Advertisement

Blockchain in Cybersecurity Realm: An Overview

  • Reza M. PariziEmail author
  • Ali Dehghantanha
  • Amin Azmoodeh
  • Kim-Kwang Raymond Choo
Chapter
  • 109 Downloads
Part of the Advances in Information Security book series (ADIS, volume 79)

Abstract

Cybersecurity is a pressing need for governments, businesses, and individuals, which is compounded by the fast-pace technological changes and changing cyberthreat landscape. A large number of solutions have been proposed to address the changing security requirements, and one of such solutions is based on blockchain. Blockchain is a promising infrastructural technology, with potential to be leveraged in different aspects of cybersecurity. For example, blockchain characteristics such as decentralization, verifiability and immutability can facilitate one to achieve authenticity, reliability and integrity of data. Yet, little is known about factors related to the adoption decisions and how it can systemically be put into use to remedy current security’s issues in the digital world. In order to advance the body of practical and theoretical knowledge, this book seeks to provide a sample of cutting-edge research from both academia and industry to perceive blockchain cybersecurity and its current solutions in a clearer context and pave the way for the future.

Keywords

Blockchain Cybersecurity Privacy Trust Cryptocurrency Cyberspace Smart contract Decentralization Peer-to-peer networks Network security Blockchain protocol Cryptography 

References

  1. 1.
    P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A systematic literature review of blockchain cyber security. Digit. Commun. Netw. https://doi.org/10.1016/j.dcan.2019.01.005
  2. 2.
    A. Yazdinejad, R.M. Parizi, A. Dehghantanha, K.-K.R. Choo, Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. CoRR abs/1905.03193. arXiv:1905.03193. http://arxiv.org/abs/1905.03193
  3. 3.
    S. Homayoun, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A blockchain-based framework for detecting malicious mobile applications in app stores, in Proceedings of the 32nd IEEE Canadian Conference of Electrical and Computer Engineering, IEEE CCECE’19, 2019Google Scholar
  4. 4.
    R.M. Parizi, A. Dehghantanha, On the understanding of gamification in blockchain systems, in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (2018), pp. 214–219Google Scholar
  5. 5.
    E. Nyaletey, R.M. Parizi, Q. Zhang, K.-K.R.C. Choo, BlockIPFS - blockchain-enabled interplanetary file system for forensic and trusted data traceability, in Proceedings of 2nd IEEE International Conference on Blockchain, IEEE Blockchain-2019, 2019Google Scholar
  6. 6.
    Q. Zhang, R.M. Parizi, K.-K.R. Choo, A pentagon of considerations towards more secure blockchains, in IEEE Blockchain Technical Briefs, 2018Google Scholar
  7. 7.
    R.M. Parizi, A. Dehghantanha, K.-K.R. Choo, A. Singh, Empirical vulnerability analysis of automated smart contracts security testing on blockchains, in Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, CASCON ’18 (IBM Corp., Riverton, NJ, 2018), pp. 103–113Google Scholar
  8. 8.
    R.M. Parizi, S. Homayoun, A. Yazdinejad, A. Dehghantanha, K.-K.R. Choo, Integrating privacy enhancing techniques into blockchains using sidechains, in Proceedings of the 32nd IEEE Canadian Conference of Electrical and Computer Engineering, IEEE CCECE’19, 2019Google Scholar
  9. 9.
    R.M. Parizi, A. Singh, A. Dehghantanha, Smart contract programming languages on blockchains: an empirical evaluation of usability and security, in International Conference on Blockchain – ICBC 2018, ed. by S. Chen, H. Wang, L.-J. Zhang (Springer International Publishing, Cham, 2018), pp. 75–91CrossRefGoogle Scholar
  10. 10.
    A.S. Omar, O. Basir, Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  11. 11.
    M.N. Islam, S. Kundu, IoT security, privacy and trust in home-sharing economy via blockchain, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  12. 12.
    C. Worley, L. Yu, R. Brooks, J. Oakley, A. Skjellum, A. Altarawneh, S. Medury, U. Mukhopadhyay, Scrybe: a 2nd-generation blockchain technology with lightweight mining for secure provenance and related applications, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  13. 13.
    M. Moh, D. Nguyen, T.-S. Moh, B. Khieu, Blockchain for efficient public key infrastructure and fault-tolerant distributed consensus, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  14. 14.
    K. Tiba, R.M. Parizi, Q. Zhang, A. Dehghantanha, H. Karimipour, K.-K.R. Choo, Secure blockchain-based traffic load balancing using edge computing and reinforcement learning, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  15. 15.
    H.M. Rouzbahani, H. Karimipour, A. Dehghantanha, R.M. Parizi, Blockchain applications in power systems: a bibliometric analysis, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  16. 16.
    A. Ekramifard, H. Amintoosi, A.H. Seno, A. Dehghantanha, R.M. Parizi, A systematic literature review of integration of blockchain and artificial intelligence, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  17. 17.
    G. Srivastava, R.M. Parizi, A. Dehghantanha, The future of blockchain technology in healthcare internet of things security, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  18. 18.
    R. Kumar, R. Tripathi, Secure healthcare framework using blockchain and public key cryptography, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  19. 19.
    A. Singh, R.M. Parizi, M. Han, A. Dehghantanha, H. Karimipour, K.-K.R. Choo, Public blockchains scalability: An examination of sharding and segregated witness, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  20. 20.
    K. Click, A. Singh, R.M. Parizi, G. Srivastava, A. Dehghantanha, Immutable and secure IP address protection using blockchain, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  21. 21.
    G. Bello, A.J. Perez, On the application of financial security standards in blockchain platform, in On the Application of Financial Security Standards in Blockchain Platforms, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar
  22. 22.
    L. Liu, M. Han, Y. Zhou, R.M. Parizi, M. Korayem, Blockchain-based certification for education, employment, and skill with incentive mechanism, in Blockchain Cybersecurity, Trust, and Privacy, ed. by R.M. Parizi, A. Dehghantanha, K.-K.R. Choo (Springer International Publishing, Cham, this volume)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.College of Computing and Software EngineeringKennesaw State UniversityMariettaUSA
  2. 2.Cyber Science LabSchool of Computer Science, University of GuelphGuelphCanada
  3. 3.School of Computer ScienceUniversity of GuelphGuelphCanada
  4. 4.Department of Information Systems and Cyber SecurityUniversity of Texas at San AntonioSan AntonioUSA

Personalised recommendations