Published October 27, 2021 | Version v1
Conference paper Open

Where are my containers?

Description

During the investigation of the security within a seaport ecosystem it turned out that the communication channels between major players, like shipping lines, terminal operators, customs or a Port Community System, may be open gateways for cyber threats. The trust between players is limited as they are frequently competitors, yet communication if not done in an ad hoc manner often occurs without much provision for confidentiality and integrity.
For container shipment the state of containers is crucial information for several players. The players usually operate their own local databases and exchange state changes of containers via bilateral peer-to-peer communication that may easily lead to inconsistent information. Since blockchains are a promising evolving technology to ensure integrity and accountability, we propose and try out a blockchain based replacement for classical databases like those for containers. The challenges of blockchain solutions are confidentiality and global access control. In our prototypical implementation for container tracking, we strongly address role-based and attribute-based access control for multitenancy.

Files

Where are my containers.pdf

Files (323.6 kB)

Name Size Download all
md5:e6e1d4d98d3aef1ae397d33ace6890dc
323.6 kB Preview Download

Additional details

References

  • "TradeLens." [Online]. Available: https://www.tradelens.com/
  • E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolić, S. W. Cocco, and J. Yellick, ´ "Hyperledger fabric: A distributed operating system for permissioned blockchains," in Proceedings of the Thirteenth EuroSys Conference, ser. EuroSys '18. New York, NY, USA: ACM, 2018. [Online]. Available: https://doi.org/10.1145/3190508.3190538
  • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," Computer, vol. 29, no. 2, pp. 38–47, 1996. [Online]. Available: https://doi.org/10.1109/2.485845
  • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," Computer, vol. 29, no. 2, pp. 38–47, 1996. [Online]. Available: https://doi.org/10.1109/2.485845
  • V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, "Attribute-based access control," Computer, vol. 48, no. 2, pp. 85–88, 2015. [Online]. Available: https://doi.org/10.1109/MC.2015.33
  • C. Maeder, K. Sohr, R. W. Nguempnang, N. Meyer-Larsen, and R. Müller, "Modeling and validating role-based authorization policies ¨ for a port communication system with UML and OCL," Journal of Object Technology, vol. 19, no. 3, pp. 3:1–14, Oct. 2020, special Issue dedicated to Martin Gogolla on his 65th Birthday. [Online]. Available: https://doi.org/10.5381/jot.2020.19.3.a8
  • "Hyperledger fabric samples." [Online]. Available: https://github.com/ hyperledger/fabric-samples
  • "Angular." [Online]. Available: https://angular.io/
  • "The Go Programming Language." [Online]. Available: https://golang. org/
  • E. Rissanen, "eXtensible Access Control Markup Language (XACML) Version 3.0 Plus Errata 01," 2017, OASIS Standard incorporating Approved Errata. [Online]. Available: https://docs.oasis-open.org/xacml/ 3.0/xacml-3.0-core-spec-en.html