SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1376
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN
CYBERSECURITY
Aditya Routh1, Koushik Pal2, Subhomoy Das3, Jishnu Nath Paul4
Department of Electronics& Communication Engineering, Guru Nanak Institute of Technology, Kolkata, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Since Satoshi Nakamoto published white
Paper on Bitcoin in 2008, blockchain has (slowly)became
one of the foremost mentioned strategies for securing data
storage and transfer through decentralized, trust-less,
peer-to-peer systems. This analysis identifies peer-
reviewed literature that seeks to utilize Blockchain for
cyber security functions and presents a scientific analysis
of the foremost often adopted blockchain security
applications. In this proposed work, we are introducing
blockchain technology in cybersecurity where IOT security,
availability and decentralized storage of data and many
more applications will be add on into the system. Thus the
Intelligence Agencies and Cybersecurity Cell does not face
any issues or drawbacks while operating, although
cybersecurity is itself a very secure but after introducing
blockchain in it, it will be impossible to seize.
Keywords – Blockchain in cybersecurity, roles, uses
cases, methodology, making of more secure system.
I. INTRODUCTION
India is home to a population that is unmoving in
numerous socio-economic backgrounds. As per the
living standards of individuals, a large vary of devices
area unit in use - from high-end secured electronic
devices to inexpensive mobile phones. This makes it
troublesome for authorities to line uniform legal and
technical standards to control data-protection.
Additionally, digital attainment and awareness among
the population is very low.
Cyber-Security refers to the act of protective and making
certain the protection of laptop systems and electronic
devices from targeted cyber-attacks, opportunist
malware (- viruses, trojans and bugs) or accidental
introduction of malware by users.
So, the main motto of this project is to ensure more
secure system which is unbeatable and overcome the
drawbacks which was faced earlier. This proposed
application of blockchain in cybersecurity will work as
decentralized system i.e. it every user will get to know
activities and with the help of it, it will notify whenever
any outsider tries to invade it and if somehow if invasion
is successful it will be impossible to change aur retrieve
the data as each block in blockchain requires a security
key if anyone to tamper it, it will automatically become
invalid.
II. OBJECTIVE
Cybersecurity protects both raw and meaningful data,
but only on internet-based threats. Organisations
implement information security for a wide range of
reasons. The main objectives are typically related to
ensuring confidentiality, integrity, availability of
company information.
The main objective of this proposed work is to enhance
cybersecurity by using blockchain technology. As we all
know cybersecurity is itself a very secured network, but
at some instances it is not so efficient as any
organisations or anyone can tamper the data if equipped
with the knowledge. As result the data will be in a threat,
but by introducing blockchain in it we overcome this
issue.
The goal of blockchain is to permit digital information,
to be recorded and distributed, however not altered.
During this manner, a blockchain is that the foundation
of immutable ledgers, or records of transactions that
can’t be altered, deleted or destroyed. Here we
minimize the chance to a bigger extent. We also can’t
ignore the point that it is decentralized service i.e.
nobody should apprehend or trust anyone else. Every
user within the network features a copy of actual same
data within the variety of distributed ledger. If the user’s
ledger is altered or corrupted in any manner, it’ll be
rejected by the bulk of the users within the network. In
particular every block within the chain needs a security
key, if anybody tried to counter that, the information can
become invalid for the trespasser and can’t operate any
more. So, this method ensures most security of the
information and prevents any variety of malpractice.
This can facilitate the security agencies that’s serves for
the nation.
III. METHODOLGY AND BLOCK DIAGRAM
This research will be qualitative analysis to evaluate the
applicability of Blockchain technology in today’s
cybersecurity industry. The paper will focus on two
aspects of all the highlighted papers, to begin with will
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1377
look at the latest implementations of the evolving
Blockchain technology in cybersecurity. Second, it’ll
check out the strategies available for deploying
Blockchain cybersecurity solutions. The main takeaways
from the research findings will be used to form a
discussion on how Blockchain can afford security in
today’s IT user environments.
Fig1.Blockdiagram of blockchain
IV. GENERAL DESCRIPTION
Use cases of blockchain in cybersecurity:
Decentralized storage of crucial data: The
blockchain-based decentralized storage system splits
users’ files into varied tiny chunks of information,
mentioned as “blocks”. It then encrypts every block with
Availability: In recent times, cyberattacks trying to
impact technology services availableness square on the
surge with DDoS (Distributed Denial-of-Service) being
the foremost common types of attacks. However, in
blockchain-based systems, DDoS attacks square
measure expensive as the assaulter makes an attempt
to overpower the network with an excellent variety of
tiny transactions. Blockchains haven’t any single
purpose of failure that decreases the possibilities of IP-
based DDoS attacks disrupting the traditional
operation. Information remains accessible through
numerous nodes and so full copies of the ledger are
often accessed the least bit times. The mixture of
multiple nodes and distributed operation makes the
platforms and systems resilient.
IoT security: As far much IoT thinks about, Blockchain
technology stands out due to its ability to unravel
measurability, reliability and privacy problems. It
allows coordination between devices, furthermore as
chase of immeasurable connected devices and process
transactions. This is a decentralized approach in which
cryptographic algorithms square measure enforced so
client information get pleasure from bigger privacy. It’s
associate degree approach that eradicates faults and
offers a resilient scheme. With the increasing
application of AI and IoT, the protection of information
and systems from hackers has forever been a serious
concern. Usage of Blockchain for improved security by
victimization device-to-device encryption to secure
communication, key management techniques, and
authentication is a potential use case to keep up
cybersecurity within the IoT system.
Likewise, all information gets distributed and hold on at
decentralized locations. If interlopers decide to hack into
these locations, they hit encrypted blocks of information.
What’s more, they will only be able to obtain a chunk of
information, not the entire file. This, in sum, is however
blockchain-based decentralized storage systems ensure
data security.
a unique hash or with public-private keys and distributes
the blocks across multiple computers or “nodes”. This
method of distributing information across the network
of node is called ‘sharding’.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1378
Fig2.Blockchian in cybersecurity
Cybersecurity Threats and Incidents on Blockchain
Network: Around 65 real world cybersecurity incidents
have occurred round the globe amid2011 and 2019. The
incidents have adversely affected the Blockchain system.
We calculate the impact based on price of the cost coins
at the time the attacks were discovered. However, these
reports were discovered. However, these reports may
differ a little from reality since the lack real life
circumstances. We broadly divide the incidents as –
hacks, scams and smart contract flow. The highest
lose relates to hacking followed by scams and the
contract flows. Figure-1, shows that the number of
incidents reduced as the price of BTC fell. But as soon as
the price soared up, so did the number of attacks.
Fig-3. Blockchain incidents 2011-2019.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1379
Fig-4.. Top 10 most affected blockchain incidents.
V. WORKFLOW OF THE SYSTEM
For better understanding of the working of this
proposed system, we can divide the whole procedure in
two parts- firstly, the working of blockchain technology
and secondly, how the cybersecurity system works.
So, in the first section we are going to discuss about the
process of the blockchain technology. Blockchain is
system of recording information in a way that makes it
difficult or impossible to change, hack or cheat the
system. A blockchain is basically a digital ledger of
transactions that’s duplicated and distributed across the
complete network of computer systems on the
blockchain. Each block in the chain contains a number of
transactions, and every time a new transaction occurs on
the blockchain, a record of that transaction is added to
every user’s ledger. The decentralized information
managed by multiple users is known as Distributed
Ledger Technology. Now, within the second part we are
going to discuss regarding the cybersecurity and the way
it works. It’s sub-categorized in 3 points- analysis,
implementation and support.
Analysis- It includes an intensive analysis of
infrastructure, necessities and effective cyber threat
scenario. Solid reasons for and against solutions. Joint
realization of proof of construct, trial and take a look at
surroundings
Implementation- Licensing support, consulting and
deployments with the expertise from thousands of
difficult IT security projects. Know how across
industries and company sizes and a high level of routine.
Support- Troubleshooting, support and 24/7 instant
facilitate with qualified contact persons. Certified power
concerning product moreover as data concerning
individual- environments. Enhancements, reviews and
potential analyses.
VI. LITERATURE SURVEY
In the paper 1: Cybersecurity through Blockchain
technology: A Review. In October 2019, this paper was
published by Alex. R. Mathew. It was published in
International Journal of Engineering and Advanced
Technology (IJEAT). This paper looked at several use
cases of Blockchain in the cybersecurity industry as
envisioned by 30 researchers. It found that most
researchers are concentrating on the adoption of
Blockchain to protect IoT (Internet of Things) devices,
networks, and data.
In the paper 2: Blockchain for Cybersecurity and
Privacy: Architectures, Challenges, and Applications: A
Review. In July 2020, this paper was published by
Malehe Yassine, Mamoun Alajab, Imed Romdhani. It was
published in The Internal Audit and IT Audit. This paper
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1380
This book focuses on the applications of blockchain in
cybersecurity, privacy, and digital forensics, for different
industry sectors such as Internet of Things and health-
care.
In the paper 3: A systematic literature review of
blockchain cyber security, in June 2020, this paper was
published by Paul J. Taylor, Tooska Dargahi, Ali
Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond
Choo. This research has identified available recent
research on how blockchain solutions can contribute to
cyber security problems. The initial keyword searches
for this research and current media reports
highlight blockchain as a standalone technology that
brings with it an exorbitant array of possible solutions
for finance, logistics, health, cyber security.
This research has focused solely on cyber security.
Undoubtedly, there are worthy applications for
blockchain; however, a decentralized, trustless system
cannot by itself solve all problems one may uncover in
the field of cyber security.
looked at Blockchain has moved beyond hype to real-
world implementation in a broad range of industries (eg,
finance, supply chain management, and Internet of
Things) and applications (eg, cybersecurity and digital
forensics), partly evidenced by its evolution over the last
decade or so.
VII. CONCLUSION AND FUTURE SCOPE
Blockchain technology continues to evolve and notice
additional use cases within the modern times. One in
every of the viable areas where it’s been studied and
applied is cybersecurity. The Blockchain infrastructure
makes it extremely sensible in addressing the present
security challenges in areas like as IoT devices, and
information in transmission and storage. Alongside this,
alternative major area units as of Blockchain security are
networks and information. As ascertained within the
discussion, the Blockchain technology is be want to
secure IoT devices through additional reliable
authentication and information transfer mechanisms.
This will forestall hackers from breaching into these
devices which frequently ship with poor security
configurations.
In future, for obvious reasons, Blockchain technology’s
scope lies within the field of Cybersecurity. Though the
Blockchain ledger is open and distributed, the
information is secured and verified. The encryption is
finished through cryptography to eliminate
vulnerabilities like as unauthorized information
tampering bolstered the existing efforts to enhance
security and to deter malicious actors.
VIII. REFERENCES
1. Swan, Melanie. Blockchain: Blueprint for a new
economy. " O'Reilly Media, Inc.", 2015.
2. Crosby, Michael, et al. "Blockchain technology:
Beyond bitcoin." Applied Innovation 2.6-10 (2016):
pp. 71.
3. Iansiti, Marco, and Karim R. Lakhani. "The truth
about blockchain." Harvard Business Review 95.1
(2017): pp. 118-127.
4. Cachin C. Architecture of the hyperledger blockchain
fabric. InWorkshop on distributed cryptocurrencies
and consensus ledgers 2016, 310(1), pp. 4.
5. Coindesk: Bitcoin venture capital funding,
www.coindesk.com/bitcoin-venture-capital, 17 July
2019.
6. CoinMarketCap: Cryptocurrency market
capitalizations—Coinmarketcap,
https://coinmarketcap.com/, 17 July 2019.
7. Chowdhury, M.J.M., Colman, A., Kabir, M.A., Han, J.,
Sarda, P.: Blockchain as a notarization service for
data sharing with personal data store. In: Trust-
Com/BigDataSE 2018, IEEE (2018) 1330–1335.
8. V. Buterin, A Next-Generation Smart Contract and
Decentralized Application Platform, Etherum,
2014 [Online].
9. T. Salman, M. Zolanvari, A. Erbad, R. Jain, M. Samaka,
Security services using blockchains: a state of the art
survey, in: IEEE Communications Surveys &
Tutorials, 2018.
10. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash
system, 2008.

Más contenido relacionado

Similar a A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY

A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyA survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
 
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT][A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]IRJET Journal
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge  and security...Blockchain technology and internet of things: review, challenge  and security...
Blockchain technology and internet of things: review, challenge and security...IJECEIAES
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
 
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainIRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 

Similar a A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY (20)

A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyA survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technology
 
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT][A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge  and security...Blockchain technology and internet of things: review, challenge  and security...
Blockchain technology and internet of things: review, challenge and security...
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
 
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Último (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1376 A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY Aditya Routh1, Koushik Pal2, Subhomoy Das3, Jishnu Nath Paul4 Department of Electronics& Communication Engineering, Guru Nanak Institute of Technology, Kolkata, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Since Satoshi Nakamoto published white Paper on Bitcoin in 2008, blockchain has (slowly)became one of the foremost mentioned strategies for securing data storage and transfer through decentralized, trust-less, peer-to-peer systems. This analysis identifies peer- reviewed literature that seeks to utilize Blockchain for cyber security functions and presents a scientific analysis of the foremost often adopted blockchain security applications. In this proposed work, we are introducing blockchain technology in cybersecurity where IOT security, availability and decentralized storage of data and many more applications will be add on into the system. Thus the Intelligence Agencies and Cybersecurity Cell does not face any issues or drawbacks while operating, although cybersecurity is itself a very secure but after introducing blockchain in it, it will be impossible to seize. Keywords – Blockchain in cybersecurity, roles, uses cases, methodology, making of more secure system. I. INTRODUCTION India is home to a population that is unmoving in numerous socio-economic backgrounds. As per the living standards of individuals, a large vary of devices area unit in use - from high-end secured electronic devices to inexpensive mobile phones. This makes it troublesome for authorities to line uniform legal and technical standards to control data-protection. Additionally, digital attainment and awareness among the population is very low. Cyber-Security refers to the act of protective and making certain the protection of laptop systems and electronic devices from targeted cyber-attacks, opportunist malware (- viruses, trojans and bugs) or accidental introduction of malware by users. So, the main motto of this project is to ensure more secure system which is unbeatable and overcome the drawbacks which was faced earlier. This proposed application of blockchain in cybersecurity will work as decentralized system i.e. it every user will get to know activities and with the help of it, it will notify whenever any outsider tries to invade it and if somehow if invasion is successful it will be impossible to change aur retrieve the data as each block in blockchain requires a security key if anyone to tamper it, it will automatically become invalid. II. OBJECTIVE Cybersecurity protects both raw and meaningful data, but only on internet-based threats. Organisations implement information security for a wide range of reasons. The main objectives are typically related to ensuring confidentiality, integrity, availability of company information. The main objective of this proposed work is to enhance cybersecurity by using blockchain technology. As we all know cybersecurity is itself a very secured network, but at some instances it is not so efficient as any organisations or anyone can tamper the data if equipped with the knowledge. As result the data will be in a threat, but by introducing blockchain in it we overcome this issue. The goal of blockchain is to permit digital information, to be recorded and distributed, however not altered. During this manner, a blockchain is that the foundation of immutable ledgers, or records of transactions that can’t be altered, deleted or destroyed. Here we minimize the chance to a bigger extent. We also can’t ignore the point that it is decentralized service i.e. nobody should apprehend or trust anyone else. Every user within the network features a copy of actual same data within the variety of distributed ledger. If the user’s ledger is altered or corrupted in any manner, it’ll be rejected by the bulk of the users within the network. In particular every block within the chain needs a security key, if anybody tried to counter that, the information can become invalid for the trespasser and can’t operate any more. So, this method ensures most security of the information and prevents any variety of malpractice. This can facilitate the security agencies that’s serves for the nation. III. METHODOLGY AND BLOCK DIAGRAM This research will be qualitative analysis to evaluate the applicability of Blockchain technology in today’s cybersecurity industry. The paper will focus on two aspects of all the highlighted papers, to begin with will
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1377 look at the latest implementations of the evolving Blockchain technology in cybersecurity. Second, it’ll check out the strategies available for deploying Blockchain cybersecurity solutions. The main takeaways from the research findings will be used to form a discussion on how Blockchain can afford security in today’s IT user environments. Fig1.Blockdiagram of blockchain IV. GENERAL DESCRIPTION Use cases of blockchain in cybersecurity: Decentralized storage of crucial data: The blockchain-based decentralized storage system splits users’ files into varied tiny chunks of information, mentioned as “blocks”. It then encrypts every block with Availability: In recent times, cyberattacks trying to impact technology services availableness square on the surge with DDoS (Distributed Denial-of-Service) being the foremost common types of attacks. However, in blockchain-based systems, DDoS attacks square measure expensive as the assaulter makes an attempt to overpower the network with an excellent variety of tiny transactions. Blockchains haven’t any single purpose of failure that decreases the possibilities of IP- based DDoS attacks disrupting the traditional operation. Information remains accessible through numerous nodes and so full copies of the ledger are often accessed the least bit times. The mixture of multiple nodes and distributed operation makes the platforms and systems resilient. IoT security: As far much IoT thinks about, Blockchain technology stands out due to its ability to unravel measurability, reliability and privacy problems. It allows coordination between devices, furthermore as chase of immeasurable connected devices and process transactions. This is a decentralized approach in which cryptographic algorithms square measure enforced so client information get pleasure from bigger privacy. It’s associate degree approach that eradicates faults and offers a resilient scheme. With the increasing application of AI and IoT, the protection of information and systems from hackers has forever been a serious concern. Usage of Blockchain for improved security by victimization device-to-device encryption to secure communication, key management techniques, and authentication is a potential use case to keep up cybersecurity within the IoT system. Likewise, all information gets distributed and hold on at decentralized locations. If interlopers decide to hack into these locations, they hit encrypted blocks of information. What’s more, they will only be able to obtain a chunk of information, not the entire file. This, in sum, is however blockchain-based decentralized storage systems ensure data security. a unique hash or with public-private keys and distributes the blocks across multiple computers or “nodes”. This method of distributing information across the network of node is called ‘sharding’.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1378 Fig2.Blockchian in cybersecurity Cybersecurity Threats and Incidents on Blockchain Network: Around 65 real world cybersecurity incidents have occurred round the globe amid2011 and 2019. The incidents have adversely affected the Blockchain system. We calculate the impact based on price of the cost coins at the time the attacks were discovered. However, these reports were discovered. However, these reports may differ a little from reality since the lack real life circumstances. We broadly divide the incidents as – hacks, scams and smart contract flow. The highest lose relates to hacking followed by scams and the contract flows. Figure-1, shows that the number of incidents reduced as the price of BTC fell. But as soon as the price soared up, so did the number of attacks. Fig-3. Blockchain incidents 2011-2019.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1379 Fig-4.. Top 10 most affected blockchain incidents. V. WORKFLOW OF THE SYSTEM For better understanding of the working of this proposed system, we can divide the whole procedure in two parts- firstly, the working of blockchain technology and secondly, how the cybersecurity system works. So, in the first section we are going to discuss about the process of the blockchain technology. Blockchain is system of recording information in a way that makes it difficult or impossible to change, hack or cheat the system. A blockchain is basically a digital ledger of transactions that’s duplicated and distributed across the complete network of computer systems on the blockchain. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every user’s ledger. The decentralized information managed by multiple users is known as Distributed Ledger Technology. Now, within the second part we are going to discuss regarding the cybersecurity and the way it works. It’s sub-categorized in 3 points- analysis, implementation and support. Analysis- It includes an intensive analysis of infrastructure, necessities and effective cyber threat scenario. Solid reasons for and against solutions. Joint realization of proof of construct, trial and take a look at surroundings Implementation- Licensing support, consulting and deployments with the expertise from thousands of difficult IT security projects. Know how across industries and company sizes and a high level of routine. Support- Troubleshooting, support and 24/7 instant facilitate with qualified contact persons. Certified power concerning product moreover as data concerning individual- environments. Enhancements, reviews and potential analyses. VI. LITERATURE SURVEY In the paper 1: Cybersecurity through Blockchain technology: A Review. In October 2019, this paper was published by Alex. R. Mathew. It was published in International Journal of Engineering and Advanced Technology (IJEAT). This paper looked at several use cases of Blockchain in the cybersecurity industry as envisioned by 30 researchers. It found that most researchers are concentrating on the adoption of Blockchain to protect IoT (Internet of Things) devices, networks, and data. In the paper 2: Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications: A Review. In July 2020, this paper was published by Malehe Yassine, Mamoun Alajab, Imed Romdhani. It was published in The Internal Audit and IT Audit. This paper
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1380 This book focuses on the applications of blockchain in cybersecurity, privacy, and digital forensics, for different industry sectors such as Internet of Things and health- care. In the paper 3: A systematic literature review of blockchain cyber security, in June 2020, this paper was published by Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo. This research has identified available recent research on how blockchain solutions can contribute to cyber security problems. The initial keyword searches for this research and current media reports highlight blockchain as a standalone technology that brings with it an exorbitant array of possible solutions for finance, logistics, health, cyber security. This research has focused solely on cyber security. Undoubtedly, there are worthy applications for blockchain; however, a decentralized, trustless system cannot by itself solve all problems one may uncover in the field of cyber security. looked at Blockchain has moved beyond hype to real- world implementation in a broad range of industries (eg, finance, supply chain management, and Internet of Things) and applications (eg, cybersecurity and digital forensics), partly evidenced by its evolution over the last decade or so. VII. CONCLUSION AND FUTURE SCOPE Blockchain technology continues to evolve and notice additional use cases within the modern times. One in every of the viable areas where it’s been studied and applied is cybersecurity. The Blockchain infrastructure makes it extremely sensible in addressing the present security challenges in areas like as IoT devices, and information in transmission and storage. Alongside this, alternative major area units as of Blockchain security are networks and information. As ascertained within the discussion, the Blockchain technology is be want to secure IoT devices through additional reliable authentication and information transfer mechanisms. This will forestall hackers from breaching into these devices which frequently ship with poor security configurations. In future, for obvious reasons, Blockchain technology’s scope lies within the field of Cybersecurity. Though the Blockchain ledger is open and distributed, the information is secured and verified. The encryption is finished through cryptography to eliminate vulnerabilities like as unauthorized information tampering bolstered the existing efforts to enhance security and to deter malicious actors. VIII. REFERENCES 1. Swan, Melanie. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.", 2015. 2. Crosby, Michael, et al. "Blockchain technology: Beyond bitcoin." Applied Innovation 2.6-10 (2016): pp. 71. 3. Iansiti, Marco, and Karim R. Lakhani. "The truth about blockchain." Harvard Business Review 95.1 (2017): pp. 118-127. 4. Cachin C. Architecture of the hyperledger blockchain fabric. InWorkshop on distributed cryptocurrencies and consensus ledgers 2016, 310(1), pp. 4. 5. Coindesk: Bitcoin venture capital funding, www.coindesk.com/bitcoin-venture-capital, 17 July 2019. 6. CoinMarketCap: Cryptocurrency market capitalizations—Coinmarketcap, https://coinmarketcap.com/, 17 July 2019. 7. Chowdhury, M.J.M., Colman, A., Kabir, M.A., Han, J., Sarda, P.: Blockchain as a notarization service for data sharing with personal data store. In: Trust- Com/BigDataSE 2018, IEEE (2018) 1330–1335. 8. V. Buterin, A Next-Generation Smart Contract and Decentralized Application Platform, Etherum, 2014 [Online]. 9. T. Salman, M. Zolanvari, A. Erbad, R. Jain, M. Samaka, Security services using blockchains: a state of the art survey, in: IEEE Communications Surveys & Tutorials, 2018. 10. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, 2008.