Immutable and Secure IP Address Protection Using Blockchain

  • Kelly Click
  • Amritraj Singh
  • Reza M. PariziEmail author
  • Gautam Srivastava
  • Ali Dehghantanha
Part of the Advances in Information Security book series (ADIS, volume 79)


IP addresses can be passed on to new recipients even with a damaged reputation score. It takes a lot of effort to defend a network against storing IP address data using current required practices. A blockchain network offers a decentralized, immutable ledger to record IP data which ensures that the data will not be tampered with and the data is trustworthy. Master nodes and digital IDs are two ways the blockchain can be used to preserve a digital identity. Master nodes can act as a mediator and store the entire blockchain to improve the validity of the blockchain. Digital IDs can make it easier to verify an identity on the blockchain. In this chapter, we explore how blockchain technology can preserve user’s digital identity more effectively. This chapter also offers a sample program that can be used to store and retrieve information with the use of the Solidity language used on the Ethereum network. Data pertaining to IP addresses is added to a solidity contract with several methods offered for reading data. The IP address data ends up more secure than if it was simply stored in a central database.


Blockchain Internet protocol IP address Security Privacy Trusty Ethereum 


  1. 1.
    S. Homayoun, A. Dehghantanha, R.M. Parizi, K.K.R. Choo, A blockchain-based framework for detecting malicious mobile applications in app stores, in 32nd IEEE Canadian Conference of Electrical and Computer Engineering (IEEE CCECE’19), Canada (2019)Google Scholar
  2. 2.
    A. Yazdinejad, R.M. Parizi, A. Dehghantanha, K.R. Choo, Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks, in IEEE Transactions on Network Science and Engineering.
  3. 3.
    R.M. Parizi, S. Homayoun, A. Yazdinejad, A. Dehghantanha, K.K.R. Choo, Integrating privacy enhancing techniques into blockchains using sidechains, in 32nd IEEE Canadian Conference of Electrical and Computer Engineering (IEEE CCECE’19), Canada (2019)Google Scholar
  4. 4.
    P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.K.R. Choo, A systematic literature review of blockchain cyber security. Digit. Commun. Netw.
  5. 5.
    E. Nyaletey, R.M. Parizi, Q. Zhang, K.-K.R. Choo, BlockIPFS - blockchain-enabled interplanetary file system for forensic and trusted data traceability, in 2nd IEEE International Conference on Blockchain (IEEE Blockchain-2019) (2019)Google Scholar
  6. 6.
    R. M. Parizi, A. Dehghantanha, K. K. R. Choo, A. Singh, Empirical vulnerability analysis of automated smart contracts security testing on blockchains, in 28th ACM Annual International Conference on Computer Science and Software Engineering (CASCON’18), Ontario, Canada (IBM, 2018)Google Scholar
  7. 7.
    Q. Zhang, R.M. Parizi, K.-K.R. Choo, A pentagon of considerations towards more secure blockchains, in IEEE Blockchain Technical Briefs (2018)Google Scholar
  8. 8.
    R. M. Parizi, Amritraj, A. Dehghantanha, Smart contract programming languages on blockchains: an empirical evaluation of usability and security, in 1st International Conference on Blockchain (ICBC’18), Seattle, USA, LNCS (Springer, 2018), pp. 75–91Google Scholar
  9. 9.
    R.M. Parizi, A. Dehghantanha, On the understanding of gamification in blockchain systems, in 6th IEEE International Conference on Future Internet of Things and Cloud (FiCloud’18), Barcelona, Spain (IEEE Computer Society, 2018)Google Scholar
  10. 10.
    N. Chalaemwongwan, W. Kurutach, A practical national digital ID framework on blockchain (NIDBC), in 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 497–500 (2019)Google Scholar
  11. 11.
    L. Wilbanks, What’s your IT risk approach? IT Prof. 20(4), 13–17 (2018)CrossRefGoogle Scholar
  12. 12.
    V.R. Pagar, R.G. Pise, Strengthening password security through honeyword and honeyencryption technique, in International Conference on Trends in Electronics and Informatics, ICEI 2017, vol. 2018, pp. 827–831 (2018)Google Scholar
  13. 13.
    T. Li, A. Mehta, P. Yang, Security analysis of email systems, in 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud, pp. 91–96 (2017)Google Scholar
  14. 14.
    B.S. Archana, A. Chandrashekar, A.G. Bangi, B.M. Sanjana, S. Akram, Survey on usable and secure two-factor authentication, in 2nd IEEE International Conference on Recent Trends in Electronics Information & Communication Technology, pp. 842–846 (2018)Google Scholar
  15. 15.
    M. Wazid et al., A framework for detection and prevention of novel keylogger spyware attacks, in 7th International Conference on Intelligent Systems and Control, pp. 433–438 (2013)Google Scholar
  16. 16.
    N.B. Vasilyevna, S.S. Yeo, E.S. Cho, J.A. Kim, Malware and antivirus deployment for enterprise IT security, in 2008 International Symposium on Ubiquitous Multimedia Computing, pp. 252–255 (2008)Google Scholar
  17. 17.
    A. Tiwari, A. Tiwary, Y. Bhatt, A distributed web conferencing architecture to meet inorganic training needs of an enterprise, in 2010 International Conference on Education and Management Technology, Proceedings (IEEE), pp. 636–640Google Scholar
  18. 18.
    K. Madzima, M. Moyo, H. Abdullah, Is bring your own device an institutional information security risk for small-scale business organisations? in 2014 Information Security, (South Africa, Johannesburg, 2014), pp. 1–8Google Scholar
  19. 19.
    A.M. Eljetlawi, U. Teknologi, Graphical password: prototype usability survey, in 2008 International Conference on Advanced Computer Theory and Engineering, pp. 351–355 (2008)Google Scholar
  20. 20.
    M. Chen, Reputation-based recommendation trust model in the interoperable environment, in 2011 International Conference on Electronics, Communications and Control, pp. 2226–2228 (2011)Google Scholar
  21. 21.
    A. Stiemer, Analyzing the performance of data replication and data partitioning in the cloud: the BEOWULF approach, in 2016 IEEE International Conference on Big Data, pp. 2837–2846 (2016)Google Scholar
  22. 22.
    B. Carrara, C. Adams, On achieving a digital identity management system with support for non-transferability, in 2010 Eighth Annual International Conference on Privacy, Security and Trust, pp. 150–159 (2010)Google Scholar
  23. 23.
    T.H. Tran, Proactive multicast-based IPSEC discovery protocol and multicast extension, ed. by H. Trung, in Tran SPAWAR Systems Center, San Diego, pp. 1–7Google Scholar
  24. 24.
    Sender Score. Accessed 11 Aug 2019
  25. 25.
  26. 26.
    Y. Fukushima, Y. Hori, K. Sakurai, Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration, in 2011 International Joint Conference of IEEE TrustCom, pp. 352–361 (2011)Google Scholar
  27. 27.
    R. Bocu, IP pooling-based email systems reputation assurance, in 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research, (Iasi, 2011), pp. 1–6Google Scholar
  28. 28.
    K. Mudliar, H. Parekh, P. Bhavathankar, A comprehensive integration of national identity with blockchain technology, in 2018 International Conference on Communication, Information & Computing Technology, pp. 1–6 (2018)Google Scholar
  29. 29.
    Z. Jia, L. Jiqiang, H. Zhen, S. Changxiang, Identity based digital signature algorithm of XTR system, in 2008 9th International Conference on Signal Processing, (Beijing, 2008), pp. 2816–2819Google Scholar
  30. 30.
    V.L. Lemieux, A typology of blockchain recordkeeping solutions and some reflections on their implications for the future of archival preservation, in 2017 IEEE International Conference on Big Data (Big Data), (Boston, MA, 2017), pp. 2271–2278Google Scholar
  31. 31.
    J. Chen, Y. Xue, Bootstrapping a Blockchain based ecosystem for big data exchange, in 2017 IEEE International Congress on Big Data (BigData Congress), (Honolulu, HI, 2017), pp. 460–463Google Scholar
  32. 32.
    I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, L. Yalansky, Ensuring data integrity using blockchain technology, in 2017 20th Conference of Open Innovations Association (FRUCT), (St. Petersburg, 2017), pp. 534–539Google Scholar
  33. 33.
    T. Moura, A. Gomes, Blockchain voting and its effects on election transparency and voter confidence, in Proceedings of the 18th Annual International Conference on Digital Government Research (Dg.O ‘17). Association for Computing Machinery, (New York, NY, USA, 2017), pp. 574–575Google Scholar
  34. 34.
    H. Lee, M. Shin, K.S. Kim, Y. Kang, J. Kim, Recipient-oriented transaction for preventing double spending attacks in private blockchain, in 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, pp. 1–2 (2018)Google Scholar
  35. 35.
    A. Culwick, D. Metcalf, The Blocknet design specification. Blocknet. Accessed 11 Aug 2019
  36. 36.
    C. Harper, What are masternodes? An introduction and guide. Coin Central. Accessed 11 Aug 2019
  37. 37.
    PIVX. Accessed 11 Aug 2019
  38. 38.
    Exscudo. Accessed 11 Aug 2019
  39. 39.
    Digital IDs on the Blockchain. InsureBlocks. Accessed 11 Aug 2019

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Software Engineering and Game DevelopmentKennesaw State UniversityMariettaUSA
  2. 2.College of Computing and Software EngineeringKennesaw State UniversityMariettaUSA
  3. 3.Department of Mathematics and Computer ScienceBrandon UniversityBrandonCanada
  4. 4.Cyber Science LabSchool of Computer Science, University of GuelphGuelphCanada

Personalised recommendations