Abstract
Blockchain is a disruptive technology that impacted businesses, industries, and economies. Blockchain’s success is mainly due to its multi-role technology that can be applied to a wide variety of fields, such as in data storage services, financial services, and security services. In the security domain, it poses new challenges that should be faced by cybersecurity managers and exposes new attack footprints that must be addressed to maintain a secure computer network. On the other side, blockchain offers a breakthrough that solves many cybersecurity issues that were open for years. In this chapter, we introduce blockchain’s impact on each of the cybersecurity domains and recommend directions to be followed by cybersecurity managers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.
Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027–1038.
Langley, D. J., van Doorn, J., Ng, I. C., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The internet of everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.
Huh, S., Cho, S., & Kim, S. (2017). Managing IoT devices using blockchain platform. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 464–467). Piscataway: IEEE.
Singhal, B., Dhameja, G., & Panda, P. S. (2018). Introduction to blockchain. In Beginning Blockchain (pp. 1–29). Berlin: Springer.
Lumb, R., Treat, D., & Jelf, O. (2016). Editing the uneditable blockchain—why distributed ledger technology must adapt to an imperfect world. Last Accessed October 2017. https://newsroom.accenture.com/content/1101/files/Cross-FSBC.pdf
“Bitcoin core version 0.11.0.” (2015). https://bitcoin.org/en/release/v0.11.0
Farshid, S., Reitz, A., & Roßbach, P. (2019). Design of a forgetting blockchain: A possible way to accomplish GDPR compatibility. In Proceedings of the 52nd Hawaii International Conference on System Sciences.
Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Technical Report, Manubot.
Bentov, I., Lee, C., Mizrahi, A., & Rosenfeld, M. (2014). Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract] y. ACM SIGMETRICS Performance Evaluation Review, 42(3), 34–37.
Bou Abdo, J., El Sibai, R., & Demerjian, J. (2020). Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies, 32, e4148.
Zeadally, S., & Abdo, J. B. (2019). Blockchain: Trends and future opportunities. Internet Technology Letters, 2(6), e130.
Nehme, E., Bou Abdo, J., & Demerjian, J. (2018). Selection and promotion criteria of information security personnel: Lebanon case study. In Proceedings of the International Conference on Security and Management (SAM) (pp. 105–110). The Steering Committee of The World Congress in Computer Science, Computer ….
Goldfeder, S., Kalodner, H., Reisman, D., & Narayanan, A. (2018). When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2018(4), 179–199.
Zyskind, G., Nathan, O., et al. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180–184). Piscataway: IEEE.
De Filippi, P. (2016). The interplay between decentralization and privacy: the case of blockchain technologies. Journal of Peer Production, Issue(7), 19.
Wilson, D., & Ateniese, G. (2015). From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In International Conference on Network and System Security (pp. 368–375). Berlin: Springer.
Jivanyan, A. (2019). Lelantus: Towards confidentiality and anonymity of blockchain transactions from standard assumptions. IACR Cryptology. ePrint Archive, 2019, 373.
Bou Abdo, J., Bourgeau, T., Demerjian, J., & Chaouchi, H. (2016). Extended privacy in crowdsourced location-based services using mobile cloud computing. Mobile Information Systems, 2016, 7867206.
Brambilla, G., Amoretti, M., & Zanichelli, F. (2016). Using blockchain for peer-to-peer proof-of-location. preprint arXiv:1607.00174.
Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation systems. Communications of the ACM, 43(12), 45–48.
Beck, R., Stenum Czepluch, J., Lollike, N., & Malone, S. (2016). Blockchain–the gateway to trust-free cryptographic transactions. In Conference: Proceedings of the Twenty-Fourth European Conference on Information Systems (ECIS).
Hawlitschek, F., Notheisen, B., & Teubner, T. (2018). The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy. Electronic Commerce Research and Applications, 29, 50–63.
Yang, Z., Zheng, K., Yang, K., & Leung, V. C. (2017). A blockchain-based reputation system for data credibility assessment in vehicular networks. In 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (pp. 1–5). Piscataway: IEEE.
Lee, Y., Lee, K. M., & Lee, S. H. (2020). Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. Peer-to-Peer Networking and Applications, 13(2), 671–683.
Zhao, K., Tang, S., Zhao, B., & Wu, Y. (2019). Dynamic and privacy-preserving reputation management for blockchain-based mobile crowdsensing. IEEE Access, 7, 74694–74710.
Li, M., Tang, H., & Wang, X. (2019). Mitigating routing misbehavior using blockchain-based distributed reputation management system for iot networks. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). Piscataway: IEEE.
Hîrţan, L.-A., Dobre, C., & González-Vélez, H. (2020). Blockchain-based reputation for intelligent transportation systems. Sensors, 20(3), 791.
Liu, D., Alahmadi, A., Ni, J., Lin, X., & Shen, X. (2019). Anonymous reputation system for IIoT-enabled retail marketing atop pos blockchain. IEEE Transactions on Industrial Informatics, 15(6), 3527–3537.
Bellini, E., Iraqi, Y., & Damiani, E. (2020). Blockchain-based distributed trust and reputation management systems: A survey. IEEE Access, 8, 21127–21151.
Fraga, D., Bankovic, Z., & Moya, J. M. (2012). A taxonomy of trust and reputation system attacks. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 41–50). Piscataway: IEEE.
Cai, Y., Zhu, D. (2016). Fraud detections for online businesses: A perspective from blockchain technology. Financial Innovation, 2(1), 20.
O’Dair, M., et al. (2016). Music on the blockchain: blockchain for creative industries research cluster. Middlesex University Report, 1, 4–24.
Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., & Akutsu, A. (2015). The blockchain-based digital content distribution system. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (pp. 187–190). Piscataway: IEEE.
Fujimura, S., Watanabe, H., Nakadaira, A., Yamada, T., Akutsu, A., & J. J. Kishigami. Bright: A concept for a decentralized rights management system based on blockchain. In 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin) (pp. 345–346). Piscataway: IEEE.
Gipp, B., Kosti, J., & Breitinger, C. (2016). Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain. In Mediterranean Conference on Information Systems (MCIS), Association For Information Systems.
Seike, H., Hamada, T., Sumitomo, T., & Koshizuka, N. (2018). Blockchain-based ubiquitous code ownership management system without hierarchical structure. In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (pp. 271–276). Piscataway: IEEE.
Herbert, J., & Litchfield, A. (2015). A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015) (vol. 27, p. 30).
Savelyev, A. (2018). Copyright in the blockchain era: Promises and challenges. Computer Law & Security Review, 34(3), 550–561.
Hajj, S., El Sibai, R., Bou Abdo, J., Demerjian, J., Makhoul, A., & Guyeux, C. (2020). Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. In: Under Review in the Transaction on Emerging Technologies.
Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N. R., & Mühlhäuser, M. (2017). Towards blockchain-based collaborative intrusion detection systems. In International Conference on Critical Information Infrastructures Security (pp. 107–118). Berlin: Springer.
Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., & Fischer, M. (2015). Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys, 47, 1–33.
Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection meets blockchain technology: A review. IEEE Access, 6, 10179–10188.
Li, W., Wang, Y., Li, J., & Au, M. H. (2019). Towards blockchained challenge-based collaborative intrusion detection. In International Conference on Applied Cryptography and Network Security (pp. 122–139). Berlin: Springer.
Liang, G., Weller, S. R., Luo, F., Zhao, J., & Dong, Z. Y. (2018). Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Transactions on Smart Grid, 10(3), 3162–3173.
Stafford, V. (2020). Zero trust architecture. NIST Special Publication, 800, 207.
Samaniego, M., & Deters, R. (2018). Zero-trust hierarchical management in iot. In 2018 IEEE International Congress on Internet of Things (ICIOT) (pp. 88–95). Piscataway: IEEE.
Malik, S., Dedeoglu, V., Kanhere, S. S., & Jurdak, R. (2019). Trustchain: Trust management in blockchain and iot supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 184–193). Piscataway: IEEE.
Ulybyshev, D., Villarreal-Vasquez, M., Bhargava, B., Mani, G., Seaberg, S., Conoval, P., et al. (2018). (WIP) Blockhub: Blockchain-based software development system for untrusted environments. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 582–585). Piscataway: IEEE.
Ulybyshev, D., Bhargava, B., Villarreal-Vasquez, M., Alsalem, A. O., Steiner, D., Li, L., et al. (2017). Privacy-preserving data dissemination in untrusted cloud. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD) (pp. 770–773). Piscataway: IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sibai, R.E., Challita, K., Abdo, J.B., Demerjian, J. (2021). The Impact of Blockchain on Cybersecurity Management. In: Daimi, K., Peoples, C. (eds) Advances in Cybersecurity Management. Springer, Cham. https://doi.org/10.1007/978-3-030-71381-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-71381-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71380-5
Online ISBN: 978-3-030-71381-2
eBook Packages: Computer ScienceComputer Science (R0)