Skip to main content

The Impact of Blockchain on Cybersecurity Management

  • Chapter
  • First Online:
Advances in Cybersecurity Management

Abstract

Blockchain is a disruptive technology that impacted businesses, industries, and economies. Blockchain’s success is mainly due to its multi-role technology that can be applied to a wide variety of fields, such as in data storage services, financial services, and security services. In the security domain, it poses new challenges that should be faced by cybersecurity managers and exposes new attack footprints that must be addressed to maintain a secure computer network. On the other side, blockchain offers a breakthrough that solves many cybersecurity issues that were open for years. In this chapter, we introduce blockchain’s impact on each of the cybersecurity domains and recommend directions to be followed by cybersecurity managers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.

    Article  Google Scholar 

  2. Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41(10), 1027–1038.

    Article  Google Scholar 

  3. Langley, D. J., van Doorn, J., Ng, I. C., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The internet of everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.

    Article  Google Scholar 

  4. Huh, S., Cho, S., & Kim, S. (2017). Managing IoT devices using blockchain platform. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 464–467). Piscataway: IEEE.

    Chapter  Google Scholar 

  5. Singhal, B., Dhameja, G., & Panda, P. S. (2018). Introduction to blockchain. In Beginning Blockchain (pp. 1–29). Berlin: Springer.

    Chapter  Google Scholar 

  6. Lumb, R., Treat, D., & Jelf, O. (2016). Editing the uneditable blockchain—why distributed ledger technology must adapt to an imperfect world. Last Accessed October 2017. https://newsroom.accenture.com/content/1101/files/Cross-FSBC.pdf

    Google Scholar 

  7. “Bitcoin core version 0.11.0.” (2015). https://bitcoin.org/en/release/v0.11.0

  8. Farshid, S., Reitz, A., & Roßbach, P. (2019). Design of a forgetting blockchain: A possible way to accomplish GDPR compatibility. In Proceedings of the 52nd Hawaii International Conference on System Sciences.

    Google Scholar 

  9. Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Technical Report, Manubot.

    Google Scholar 

  10. Bentov, I., Lee, C., Mizrahi, A., & Rosenfeld, M. (2014). Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract] y. ACM SIGMETRICS Performance Evaluation Review, 42(3), 34–37.

    Article  Google Scholar 

  11. Bou Abdo, J., El Sibai, R., & Demerjian, J. (2020). Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies, 32, e4148.

    Google Scholar 

  12. Zeadally, S., & Abdo, J. B. (2019). Blockchain: Trends and future opportunities. Internet Technology Letters, 2(6), e130.

    Article  Google Scholar 

  13. Nehme, E., Bou Abdo, J., & Demerjian, J. (2018). Selection and promotion criteria of information security personnel: Lebanon case study. In Proceedings of the International Conference on Security and Management (SAM) (pp. 105–110). The Steering Committee of The World Congress in Computer Science, Computer ….

    Google Scholar 

  14. Goldfeder, S., Kalodner, H., Reisman, D., & Narayanan, A. (2018). When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2018(4), 179–199.

    Article  Google Scholar 

  15. Zyskind, G., Nathan, O., et al. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180–184). Piscataway: IEEE.

    Chapter  Google Scholar 

  16. De Filippi, P. (2016). The interplay between decentralization and privacy: the case of blockchain technologies. Journal of Peer Production, Issue(7), 19.

    Google Scholar 

  17. Wilson, D., & Ateniese, G. (2015). From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In International Conference on Network and System Security (pp. 368–375). Berlin: Springer.

    Chapter  Google Scholar 

  18. Jivanyan, A. (2019). Lelantus: Towards confidentiality and anonymity of blockchain transactions from standard assumptions. IACR Cryptology. ePrint Archive, 2019, 373.

    Google Scholar 

  19. Bou Abdo, J., Bourgeau, T., Demerjian, J., & Chaouchi, H. (2016). Extended privacy in crowdsourced location-based services using mobile cloud computing. Mobile Information Systems, 2016, 7867206.

    Article  Google Scholar 

  20. Brambilla, G., Amoretti, M., & Zanichelli, F. (2016). Using blockchain for peer-to-peer proof-of-location. preprint arXiv:1607.00174.

    Google Scholar 

  21. Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation systems. Communications of the ACM, 43(12), 45–48.

    Article  Google Scholar 

  22. Beck, R., Stenum Czepluch, J., Lollike, N., & Malone, S. (2016). Blockchain–the gateway to trust-free cryptographic transactions. In Conference: Proceedings of the Twenty-Fourth European Conference on Information Systems (ECIS).

    Google Scholar 

  23. Hawlitschek, F., Notheisen, B., & Teubner, T. (2018). The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy. Electronic Commerce Research and Applications, 29, 50–63.

    Article  Google Scholar 

  24. Yang, Z., Zheng, K., Yang, K., & Leung, V. C. (2017). A blockchain-based reputation system for data credibility assessment in vehicular networks. In 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (pp. 1–5). Piscataway: IEEE.

    Google Scholar 

  25. Lee, Y., Lee, K. M., & Lee, S. H. (2020). Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. Peer-to-Peer Networking and Applications, 13(2), 671–683.

    Article  Google Scholar 

  26. Zhao, K., Tang, S., Zhao, B., & Wu, Y. (2019). Dynamic and privacy-preserving reputation management for blockchain-based mobile crowdsensing. IEEE Access, 7, 74694–74710.

    Article  Google Scholar 

  27. Li, M., Tang, H., & Wang, X. (2019). Mitigating routing misbehavior using blockchain-based distributed reputation management system for iot networks. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). Piscataway: IEEE.

    Google Scholar 

  28. Hîrţan, L.-A., Dobre, C., & González-Vélez, H. (2020). Blockchain-based reputation for intelligent transportation systems. Sensors, 20(3), 791.

    Article  Google Scholar 

  29. Liu, D., Alahmadi, A., Ni, J., Lin, X., & Shen, X. (2019). Anonymous reputation system for IIoT-enabled retail marketing atop pos blockchain. IEEE Transactions on Industrial Informatics, 15(6), 3527–3537.

    Article  Google Scholar 

  30. Bellini, E., Iraqi, Y., & Damiani, E. (2020). Blockchain-based distributed trust and reputation management systems: A survey. IEEE Access, 8, 21127–21151.

    Article  Google Scholar 

  31. Fraga, D., Bankovic, Z., & Moya, J. M. (2012). A taxonomy of trust and reputation system attacks. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 41–50). Piscataway: IEEE.

    Chapter  Google Scholar 

  32. Cai, Y., Zhu, D. (2016). Fraud detections for online businesses: A perspective from blockchain technology. Financial Innovation, 2(1), 20.

    Article  Google Scholar 

  33. O’Dair, M., et al. (2016). Music on the blockchain: blockchain for creative industries research cluster. Middlesex University Report, 1, 4–24.

    Google Scholar 

  34. Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., & Akutsu, A. (2015). The blockchain-based digital content distribution system. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (pp. 187–190). Piscataway: IEEE.

    Chapter  Google Scholar 

  35. Fujimura, S., Watanabe, H., Nakadaira, A., Yamada, T., Akutsu, A., & J. J. Kishigami. Bright: A concept for a decentralized rights management system based on blockchain. In 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin) (pp. 345–346). Piscataway: IEEE.

    Google Scholar 

  36. Gipp, B., Kosti, J., & Breitinger, C. (2016). Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain. In Mediterranean Conference on Information Systems (MCIS), Association For Information Systems.

    Google Scholar 

  37. Seike, H., Hamada, T., Sumitomo, T., & Koshizuka, N. (2018). Blockchain-based ubiquitous code ownership management system without hierarchical structure. In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (pp. 271–276). Piscataway: IEEE.

    Google Scholar 

  38. Herbert, J., & Litchfield, A. (2015). A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015) (vol. 27, p. 30).

    Google Scholar 

  39. Savelyev, A. (2018). Copyright in the blockchain era: Promises and challenges. Computer Law & Security Review, 34(3), 550–561.

    Article  Google Scholar 

  40. Hajj, S., El Sibai, R., Bou Abdo, J., Demerjian, J., Makhoul, A., & Guyeux, C. (2020). Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. In: Under Review in the Transaction on Emerging Technologies.

    Google Scholar 

  41. Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N. R., & Mühlhäuser, M. (2017). Towards blockchain-based collaborative intrusion detection systems. In International Conference on Critical Information Infrastructures Security (pp. 107–118). Berlin: Springer.

    Google Scholar 

  42. Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., & Fischer, M. (2015). Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys, 47, 1–33.

    Article  Google Scholar 

  43. Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection meets blockchain technology: A review. IEEE Access, 6, 10179–10188.

    Article  Google Scholar 

  44. Li, W., Wang, Y., Li, J., & Au, M. H. (2019). Towards blockchained challenge-based collaborative intrusion detection. In International Conference on Applied Cryptography and Network Security (pp. 122–139). Berlin: Springer.

    Google Scholar 

  45. Liang, G., Weller, S. R., Luo, F., Zhao, J., & Dong, Z. Y. (2018). Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Transactions on Smart Grid, 10(3), 3162–3173.

    Article  Google Scholar 

  46. Stafford, V. (2020). Zero trust architecture. NIST Special Publication, 800, 207.

    Google Scholar 

  47. Samaniego, M., & Deters, R. (2018). Zero-trust hierarchical management in iot. In 2018 IEEE International Congress on Internet of Things (ICIOT) (pp. 88–95). Piscataway: IEEE.

    Chapter  Google Scholar 

  48. Malik, S., Dedeoglu, V., Kanhere, S. S., & Jurdak, R. (2019). Trustchain: Trust management in blockchain and iot supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 184–193). Piscataway: IEEE.

    Chapter  Google Scholar 

  49. Ulybyshev, D., Villarreal-Vasquez, M., Bhargava, B., Mani, G., Seaberg, S., Conoval, P., et al. (2018). (WIP) Blockhub: Blockchain-based software development system for untrusted environments. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 582–585). Piscataway: IEEE.

    Chapter  Google Scholar 

  50. Ulybyshev, D., Bhargava, B., Villarreal-Vasquez, M., Alsalem, A. O., Steiner, D., Li, L., et al. (2017). Privacy-preserving data dissemination in untrusted cloud. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD) (pp. 770–773). Piscataway: IEEE.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rayane El Sibai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sibai, R.E., Challita, K., Abdo, J.B., Demerjian, J. (2021). The Impact of Blockchain on Cybersecurity Management. In: Daimi, K., Peoples, C. (eds) Advances in Cybersecurity Management. Springer, Cham. https://doi.org/10.1007/978-3-030-71381-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71381-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71380-5

  • Online ISBN: 978-3-030-71381-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics