Call for Papers
Quick Links
April, 2024 | Volume 03 | Issue 02
Beyond Cryptocurrency: Harnessing Blockchain for Cybersecurity
Dr. Shalini Lamba1, Jatin Awasthi2, Vikas Yadav3
1Professor, Department of Computer Science
2Research Scholar, Department of IT
3Assistant Professor, Department of Computer Applications
📌 DOI: https://doi.org/10.63920/tjths.32002
🔑 Keywords: Blockchain technology, Cybersecurity, Cryptocurrency, distributed ledger, Decentralization, Immutable records, Data integrity
📅 Publication Date: 04 April, 2024
📜 License:
This work is licensed under a Creative Commons Attribution 4.0 International License
- Share — Copy and Redistribute the material
- Adapt — Remix, Transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Abstract:
This paper aims to explore the role of blockchain in strengthening cyber security. In an era where cyber threats are at its peak, the blockchain technology has come out as a promising method to strengthen the defenses of cyber security. This paper highlights the impact of blockchain technology on cyber security. The paper starts by explaining the basics of blockchain and will then discuss its various key features when integrated with cyber security such as secure data storage and processing, user confidentiality, decentralization and many more. But using blockchain also has some limits such as scalability issues, regulatory issues etc. which are also discussed in this paper. At last, the conclusion will summarize the benefits of integrating blockchain technology with cyber security and what the future holds.
Download Full PDF Paper
References
[1] Swan, Melanie. Blockchain: Blueprint for a new economy. O'Reilly.
[2] Iansiti, Marco, and Karim R. Lakhani. "The truth about blockchain." Harvard Business Review 95.1 (2017): pp. 118-127.
[3] Crosby, Michael, et al. "Blockchain technology: Beyond bitcoin." Applied Innovation 2 (2016): 6-10.
[4] Cachin, C. "Architecture of the Hyperledger Blockchain Fabric." Workshop on Distributed Cryptocurrencies and Consensus Ledgers (2016).
[5] Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., Choo, K. K. "A systematic literature review of blockchain cybersecurity." Digital Communications and Networks (2019).
[6] Gao, Y., Nobuhara, H. "A proof-of-stake sharding protocol for scalable blockchains." Proceedings of the Asia-Pacific Advanced Network (2017).
[7] Li, Wenting, et al. "Securing proof-of-stake blockchain protocols." Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, Cham (2017).
[8] Taylor, P. J., et al. "A systematic literature review of blockchain cybersecurity." Digital Communications and Networks (2019).
[10] Sharma, P. K., Moon, S. Y., Park, J. H. "Block-VN: A distributed blockchain-based vehicular network architecture in smart city." JIPS (2017).
[11] "How Blockchain Can Fight Fraud Based on Know-Your-Customer Data." Nasdaq.com (2019).
[12] Kolias, C., Kambourakis, G., Stavrou, A., Voas, J. "DDoS in the IoT: Mirai and other botnets." Computer (2017).
[13] Zheng, Zibin, et al. "Blockchain challenges and opportunities: A survey." International Journal of Web and Grid Services (2018).
[14] Gao, Y., Nobuhara, H. "A proof-of-stake sharding protocol for scalable blockchains." Proceedings of the Asia-Pacific Advanced Network (2017).
[15] "How Blockchain Can Fight Fraud Based on Know-Your-Customer Data." Nasdaq.com (2019).
