{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:48:42Z","timestamp":1777060122588,"version":"3.51.4"},"reference-count":41,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T00:00:00Z","timestamp":1622246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trace malicious attempts. Keeping multiple copies helps to achieve availability and reliability against such hackers. Unfortunately, maintaining redundant copies in a distributed manner in a byzantine setting has always been a challenging task, however it has recently become simpler given advances in blockchain technologies. In this work, we present a tamper-resistant log system through the use of a blockchain. We leverage the immutable write action and distributed storage provided by the blockchain as a basis to develop a secure log system, but we also add a privacy preserving layer that is essential for many applications. We detail the security and privacy aspects of our solution, as well as how they relate to performance needs in relevant settings. Finally, we implement our system over Hyperledger Fabric and demonstrate the system\u2019s value for several use cases. In addition, we provide a scalability analysis for applying our solution in a large-scale system.<\/jats:p>","DOI":"10.3390\/fi13060143","type":"journal-article","created":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:22:15Z","timestamp":1622420535000},"page":"143","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5273-8363","authenticated-orcid":false,"given":"Louis","family":"Shekhtman","sequence":"first","affiliation":[{"name":"Network Science Institute, Northeastern University, Boston, MA 02115, USA"}]},{"given":"Erez","family":"Waisbard","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Kfar Saba 4464321, Israel"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"ref_1","unstructured":"(2021, May 26). PCI Security Standards Council. Available online: https:\/\/zh.pcisecuritystandards.org\/index.php."},{"key":"ref_2","unstructured":"(2021, May 26). Health Insurance Portability and Accountability Act. Available online: https:\/\/www11.anthem.com\/networkupdate\/articles\/archive\/oct2017_healthinsurance.html."},{"key":"ref_3","unstructured":"(2021, May 26). The General Data Protection Regulation. Available online: https:\/\/www.gdpr-info.eu\/."},{"key":"ref_4","unstructured":"Liang, Y., Zhang, Y., Sivasubramaniam, A., Jette, M., and Sahoo, R. (2006, January 25\u201328). Bluegene\/l failure analysis and prediction models. Proceedings of the International Conference on Dependable Systems and Networks, Philadelphia, PA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Frei, A., and Rennhard, M. (2008, January 4\u20137). Histogram Matrix: Log File Visualization for Anomaly Detection. Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain.","DOI":"10.1109\/ARES.2008.148"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Goldstein, M., Raz, D., and Segall, I. (2017, January 23\u201326). Experience Report: Log-Based Behavioral Differencing. Proceedings of the 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), Toulouse, France.","DOI":"10.1109\/ISSRE.2017.14"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/317087.317089","article-title":"Secure audit logs to support computer forensics","volume":"2","author":"Schneier","year":"1999","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., and Hasan, R. (2013, January 8). SecLaaS: Secure logging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China.","DOI":"10.1145\/2484313.2484342"},{"key":"ref_9","first-page":"366","article-title":"A Framework and Demo for Preventing Anti-Computer Forensics","volume":"12","author":"Simmons","year":"2011","journal-title":"Issues Inf. Syst."},{"key":"ref_10","unstructured":"Nakamoto, S. (2021, May 26). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_11","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OSDI"},{"key":"ref_12","first-page":"53","article-title":"Cryptographic Support for Secure Logs on Untrusted Machines","volume":"98","author":"Schneier","year":"1998","journal-title":"USENIX Symp."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1038\/nature02070","article-title":"A polymer\/semiconductor write-once read-many-times memory","volume":"426","author":"Perlov","year":"2003","journal-title":"Nature"},{"key":"ref_14","unstructured":"Holt, J. (2021, May 26). Logcrypt: Forward Security and Public Verification for Secure Audit Logs. Available online: https:\/\/eprint.iacr.org\/2005\/002.pdf."},{"key":"ref_15","unstructured":"Tian, F. (2016, January 24\u201326). An agri-food supply chain traceability system for China based on RFID & blockchain technology. Proceedings of the International Conference on Service Systems and Service Management (ICSSSM), Kunming, China."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Tsai, W.T., Deng, E., Ding, X., and Li, J. (2018, January 16\u201320). Application of Blockchain to Trade Clearing. Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, Portugal.","DOI":"10.1109\/QRS-C.2018.00039"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2994581","article-title":"Blockchain beyond bitcoin","volume":"59","author":"Underwood","year":"2016","journal-title":"Commun. ACM"},{"key":"ref_18","unstructured":"Kokoris-Kogias, E., Alp, E., Siby, S., Gailly, N., Gasser, L., Jovanovic, P., Syta, E., and Ford, B. (2021, May 26). CALYPSO: Auditable Sharing of Private Data over Blockchains. Available online: https:\/\/eprint.iacr.org\/eprint-bin\/getfile.pl?entry=2018\/209&version=20180806:124914&file=209.pdf."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Fassetti, F., Furfaro, A., Piccolo, A., and Sacc\u00e0, D. (2018, January 11\u201315). Achieving Service Accountability Through Blockchain and Digital Identity. Proceedings of the International Conference on Advanced Information Systems Engineering, Tallinn, Estonia.","DOI":"10.1007\/978-3-319-92901-9_2"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, G., Ferretti, S., and Marzolla, M. (2018, January 15). A Blockchain-based Flight Data Recorder for Cloud Accountability. Proceedings of the Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Munich, Germany.","DOI":"10.1145\/3211933.3211950"},{"key":"ref_21","unstructured":"Gipp, B., Kosti, J., and Breitinger, C. (2016, January 8\u201310). Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain. Proceedings of the Mediterranean Conference on Information Systems (MCIS), Guimar\u00e3es, Portugal."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Cucurull, J., and Puiggal\u00ed, J. (2016). Distributed immutabilization of secure logs. Security and Trust Management, Springer.","DOI":"10.1007\/978-3-319-46598-2_9"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"59389","DOI":"10.1109\/ACCESS.2020.2982964","article-title":"Blockchain-based secure storage and access scheme for electronic medical records in IPFS","volume":"8","author":"Sun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Fatokun, T., Nag, A., and Sharma, S. (2021). Towards a Blockchain Assisted Patient Owned System for Electronic Health Records. Electronics, 10.","DOI":"10.3390\/electronics10050580"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12920-020-0721-2","article-title":"Leveraging blockchain for immutable logging and querying across multiple sites","volume":"13","author":"Ozdayi","year":"2020","journal-title":"BMC Med. Genom."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Rane, S., and Dixit, A. (2019, January 9\u201311). BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. Proceedings of the International Conference on Security & Privacy, Jaipur, India.","DOI":"10.1007\/978-981-13-7561-3_6"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Aniello, L., Baldoni, R., Gaetani, E., Lombardi, F., Margheri, A., and Sassone, V. (2017, January 4\u20138). A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. Proceedings of the European Dependable Computing Conference (EDCC), Geneva, Switzerland.","DOI":"10.1109\/EDCC.2017.31"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"101602","DOI":"10.1016\/j.cose.2019.101602","article-title":"A secure and auditable logging infrastructure based on a permissioned blockchain","volume":"87","author":"Putz","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shekhtman, L., and Waisbard, E. (2019, January 10). EngraveChain: Tamper-proof distributed log system. Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY, USA.","DOI":"10.1145\/3362744.3363346"},{"key":"ref_30","unstructured":"Daemen, J., and Rijmen, V. (2013). The Design of Rijndael: AES-the Advanced Encryption Standard, Springer."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_32","unstructured":"Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V. (2021, May 21). Storj a Peer-to-Peer Cloud Storage Network. Available online: https:\/\/www.storj.io\/storj2014.pdf."},{"key":"ref_33","unstructured":"(2021, May 26). Fabric CA User\u2019s Guide. Available online: https:\/\/hyperledger-fabric-ca.readthedocs.io\/en\/release-1.4\/users-guide.html#revoking-a-certificate-or-identity."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Pointcheval, D., and Rogaway, P. (1998, January 23\u201327). Relations among notions of security for public-key encryption schemes. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0055718"},{"key":"ref_35","unstructured":"Cachin, C. (2016, January 25). Architecture of the Hyperledger blockchain fabric. Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, USA."},{"key":"ref_36","unstructured":"(2021, May 26). The Ordering Service. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/orderer\/ordering_service.html."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TSMC.2019.2895471","article-title":"Performance analysis of the raft consensus algorithm for private blockchains","volume":"50","author":"Huang","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wang, C., and Chu, X. (2020). Performance Characterization and Bottleneck Analysis of Hyperledger Fabric. arXiv.","DOI":"10.1109\/ICDCS47774.2020.00165"},{"key":"ref_39","unstructured":"(2021, May 26). Hyperledger Fabric 1.4.0 Performance Information Report. Available online: https:\/\/hyperledger.github.io\/caliper-benchmarks\/fabric\/resources\/pdf\/Fabric_1.4.0_javascript_node.pdf."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mell, P., and Harang, R.E. (2014, January 6\u20138). Lightweight packing of log files for improved compression in mobile tactical networks. Proceedings of the 2014 IEEE Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2014.37"},{"key":"ref_41","unstructured":"Todd, B. (2017). Creating a Logging Infrastructure, SANS Institute. Technical Report."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/6\/143\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:10:18Z","timestamp":1760163018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/6\/143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,29]]},"references-count":41,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["fi13060143"],"URL":"https:\/\/doi.org\/10.3390\/fi13060143","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,29]]}}}