Loading…

Risk Analysis of Blockchain Application for Aerospace Records Management

Blockchain as a technology has been successfully deployed in the financial industry. As the technology continues to mature, there are opportunities to use this to solve operational challenges in Aerospace. One of the common use cases is replacing paper records as a proof of compliance with a blockch...

Full description

Saved in:
Bibliographic Details
Main Authors: Kar, Satyanarayan, Kasimsetty, Vinay, Barlow, Susan, Rao, Sujay
Format: Report
Language:English
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Blockchain as a technology has been successfully deployed in the financial industry. As the technology continues to mature, there are opportunities to use this to solve operational challenges in Aerospace. One of the common use cases is replacing paper records as a proof of compliance with a blockchain enabled distributed ledger. Commonly available open source blockchain frameworks have security ingrained in the components. However, replacing paper records with a blockchain based distributed ledger will require investigation of potential risks involved in the end to end usage of this technology for records management. The objective of this paper is to elucidate potential risks in an aviation record management workflow environment enabled by blockchain and suggest requirements to mitigate the risks. In addition requirements for Blockchain based systems will be proposed, which will guarantee minimum functional requirements like Protection of confidential informationIntegrity of the information in a recordSafeguards against unauthorized access The potential gaps are understood using an illustrative end to end blockchain based process along with their conceptual high level intermediate steps. For example: Authenticated trusted digital identities of the participants whose transactions are recorded in distributed ledgersTrusted source which distributes these identities and has a mechanism to update, revoke and safely secure these identitiesTrusted methods to ensure detection if the digital identities are compromisedTrusted method to demonstrate controlled authorization process for digital identities as per access control rulesTrusted methods to demonstrate the generation of accounting logs
ISSN:0148-7191
2688-3627
DOI:10.4271/2019-01-1344