Blockchain-Based Solutions for Enhancing Data Integrity in Cybersecurity Systems
DOI:
https://doi.org/10.36676/jrps.v14.i5.1639Keywords:
Blockchain, data integrity, cybersecurity solutions, decentralized ledger, cryptographic techniques, data tampering, system manipulation, scalability, interoperability, regulatory compliance, digital ecosystems, data transmission, data storage, integration of blockchain.Abstract
The increasing incidence and sophistication of cyberattacks have made data integrity a critical aspect in modern cybersecurity systems. Although traditional security practices are reasonably effective, they often have weaknesses to a range of attacks, including data tampering, unauthorized access, and system tampering. Blockchain technology, in terms of its decentralized, tamper-proof, and transparent nature, presents a feasible approach to counter these challenges. However, despite its potential, the integration of blockchain in cybersecurity infrastructures is still a field of active research, plagued by serious gaps in its practical application and scalability. This research aims to explore blockchain-based approaches to improving data integrity in cybersecurity systems, focusing on the development of novel frameworks combining the decentralized ledger nature of blockchain with sophisticated cryptographic techniques. Specifically, it will address the limitations of current methods in safeguarding the authenticity and integrity in critical data during transmission and storage in high-risk environments. In addition, the research will examine the challenges of integrating blockchain into existing cybersecurity systems, including scalability, interoperability, and regulatory compliance issues. Through in-depth analysis, this research aims to expand the growing body of knowledge in the effective application of blockchain to improve data integrity without compromising system performance and security. The findings aim to fill the existing research gap by providing actionable commentary on the deployment of blockchain-based solutions to secure data in a range of cybersecurity systems, thereby enabling the creation of more robust and reliable digital environments.
References
• Dehghantanha, A., & Choo, K.-K. R. (2019). A systematic literature review of blockchain cyber security. Digital Communications and Networks, 5(2), 124–136.
• Gipp, B., Meuschke, N., & Gernandt, A. (2015). Decentralized trusted timestamping using the cryptocurrency Bitcoin. In Proceedings of the iConference 2015 (pp. 319–326).
• Halpin, H. (2020). Nym credentials: Privacy-preserving decentralized identity with blockchains. In IEEE Crypto Valley Conference on Blockchain Technology (pp. 1–8). DOI: https://doi.org/10.1109/CVCBT50464.2020.00010
• Jones, S. M. (2017). Trusted timestamping of mementos.
• Karimipour, H., Dehghantanha, A., Parizi, R. M., Choo, K.-K. R., & Leung, H. (2019). A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access, 7, 132621–132630. DOI: https://doi.org/10.1109/ACCESS.2019.2920326
• Milosevic, N., Dehghantanha, A., & Choo, K.-K. R. (2018). Machine learning aided Android malware classification. Computers & Electrical Engineering, 70, 1–13.
• Russinovich, M., Ashton, E., Avanessians, C., Castro, M., Chamayou, A., & others. (2019). CCF: A framework for building confidential verifiable replicated services.
• Sakhnini, J., Karimipour, H., & Dehghantanha, A. (2019). IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE).
• Shariatia, M., Dehghantanha, A., & Choo, K.-K. R. (2015). SugarSync forensic analysis. Australian Journal of Forensic Sciences, 47(1), 1–12. DOI: https://doi.org/10.1080/00450618.2015.1021379
• Teing, Y.-Y., Dehghantanha, A., & Choo, K.-K. R. (2017). CloudMe forensics: A case of big data forensic investigation. Concurrency and Computation: Practice and Experience, 29(12), e4123. DOI: https://doi.org/10.1002/cpe.4277
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal for Research Publication and Seminar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.