Advertisement

Blockchain and Its Application in Cybersecurity

Chapter
Part of the IITK Directions book series (IITKD, volume 4)

Abstract

Blockchains, in the past decade, have gathered a lot of attraction due to its potential to disrupt the way in which trust in the digital world is generated. Blockchain, the technology powering cryptocurrency worth billions of dollars, is tamper-resistant, immutable ledger that is maintained in a decentralized manner by the miners who do not trust each other. This characteristic of blockchain to induce trust in the untrusted environment, by establishing a commonly agreed upon (among the members of the blockchain network) shared ledger, can be used to solve problems in domains such as finance, supply chain, health care, IoT, etc. In this chapter, we will introduce blockchain and present its applications in cybersecurity.

Keywords

Cybersecurity Blockchain Cryptocurrency Insider threat Data integrity Zero-knowledge proof 

References

  1. 1.
    Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. http://bitcoin.org/bitcoin.pdf
  2. 2.
    Micali S (2016) ALGORAND: the efficient and democratic ledger. CoRR arXiv:abs/1607.01341
  3. 3.
  4. 4.
    Ben-Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE symposium on security and privacy, pp 459–474Google Scholar
  5. 5.
    Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE symposium on security and privacy (SP). IEEE, pp 397–411Google Scholar
  6. 6.
    Blockchain based smart contracts: a systematic mapping study (2017)Google Scholar
  7. 7.
    Ksi us google patent 2017 (2017)Google Scholar
  8. 8.
    Advanced trust services facilitated by the industrial - scale blockchain technology (2015)Google Scholar
  9. 9.
  10. 10.
  11. 11.
    Forecast: the internet of things, worldwide, 2013. Gartner, Stamford (2013)Google Scholar
  12. 12.
    IBM: device democracy: saving the future of internet of things. IBM, New York (2015)Google Scholar
  13. 13.
    Wörner D, von Bomhard T (2014) When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the UbiComp Adjunct, Seattle, pp 295–298Google Scholar
  14. 14.
    Zhang Y, Wen J (2015) An iot electric business model based on the protocol of bitcoin. In: Proceedings of the 18th international conference on intelligence in next generation networks, Paris, France, pp 184–191Google Scholar
  15. 15.
    Wilkinson S et al Storj a peer-to-peer cloud storage network. https://storj.io/storj.pdf. Accessed 10 April 2018
  16. 16.
    Ateniese G, Goodrich MT, Lekakis V, Papamanthou C, Paraskevas E, Tamassia R (2017) Accountable storage. In: Proceedings of the international conference on applied cryptography and network security, Kanazawa, Japan, pp 623–644Google Scholar
  17. 17.
    Wilson D, Ateniese G (2015) From pretty good to great: enhancing pgp using bitcoin and the blockchain. In: Proceedings of the international conference on network and system security, New York, pp 368–375Google Scholar
  18. 18.
    Gippand B, Meuschke N, Gernandt A (2015) Decentralized trusted timestamping using the crypto currency bitcoin. In: Proceedings of the iConference Newport Beach, CA, USA, pp 1–5Google Scholar
  19. 19.
    Han D, Kim H, Jang J (2017) Blockchain based smart door lock system. In: Proceedings of the international conference on information and communication technology convergence (ICTC), Jeju Island, South Korea, pp 1165–1167Google Scholar
  20. 20.
    Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832–1843CrossRefGoogle Scholar
  21. 21.
    Siddiqi M, All ST, Sivaraman V (2017) Secure lightweight context-driven data logging for bodyworn sensing devices. In: Proceedings of the 5th international symposium on digital forensic and security (ISDFS), Tirgu Mures, Romania, pp 1–6Google Scholar
  22. 22.
    Kshetri N (2017) Can blockchain strengthen the internet of things? IT Prof 19(4):68–72CrossRefGoogle Scholar
  23. 23.
    Tanas C, Delgado-Segura S, Herrera-Joancomartí J (2016) An integrated reward and reputation mechanism for mcs preserving users’ privacy. In: Proceedings of the 10th international workshop on data privacy management, and security assurance, vol 9481. Springer, New York, pp 83–89Google Scholar
  24. 24.
    Kshetri N (2016) An agri-food supply chain traceability system for china based on RFID & blockchain technology. In: Proceedings of the 13th international conference on service systems and service management (ICSSSM), Kunming, China, pp 1–6Google Scholar
  25. 25.
    Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In: Proceedings of the IEEE 14th international conference on smart city, Sydney, NSW, Australia, pp 1392–1393Google Scholar
  26. 26.
    Wright A, De Filippi P (2015) Decentralized blockchain technology and the rise of lex cryptographia. https://ssrn.com/abstract=2580664. Accessed 10 April 2018
  27. 27.
    Kshetri N (2017) Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41(10):1027–1038CrossRefGoogle Scholar
  28. 28.
    Huh S, Cho S, Kim S (2017) Managing IOT devices using blockchain platform. In: Proceedings of the 19th international conference on advanced communication technology, (ICACT), Bongpyeong, South Korea pp. 464–467 (Feb. 2017)Google Scholar
  29. 29.
    Bocek T, Rodrigues BB, Strasser T, Stiller B (2017) Blockchains everywhere-a use-case of blockchains in the pharma supply-chain. In: Proceedings of the IFIP/IEEE symposium on integrated network and service management (IM), Lisbon, Portugal, pp 772–777Google Scholar
  30. 30.
    Shae Z, Tsai JJP (2017) On the design of a blockchain platform for clinical trial and precision medicine. Proceedings of the IEEE 37th international conference on distributed computing systems (ICDCS), Atlanta, pp 1972–1980Google Scholar
  31. 31.
    Salahuddin MA, Al-Fuqaha A, Guizani M, Shuaib K, Sallabi F (2017) Softwarization of internet of things infrastructure for secure and smart healthcare. Computer 50(7):74–79CrossRefGoogle Scholar
  32. 32.
    Fernández-Caramés TM (2015) An intelligent power outlet system for the smart home of the internet of things. Int J Distrib Sens Netw 11:214805CrossRefGoogle Scholar
  33. 33.
    Lundqvist T, de Blanche A, Andersson HRH (2017) Thing-to-thing electricity micro payments using blockchain technology. In: Proceedings of the global internet things summit (GIoTS), Geneva, Switzerland, pp 1–6Google Scholar
  34. 34.
    Zerocash. http://zerocash-project.org. Accessed 10 April 2018
  35. 35.
    Zcash. https://Z.cash. Accessed 10 April 2018
  36. 36.
    Moore C, O’Neill M, O’Sullivan E, Doroz Y, Sunar B (2014) Practical homomorphic encryption: a survey. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS), Melbourne, VIC, Australia, pp 2792–2795Google Scholar
  37. 37.
    Hayouni H, Hamdi M (2016) Secure data aggregation with homomorphic primitives in wireless sensor networks: a critical survey and open research issues. In: Proceedings of the IEEE 13th international conference on network, sensor, control (ICNSC), Mexico City, MexicoGoogle Scholar
  38. 38.
    Jabir RM, Khanji SIR, Ahmad LA, Alfandi O, Said H (2016) Analysis of cloud computing attacks and countermeasures. In: Proceedings of the 18th international conference on advanced communication technology (ICACT), Pyeongchang, South KoreaGoogle Scholar
  39. 39.
    Atya AOF, Qian Z, Krishnamurthy SV, Porta TL, McDaniel P, Marvel L (May 2017) Malicious co-residency on the cloud: attacks and defense. In: Proceedings of the IEEE Conference on Computer Communications, Atlanta, pp 1–9Google Scholar
  40. 40.
    Liu B, Yu XL, Chen S, Xu X, Zhu L (2017) Blockchain based data integrity service framework for iot data. In: Proceedings of the IEEE international conference on web services, Honolulu, pp 468–475Google Scholar
  41. 41.
    Original scrypt function for tarsnap. http://www.tarsnap.com/scrypt.html. Accessed 10 April 2018
  42. 42.
    X11 official documentation for dash. https://dashpay.atlassian.net/wiki/spaces/DOC/pages/1146918/X11. Accessed 10 April 2018
  43. 43.
    List of high profile cryptocurrency hacks so far. http://storeofvalueblog.com/posts/cryptocurrency-hacks-so-far-august-24th/

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Indian Institute of Technology KanpurKanpurIndia

Personalised recommendations