Blockchain technologies for leveraging security and privacy


Опубликован: Mar 27, 2019
Costas Vassilakis
https://orcid.org/0000-0001-9940-1821
Аннотация

The contemporary internet has developed into a complex ecosystem involving humans, services, applications, machines and applications that interact exchanging information, ranging from e-mail messages and social media content to crowdsourcing data and videoconferencing. In this context, a number of security threats such as viruses and malware exist, while additionally the users’ privacy is jeopardized by threats such as personal data leakage, usage pattern monitoring, and so forth. The IoT trend renders the Internet ecosystem even more complex, by adding a rich set of services, applications and machines, many of them backed by new user roles; these elements are weaved into everyday life and industry alike. This increases both the number of opportunities available to threat agents for exploitation and the volume and value of the underlying infrastructure and data, increasing thus the user risk level. In this paper, we explore how the Blockchain technology can be used to leverage security and privacy in the modern Internet, both by providing underpinnings for preventive measures and by facilitating digital forensic evidence collection storage, safeguarding and controlled access.

Article Details
  • Раздел
  • Articles
Скачивания
Данные скачивания пока недоступны.
Библиографические ссылки
Barber, S., Boyen, X., Shi, E. & Uzun, E. (2012). Bitter to better -- How to make bitcoin a better currency. Proceedings of the International Conference on Financial Cryptography and Data Security, 399-414.
Cachin, C. (2018). Distributing trust with blockchains. Retrieved March 1, 2019 from https://cachin.com/cc/talks/20180705-blockchain-cern.pdf.
CloudFlare (2017). What is the Mirai Botnet? Retrieved 1 March 2019 from https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/.
Grinberg, R. (2012). Bitcoin: An Innovative Alternative Digital Currency. Hastings Science & Technology Law Journal, 4, 159-208.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29 (7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
HP (2014). HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. Retrieved 1 March 2019 from https://www8.hp.com/in/en/hp-news/press-release.html?id=1744676.
IoT analytics (2018). State of the IoT 2018: Number of IoT devices now at 7B – Market accelerating. Retrieved March 2 from https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/.
Kolokotronis N. (2018). Distributed Ledger Technologies for Enhanced Security & Privacy in the IoT. Decentralized 2018, November 14-16, 2018 (Athens, Greece). Retrieved 2 March 2019 from https://www.decentralized.com/blog/2018/12/19/decentralized-2018-day-2-nicholas-kolokotronis-university-of-peloponnese/.
Puthal, D., Malik, N., Mohanty, S. P., Kougianos E., &Das, G. (2018). Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems. IEEE Consumer Electronics Magazine, 7 (4), 6-14, July 2018.
Scarfone, K. & Mell, P. (2012). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST publication SP 800-94 Rev. 1, Retrieved 2 March from https://csrc.nist.gov/publications/detail/sp/800-94/rev-1/draft.
Tsekeris, C. (2018). Industry 4.0 and the digitalisation of society: Curse or cure? Homo Virtu-alis, 1 (1), 4-12.
Manadhata, P. K. & Wing, J. M. (2011). An Attack Surface Metric. IEEE Transactions on Soft-ware Engineering, 37 (3), 371-386, May-June 2011, doi: 10.1109/TSE.2010.60