Collaborative Cybersecurity Using Blockchain: A Survey
- URL: http://arxiv.org/abs/2403.04410v1
- Date: Thu, 7 Mar 2024 11:12:35 GMT
- Title: Collaborative Cybersecurity Using Blockchain: A Survey
- Authors: Loïc Miller, Marc-Oliver Pahl,
- Abstract summary: Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern.
Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure.
This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern. Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure. However, the existing literature on blockchain-based collaborative cybersecurity is limited, lacking comprehensive insights. This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023. It explores various applications, trends, and the evolution of blockchain technology, focusing on access control, data validation policies, underlying tech, and consensus mechanisms. A key finding is the fragmentation of the field with no dominant research group or venue. Many recent projects poorly select consensus protocols for their blockchain. To aid researchers and practitioners, this paper offers guidelines for choosing the right blockchain for specific purposes and highlights open research areas and lessons learned from past blockchain applications in collaborative cybersecurity, encouraging further exploration in this field.
Related papers
- SOK: Blockchain for Provenance [0.0]
Provenance, which traces data from its creation to manipulation, is crucial for ensuring data integrity, reliability, and trustworthiness.
Provenance technology has become a popular choice for implementing provenance due to its distributed, transparent, and immutable nature.
Numerous studies on blockchain designs are specifically dedicated to provenance, and specialize in this area.
arXiv Detail & Related papers (2024-07-25T01:46:49Z) - Secure Cross-Chain Provenance for Digital Forensics Collaboration [0.0]
ForensiCross is a cross-chain solution specifically designed for digital forensics and provenance.
It includes BridgeChain and features a unique communication protocol for cross-chain and multi-chain solutions.
ForensiCross aims to simplify collaborative investigations by ensuring data integrity and traceability.
arXiv Detail & Related papers (2024-06-17T16:47:27Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions [0.8540657305162735]
This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security.
We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers.
We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future.
arXiv Detail & Related papers (2024-04-28T06:40:50Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - Protecting the Decentralized Future: An Exploration of Common Blockchain
Attacks and their Countermeasures [1.1499361198674167]
Rising number of security threats have attracted cybercriminals as a target.
This research aims to offer a thorough analysis of mitigating blockchain attacks.
The study also highlights how crucial it is to take into account the particular needs of every blockchain application.
arXiv Detail & Related papers (2023-06-20T20:56:06Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Recent advances in Blockchain Technology: A survey on Applications and
Challenges [9.420795715422711]
The rise of blockchain technology within a few years has attracted researchers across the world.
The prime reason for worldwide attention is undoubtedly due to its feature of immutability along with the decentralized approach of data protection.
arXiv Detail & Related papers (2020-09-12T03:31:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.