendly audit trail mechanism.<\/jats:p>","DOI":"10.3390\/a14120341","type":"journal-article","created":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T22:19:16Z","timestamp":1638137956000},"page":"341","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["A Blockchain-Based Audit Trail Mechanism: Design and Implementation"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6031-9449","authenticated-orcid":false,"given":"Cristina","family":"Regueiro","sequence":"first","affiliation":[{"name":"Tecnalia, Basque Research and Technology Alliance (BRTA), Mikeletegi Pasealekua 2, 20009 Donostia-San Sebasti\u00e1n, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9264-2286","authenticated-orcid":false,"given":"I\u00f1aki","family":"Seco","sequence":"additional","affiliation":[{"name":"Tecnalia, Basque Research and Technology Alliance (BRTA), Mikeletegi Pasealekua 2, 20009 Donostia-San Sebasti\u00e1n, Spain"}]},{"given":"Iv\u00e1n","family":"Guti\u00e9rrez-Ag\u00fcero","sequence":"additional","affiliation":[{"name":"Tecnalia, Basque Research and Technology Alliance (BRTA), Mikeletegi Pasealekua 2, 20009 Donostia-San Sebasti\u00e1n, Spain"}]},{"given":"Borja","family":"Urquizu","sequence":"additional","affiliation":[{"name":"Tecnalia, Basque Research and Technology Alliance (BRTA), Mikeletegi Pasealekua 2, 20009 Donostia-San Sebasti\u00e1n, Spain"}]},{"given":"Jason","family":"Mansell","sequence":"additional","affiliation":[{"name":"Tecnalia, Basque Research and Technology Alliance (BRTA), Mikeletegi Pasealekua 2, 20009 Donostia-San Sebasti\u00e1n, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,26]]},"reference":[{"key":"ref_1","unstructured":"Costin, A., and Zaddach, J. (2021, October 21). Iot Malware: Comprehensive Survey, Analysis Framework and Case Studies. Available online: https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Costin-Zaddach-IoT-Malware-Comprehensive-Survey-Analysis-Framework-and-Case-Studies-wp.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 17\u201319). IoT security: Ongoing challenges and research opportunities. Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan.","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"100365","DOI":"10.1016\/j.iot.2021.100365","article-title":"Machine learning approaches to IoT security: A systematic literature review","volume":"14","author":"Ahmad","year":"2021","journal-title":"IEEE Internet Things"},{"key":"ref_4","first-page":"57","article-title":"A Comprehensive Study on Iot Architectures and Iot Security","volume":"VIII","author":"Valaboju","year":"2019","journal-title":"Parishodh J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100227","DOI":"10.1016\/j.iot.2020.100227","article-title":"Survey on IoT security: Challenges and solution using machine learn-ing, artificial intelligence and blockchain technology","volume":"11","author":"Mohanta","year":"2020","journal-title":"IEEE Internet Things"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Nadir, I., Ahmad, Z., Mahmood, H., Shah, G.A., Shahzad, F., Umair, M., and Gulzar, U. (2019, January 17\u201319). An Auditing Framework for Vul-nerability Analysis of IoT System. Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden.","DOI":"10.1109\/EuroSPW.2019.00011"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1097\/00006223-200307000-00008","article-title":"Exploring the audit trail for qualitative investigations","volume":"28","author":"Wolf","year":"2003","journal-title":"Nurse Educ."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.14742\/ajet.1365","article-title":"Making sense of audit trail data","volume":"20","author":"Kennedy","year":"2004","journal-title":"Australas. J. Educ. Technol."},{"key":"ref_9","unstructured":"Duncan, R.A.K., and Whittington, M. (2021, October 21). Enhancing cloud security and privacy: The power and the weakness of the audit trail. Available online: https:\/\/aura.abdn.ac.uk\/bitstream\/handle\/2164\/8061\/cloud_computing_2016_6_20_20063.pdf?sequence=1."},{"key":"ref_10","unstructured":"Khanuja, H.K., and Adane, D.S. (2011, January 17\u201318). S. Database security threats and challenges in database forensic: A survey. In Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), Chennai, India."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0020-0255(96)00173-9","article-title":"Transaction routing for distributed OLTP systems: Survey and recent results","volume":"97","author":"Nikolaou","year":"1997","journal-title":"Inf. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lee, K.H., Zhang, X., and Xu, D. (2013, January 4\u20138). LogGC: Garbage collecting audit log. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516731"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_14","unstructured":"Ljunggren, N. (2019). Improving the Usability of Secure Information Storing within Blockchain Applications. [Master\u2019s Thesis, Lund University]."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1109\/COMPSAC.2019.00142","article-title":"Blockchain development platform comparison","volume":"Volume 1","author":"Clincy","year":"2019","journal-title":"Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"79764","DOI":"10.1109\/ACCESS.2020.2988579","article-title":"Blockchain for industry 4.0: A comprehensive review","volume":"8","author":"Bodkhe","year":"2020","journal-title":"IEEE Access"},{"key":"ref_17","unstructured":"Nakamoto, S. (2021, October 21). Bitcoin: A peer-to-peer electronic cash system. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_18","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1093\/rfs\/hhz007","article-title":"Blockchain disruption and smart contracts","volume":"32","author":"Cong","year":"2019","journal-title":"Rev. Financ. Stud."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger fabric: A distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_21","unstructured":"Morgan, J.P. (2021, November 11). Quorum Whitepaper. Technical Report. Available online: https:\/\/github.com\/jpmorganchase\/quorum-docs\/blob\/master\/Quorum%20Whitepaper%20v0.1.pdf."},{"key":"ref_22","unstructured":"(2021, November 11). Consensys Quorum. Available online: https:\/\/consensys.net\/quorum\/."},{"key":"ref_23","unstructured":"Lombardi, R., de Villiers, C., Moscariello, N., and Pizzo, M. (2021, October 21). The disruption of blockchain in auditing\u2014A systematic literature review and an agenda for future research. Available online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3834838."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Tiron-Tudor, A., Deliu, D., Farcane, N., and Dontu, A. (2021, October 21). Managing change with and through blockchain in accountancy organizations: A systematic literature review. Available online: https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JOCM-10-2020-0302\/full\/html.","DOI":"10.1108\/JOCM-10-2020-0302"},{"key":"ref_25","first-page":"61","article-title":"Systemizing the challenges of auditing blockchain-based assets","volume":"35","author":"Pimentel","year":"2021","journal-title":"J. Inf. Syst."},{"key":"ref_26","unstructured":"Psaila, S. (2021, November 11). Blockchain: A Game Changer for Audit Processes. Available online: https:\/\/www2.deloitte.com\/mt\/en\/pages\/audit\/articles\/mt-blockchain-a-game-changer-for-audit.html."},{"key":"ref_27","unstructured":"(2021, November 11). Chartered Professional Accountants of Canada (CPA Canada) and the American Institute of CPAs (AICPA). Available online: https:\/\/us.aicpa.org\/content\/dam\/aicpa\/interestareas\/frc\/assuranceadvisoryservices\/downloadabledocuments\/blockchain-technology-and-its-potential-impact-on-the-audit-and-assurance-profession.pdf."},{"key":"ref_28","unstructured":"Dai, J. (2017). Three Essays on Audit Technology: Audit 4.0, Blockchain, and Audit App. [Ph.D. Thesis, Rutgers University-Graduate School-Newark]."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/jcaf.22179","article-title":"Blockchain and Its Coming Impact on Financial Services","volume":"27","author":"Fanning","year":"2016","journal-title":"J. Corp. Account. Financ."},{"key":"ref_30","first-page":"569","article-title":"Beyond Bitcoin: Issues in Regulating Blockchain Transactions","volume":"65","author":"Kiviat","year":"2015","journal-title":"Duke Law J."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Saad, M., Bassiouni, M., and Mohaisen, A. (2018, January 5\u20137). Towards blockchain-driven, secure and transparent audit logs. Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA.","DOI":"10.1145\/3286978.3286985"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Peters, G.W., and Panayi, E. (2015). Understanding Modern Banking Ledgers through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money. Banking Beyond Banks and Money, Cornell University. Working paper.","DOI":"10.2139\/ssrn.2692487"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sutton, A., and Samavi, R. (2017, January 21\u201325). Blockchain Enabled Privacy Audit Logs. Proceedings of the International Semantic Web Conference ISWC, Vienna, Austria.","DOI":"10.1007\/978-3-319-68288-4_38"},{"key":"ref_34","first-page":"1437","article-title":"A blockchain and ipfs based framework for secure research record keeping","volume":"119","author":"VishwaVidyapeetham","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","article-title":"Blockchain-based public auditing for big data in cloud storage","volume":"57","author":"Li","year":"2020","journal-title":"Inf. Process. Manag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Barthe, G., Markatos, E., and Samarati, P. (2016). Distributed Immutabilization of Secure Logs. Security and Trust Management. STM 2016, Springer. Lecture Notes in Computer, Science.","DOI":"10.1007\/978-3-319-46598-2"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Wang, Y., Li, J., Yan, Y., Chen, X., Yu, F., Zhao, S., Yu, T., and Feng, K. (2021). A semi-centralized blockchain system with multi-chain for auditing communications of Wide Area Protection System. PLoS ONE, 16.","DOI":"10.1371\/journal.pone.0245560"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ali, A., Khan, A., Ahmed, M., and Jeon, G. (2021, October 21). BCALS: Blockchain-based secure log management system for cloud computing. Available online: https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/ett.4272.","DOI":"10.1002\/ett.4272"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dannen, C. (2017). Introducing Ethereum and Solidity, Apress. Available online: https:\/\/link.springer.com\/content\/pdf\/bfm%253A978-1-4842-2535-6%252F1.pdf.","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Van Leeuwen, J., and Wiedermann, J. (2001). The Turing machine paradigm in contemporary computing. Mathematics Unlimited\u20142001 and Beyond, Springer.","DOI":"10.1007\/978-3-642-56478-9_59"},{"key":"ref_41","unstructured":"(2021, November 11). Raft Consensus Protocol. Available online: https:\/\/docs.goquorum.consensys.net\/en\/stable\/Concepts\/Consensus\/Raft\/."},{"key":"ref_42","unstructured":"(2021, November 11). Istanbul BFT. Available online: https:\/\/github.com\/ethereum\/EIPs\/issues\/650."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Kiayias, A., and Zindros, D. (2019, January 18\u201322). Proof-of-work sidechains. Proceedings of the International Conference on Financial Cryptography and Data Security, Frigate Bay, Saint Kitts and Nevis.","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"ref_44","unstructured":"Baliga, A., Subhod, I., Kamat, P., and Chatterjee, S. (2018). Performance evaluation of the quorum blockchain platform. arXiv."},{"key":"ref_45","unstructured":"(2021, November 11). web3.js\u2014Ethereum JavaScript API. Available online: https:\/\/web3js.readthedocs.io\/en\/v1.4.0\/."},{"key":"ref_46","unstructured":"(2021, November 11). Eventeum Source Code. Available online: https:\/\/github.com\/eventeum\/eventeum."},{"key":"ref_47","unstructured":"(2021, November 11). Apache Kafka. Available online: https:\/\/kafka.apache.org\/."},{"key":"ref_48","unstructured":"(2021, November 11). Logstash. Available online: https:\/\/www.elastic.co\/es\/logstash\/."},{"key":"ref_49","unstructured":"(2021, November 11). Elasticsearch. Available online: https:\/\/www.elastic.co\/es\/what-is\/elasticsearch."},{"key":"ref_50","unstructured":"(2021, November 11). Kibana. Available online: https:\/\/www.elastic.co\/es\/kibana\/."},{"key":"ref_51","unstructured":"(2021, November 11). Mongo DB. Available online: https:\/\/www.mongodb.com\/."},{"key":"ref_52","unstructured":"(2021, November 11). Zookeeper. Available online: https:\/\/zookeeper.apache.org\/."},{"key":"ref_53","unstructured":"(2021, November 11). PM2: Advanced, Production Process Manager for Node.js. Available online: https:\/\/pm2.keymetrics.io\/."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/14\/12\/341\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:36:14Z","timestamp":1760168174000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/14\/12\/341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":53,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["a14120341"],"URL":"https:\/\/doi.org\/10.3390\/a14120341","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,26]]}}}