The Role of Blockchain in Cyber Security

Dylan Rafferty (School of Computing, Engineering & Intelligent Systems, Ulster University, UK)
Kevin Curran (School of Computing, Engineering & Intelligent Systems, Ulster University, UK)

Article ID: 3153

Abstract


Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR),companies are now subject to further financial penalties if they fail to meet requirements in protecting user information. In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security


Keywords


Blockchain;Cybersecurity;Distributed ledgers;Bitcoin;Cryptocurrencies

Full Text:

PDF

References


[1] Nakamato, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [online] p.1. Available at:https://bitcoin.org/bitcoin.pdf [Accessed 10 Nov. 2019].

[2] Lastovetska, A. (2019). Blockchain Architecture Basics: Components, Structure, Benefits &Creation.[online] Available at: https://mlsdev.com/blog/156-how-to-build-your-own-blockchain-architecture [Accessed 10 Nov.2019].

[3] Reisman, R. (2019). Air Traffic Management Blockchain Infrastructure for Security, Authentication,and Privacy. [online] pp. 1, 7-9. Available at:https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/20190000022.pdf [Accessed 10 Nov. 2019].

[4] Rosic, A. (2016). Smart Contracts: The Blockchain Technology That Will Replace Lawyers. [online] Available at: https://blockgeeks.com/guides/smart-contracts/ [Accessed 10 Nov. 2019].

[5] Arnold, A. (2019). 4 Promising Use Cases of Blockchain in Cyber Security. [online] Available at:https://www.forbes.com/sites/andrewarnold/2019/01/30/4-promising-use-cases-of-blockchain-in-cybersecurity/#7b0f8b1b3ac3 [Accessed 10 Nov. 2019].

[6] Glenn, A. (2018). Equifax: Anatomy of a Security Breach. [online] p.1. Available at:https://digitalcommons.georgiasouthern.edu/cgi/viewcontent.cgi?article=1429&context=honors-theses [Accessed 10 Nov.2019].

[7] Bartling, S. and Fecher, B. (2016). Could Blockchain provide the technical fix to solve science’s reproducibility crisis? [pdf] pp. 1-3. Available at: https://pdfs.semanticscholar.org/55d1/2f48e2b446bbc1501eac0d-1f60c7f04a22e5.pdf [Accessed 10 Nov. 2019].

[8] DataFloq, (2019). Is Blockchain the Answer to Healthcare Data Breaches? [online] Available at:https://datafloq.com/read/blockchain-answer-healthcare-data-breaches/6104 [Accessed 10 Nov.2019].

[9] CPS, (2019). Cybercrime - prosecution guidance.[online] Available at: https://www.cps.gov.uk/legal-guidance/cybercrime-prosecution-guidance [Accessed 10 Nov. 2019].

[10] Orcutt, M. (2019a). Once hailed as unhackable,blockchains are now getting hacked. [online] Available at: https://www.technologyreview.com/s/612974/once-hailed-as-unhackable-blockchainsare-now-getting-hacked/ [Accessed 10 Nov. 2019].

[11] O’Dowd, E. (2018). Cloud-Based Healthcare Blockchain Improves Efficacy, Control. [online] Available at: https://hitinfrastructure.com/news/cloud-based-healthcare-blockchain-improves-efficacy-control?utm_source=datafloq&utm_medium=ref&utm_campaign=datafloq [Accessed 10 Nov.2019].

[12] Arnold, A. (2018). The Current Take On IoT Security: Are We Getting Closer To A Safe Ecosystem?[online] Available at: https://www.forbes.com/sites/andrewarnold/2018/10/15/the-current-take-on-iotsecurity-are-we-getting- loser-to-a-safe-ecosystem/#272a0623862e [Accessed 10 Nov. 2019].

[13] Deloitte (2019). Deloitte’s 2019 Global Blockchain Survey. p.3. Available at:https://www2.deloitte.com/content/dam/Deloitte/se/Documents/risk/DI_2019-global-blockchain-survey.pdf [Accessed 10 Nov. 2019].

[14] Jindal, F., Jamar, R. and Churi, P. (2018). Future and Challenges of Internet of Things.International Journal of Computer Science & Information Technology (IJCSIT), [online] 10(2),p. 13. Available at: http://aircconline.com/ijcsit/V10N2/10218ijcsit02.pdf [Accessed 10 Nov.2019].

[15] Kshetri, N. (2017). Can Blockchain Strengthen the Internet of Things? [online] New York: IEEE Computer Society, Pages used. Available at: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8012302 [Accessed 10 Nov. 2019].

[16] Micrium, (2019). How to Think about the Internet of Things (IoT). [online] Available at:https://www.micrium.com/iot/devices/ [Accessed 10 Nov. 2019].

[17] Cheng, S., Daub, M., Domeyer, A. and Lundqvist,M. (2017). Using blockchain to improve data management in the public sector [online] Available at:https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/using-blockchain-toimprove-data-management-in-the-public-sector [Accessed 10 Nov. 2019].

[18] Dorri, A., Kanhere, S. and Jurdak, R. (2016). Blockchain in Internet of Things: Challenges and Solutions. [online] pp. 1-2, Available at: https://arxiv.org/ftp/arxiv/papers/1608/1608.05187.pdf [Accessed 10 Nov. 2019].

[19] Karaarslan, E. and Adiguzel, E. (2018). Blockchain Based DNS and PKI Solutions. [pdf] pp.52-54,57.Available at: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8515149&tag=1[Accessed 10 Nov. 2019].

[20] ICANN. (2019). DNSSEC – What Is It and Why Is It Important? [online] Available at:https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en [Accessed 10 Nov. 2019].

[21] Griffin, M. (2016). New Blockchain DNS System would put an end to DDoS attacks. [online].Available at: https://www.311institute.com/new-blockchain-dns-system-would-put-an-end-to-ddos-attacks/[Accessed 10 Nov. 2019].

[22] Lai, P. (2019). Why DNS on the Blockchain is the next step after DNS over HTTPS [online] Available at: https://diode.io/distributed-infrastructure/WhyDNS-on-Blockchain-is-the-next-step-after-DNSover-HTTPS-19231/ [Accessed 10 Nov. 2019].



DOI: https://doi.org/10.30564/ssid.v3i1.3153

Refbacks

  • There are currently no refbacks.
Copyright © 2021 Dylan Rafferty, Kevin Curran


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.