Research Article

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus

Table 3

Comparison with existing research studies.

ProposalsKey considerations
Reliability and qualityReputation and trustTolerance and securityConsensus

He et al. [5]Similarity criteria are addressed via a smart contract algorithmNo reputation or trust criteria are definedTolerance and security topics are not addressedNo specific consensus mechanism is referenced
Gong and Lee [6]Abstract data verification mechanismAbstract evaluation of contributors credibilityPresents a mechanism to prevent sybil attacks from malicious contributorsAbstract miner-based consensus mechanism
Mendez Mena and Yang [7]No quality criteria are definedTrust is established only via utilising a permissioned block chain environmentTolerance and security topics are not addressedProof of authority
Cha et al. [8]CTI data are subject to verification via a collaborative architecture but is not clear under which criteriaNo reference to reputation criteria or supported mechanismsNo reference to tolerance against malicious activitiesNo reference to consensus algorithms
Meier et al. [11]The quality evaluation is based on correlation and contribution graphs with no detailed quality criteriaNo reputation or trust metrics are addressed, since this proposal does not require a ground truthRobust against a small percentage of dishonest contributors but susceptible to malicious attempts of a larger percentageNot applicable
Riesco et al. [9]Quality criteria of identity, authority, motive, access, timeliness, and consistency are definedTrust is presented as an overall benefit using a blockchain-based network, but there is no reference of quantification of reputation and/or trust between peers; a Cobb–Douglas utility function is presented combining trust and qualityInherited by the block chain technology with no specific referenceNo reference to consensus algorithms
Wu et al. [12]Quality criteria of completeness, freshness and relevance are applied but the assessment is performed under a vague methodologyThe reputation assessment is using EigenTrust algorithm [14] to calculate a reputation score based on peer transaction histories and produce global trust values for all participantsNo reference to tolerance against malicious activitiesIt is inferred that the consensus algorithm of proof of elapsed time (PoET) is proposed
Proposed solutionThe model depends on literature-referenced quality criteria evaluation with explicit methodology, metrics and indicatorsTrust is created via specific mechanisms and processes as well as the reputation is derived from the data stored on the ledger as a historical immutable referenceThe theoretical simulation showed that there is tolerance against malicious validators even if the ratio of legitimate vs malicious validators is 1 : 50The model proposes a new consensus algorithm, namely, proof-of-quality which is based on a voting procedure among the best performant validators