Question

In: Computer Science

Instructions Research Emerging Technology Topic Selection: Blockchain for business security (e.g. Fireblocks) Create a professional PowerPoint...

Instructions

Research Emerging Technology Topic Selection:

  1. Blockchain for business security (e.g. Fireblocks)

Create a professional PowerPoint presentation with audio-recorded narrative. Your PowerPoint submission should be 15 to 20 minutes long and covers at the minimum the following sections:

  • Topic Background (overview)
    • Evolution of Blockchain
    • Explain the role of information systems as it pertains to Blockchain
  • Comparison of three (3) specific software technology applications (not models) pertinent to your selected topic that can be used in the workplace to conduct daily activities. You can this information below on their respective website. Make sure to review the information and summarize your findings in your presentation.  
    • name, version (if applicable), brand/company, release date, description, and operating system(s) supported.
    • unique features and functions
    • usability in the context of organizations (provide at least one specific scenario)
    • pricing (estimates)/subscription types
    • benefits and challenges
  • Summary and recommended software based on your analysis
  • References

Solutions

Expert Solution

Solution:

Blockchain for business security (e.g. Fireblocks)

Having spread to multiple industries already, blockchain is disrupting the world of business. Here’s how blockchain changes nowadays business security.

The demand for blockchain technology keeps growing. The size of the blockchain technology market worldwide is projected to grow and eventually reach $23.3 billion by 2023:

The number of industries that blockchain has already conquered keeps growing. Deloitte’s 2018 global blockchain survey, which covered different industries, showed a growing interest in introducing blockchain to business.

A response in favor of blockchain for business was received from the representatives of the following industries:

Automotive industry – 73 percent.
Energy sector – 72 percent.
Biotechnology, pharma, and medical devices – 72 percent.
Financial services – 64 percent.
Consumer goods & manufacturing – 56 percent.
Healthcare – 55 percent.
What Do Businesses Expect from Blockchain Technology?

This year, Deloitte’s 2019 global blockchain survey covered the primary reasons why businesses implement blockchain:

87% of respondents consider blockchain to implement more “touchless” business processes
86% see blockchain as an opportunity to enable new revenue streams
82% implement blockchain, as they are worried about staying competitive
However, one of the primary reasons why the interest in blockchain keeps growing is the security (with 88% of respondents supporting this claim). Let’s take a closer look at this reason.

What Can Blockchain Offer Businesses in Terms of Security?

Security is in blockchain’s blood.

Blockchain is almost impossible to tamper with due to the presence of a hash – a function that enables converting the input of letters and numbers with an encrypted of a fixed length as a result.

A slight change in a hash disrupts the whole chain of blocks, which cannot go unnoticed. As blockchain is built on a distributed ledger system, this means that several parties have access to the same blockchain. Thus, any changes in the blockchain cannot go unnoticed without the authorization of all network members.

Now, let’s take a look at the possibilities that blockchain has already introduced to businesses in terms of security.

Smart Contracts

Businesses are looking for opportunities to secure their data transactions, and smart contracts are the solution they can benefit from.

A smart contract is a code built into a blockchain network and is designed to cut the middleman in all data transactions. Smart contracts in their nature are:

Immutable – once you’ve created a smart contract, you cannot change it or terminate it. All parties of the blockchain network are bound by this contract and cannot change its terms.
Distributed – the output of a smart contract is validated by all the nodes in the blockchain network. A single node cannot tamper with the smart contract without others spotting this attempt.
How can businesses benefit from smart contracts?

In the annual real estate market research, Flatfy listed the following benefits of smart business contracts:

The detailed description of terms and conditions is the prerequisite to the proper functioning of a smart contract. These details are checked by all the parties bound by this agreement. Moreover, the fact that smart contracts are immutable makes it impossible to change the terms and conditions, thus ensuring complete transparency.
Any condition that is left out of the smart contract can result in an error during the execution process. Smart contracts are executed automatically and will only be executed if all terms and conditions are precise.
Because of high transparency, precision, and security, there is no room for manipulation or manual errors, leaving both parties completely satisfied with the results.
Another bonus feature that we can add to these reasons is that smart contracts are paperless and are exist in a digital form only, making them easy to track. Blockchain technology also ensures that all bits of data are copied, so no files and relevant information will go missing.

So, in the world, where all business documentation goes digital, smart contracts save the day, as they ensure transparency and precise execution.

Decentralized Cloud Storage

Blockchain is not only used to enable transparency with smart contracts. This technology plays a crucial role in data storage, revolutionizing the way we keep our data secure from leaks, phishing, and other cybersecurity threats.

We all know about cloud computing and centralized servers like Google Disk and Microsoft Azure. These services allow businesses to get extra infrastructural support and outsource the need for data storage, computing power, and data delivery.

However, blockchain technology brought along a different opportunity – decentralized cloud storage that has several advantages that businesses can benefit from:

Increased privacy and security.

Decentralized cloud storage uses a process called sharding when all the data is broken into sections and distributed among all the nodes. These shards are encrypted with a private key. Besides, a shard is just a fraction of an original file, making it impossible to access the entire content without authorization.

Data redundancy.

This feature helps prevent data loss. Blockchain technology ensures the creation of extra copies, in case an error occurs when this data is transmitted.

Reduced expenses.
A decentralized cloud solution costs about 50% less than a centralized server. For instance, StorJ (a decentralized cloud) costs $0.015 GB/month, while its centralized server opponent Microsoft Azure costs $0.030 GB/month.

All these advantages make good reasons why businesses consider implementing a blockchain-based security solution. And, the fact that businesses can spend less money on better security solutions means that this cutting-edge technology will soon outcompete centralized cloud servers.

What Else is in Store?

While smart contracts and decentralized cloud storage are already a reality, several blockchain implementation prospects may come to life in the nearest future.

Among them is private messaging solutions powered by blockchain technology. This solution is crucial for business security, as it encrypts all interactions, creating a system of unified communication.

While most private messaging systems today use end-to-end encryption, which ensures safety but is still far from being completely secure, blockchain-powered private messaging solutions are expected to have higher levels of safety, using distributed ledger technology and sharding to keep the communication secure.

In general, aside from the fact that blockchain technology is still evolving, it already has a lot to offer for businesses in terms of security. While decentralized cloud storage offers high-level data security, smart contracts offer complete transparency and precise execution.

These blockchain-powered technologies have begun to revolutionize the business world.

1. Introduction

Blockchain is a very-known term, which was used for the first time in, where Satoshi Nakamoto described Bitcoin in 2008. Bitcoin is the best-known implementation of blockchain, and it is basically the implementation of a cryptocurrency. However, blockchain is much more than that, being seen as the service and structure behind cryptocurrencies to maintain records for currency transactions between untrusted participants. Nowadays, in addition to cryptocurrencies (hundreds of currencies exist today that use blockchain technology or derivatives), many other application areas rely on blockchain technology like energy trading, health, supply chain, manufacturing, identity management, e-government, etc.

Blockchain presents itself as a distributed ledger, referring this concept to the way a database is shared between several participants on a peer-to-peer network, without a central authority overseeing the process. In the case of blockchain, this ledger is arranged, as its name suggests, in an ordered chain of blocks, each of which agglutinates transactions in order. A block, therefore, is basically a structure composed of a header and a body containing transactions in order. Blocks are timestamped and signed by its creator. The way these blocks constitute a chain is through a pointer to the previous block; the header of each block contains a cryptographic hash of the previous block so that a block is linked to the previous one (while ensuring the immutability of that previous block). The very first block from which a blockchain is constituted is known as the “genesis block”.

It should be noted again that a blockchain is a type of Distributed Ledger Technology (DLT) with a series of specific features. By DLT, we mean any type of technology that makes use of a distributed ledger and, therefore, not all DLTs are blockchains. As an example, new generation technologies, such as IOTA or Hashgraph, are based on DLT different from the blockchain, being named blocks technologies, which are out of the scope of this document.

As mentioned, in blockchain, the ledger is distributed between participants of a decentralized network without any central authority. In a public non-permissioned blockchain, all participants in the network keep a copy of the ledger, while in other more complex or restrictive kinds of blockchain, different ledgers can be held by subsets of participants. As an example of this statement, Hyperledger Fabric is presented as a permissioned blockchain technology, which allows us to separate the different nodes into different channels, having the nodes in the same channel the same copy of the ledger. At first sight, such kind of systems could be prone to issues related to the ledger synchronization. If any participant had the ability to promote their own version of the ledger and thereby their own version of the transactions, they could try to make a profit from it. However, how blockchain avoids this sort of incidences is through consensus mechanisms.

Consensus mechanisms govern the way participants storing and verifying blocks agree on one common version of the facts (a shared truth). The Consensus allows nodes to reliably validate new blocks in the network. There are a variety of proven types of consensus mechanisms, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT) or Proof of Elapsed Time (PoET), among other not-so-known ones, such as, for example.

The most widely adopted consensus algorithm today is Proof of Work, used in both Bitcoin and Ethereum. Proof of Work basically consists of the resolution of a computationally complex challenge (related to the block itself) as a condition for the insertion of a block in the chain. The participants of the blockchain compete for the resolution of this challenge in return for a reward. The challenge is difficult to solve, but easy to verify so that the rest of the participants can easily verify the resolution of the challenge and agree on the new block. This algorithm guarantees consensus as long as no participant has more than half the computing capacity of the network, at the cost of high energy consumption. This high energy consumption and wastage of computing capacity are driving blockchain networks like Ethereum to migrate to lighter consensus algorithms, such as Proof of Stake.

The most used cryptographic function in Proof of Work is the hash. Hashes are trapdoor functions, which mean they are really easy to compute in one direction, but really hard in the opposite (find its inverse). When a participant of the network (called the miner) finds a solution for a hash matching certain properties, it is enabled to assemble a new block and broadcast it. Upon reception, every other participant can efficiently check that the block is valid given that is linked to the last one and matches the properties required by the network. This validation can be computed efficiently due to hashes being trapdoor functions. The consensus is reached when every participant has the same blocks, in other words, every participant agrees on the chain composition (longest blockchain). Hashes are also key tools for verifying data integrity and for the cryptographic signature process.

All this said, what advantages do we get with the use of blockchain? What leads us to adopt a network with such a load of processing and redundancy? All this complexity is necessary to constitute a decentralized network composed of multiple participants that reach a common consensus without the intervention of a central authority; to build a transparent and immutable ledger verifiable by itself; to establish a contract without the intervention of a notary (in fact, applications running on a blockchain are known as smart contracts). And all these goals are achieved with the highest level of trustworthiness and availability. Of course, blockchain is not the solution to everything. It is not the right solution for systems governed by a single central authority or to store data whose integrity and source is not relevant. It is a new paradigm that ensures the deterministic execution of a contract and the incorruptibility of the data in a ledger with full guarantees and without the intervention of a third party.

More technical information has been presented by so that the reader can obtain further knowledge on the functioning of protocols.

2. Blockchain as a secure ledger

Once blockchain technology has been introduced, the focus is on the fulfillment of the information security properties it provides.

Focusing on data integrity, the blockchain ledger is immutable. Every transaction in a block is cryptographically signed by its sender, every block in the blockchain is cryptographically signed by its miner, every block contains a hash of the immediately preceding block and all the participants in the blockchain network reach a consensus about the chain as the shared truth. To alter a single transaction in the blockchain, an attacker should alter each subsequent block accordingly, resolve the consensus challenge of that block and subsequent blocks, and persuade more than 50% of network participants to adopt the new chain. That situation is close-to-impossible, due to the hashing properties and the amount of computational and electrical power required to achieve this goal. Blockchain is tamper-resistant and integrity is the greatest of its merits.

Merkle trees are a fundamental use of hashing in blockchain technologies that have not been mentioned before in the article. Merkle tree summarizes all transactions in a block into a single fingerprint, allowing to verify that all transactions in the block have been included without modification. Below we can find an example of one of these Merkle trees.

As we can see above, each leaf in the Merkle tree is a hash of transactional data, and hashing is applied recursively over each subset of hashes forming the tree structure. Merkle trees are not only applied to block transactions but sometimes also to the ledger state (the result of the execution of all ledger transactions).

Non-repudiation is another information security property intimately linked to integrity. Since every transaction in the blockchain is cryptographically signed by its sender and the chain is immutable, the sender can never deny having ordered the transaction. However, that sender, in general, cannot be associated with a physical entity, but only with an account (as we will explain when discussing privacy).

In terms of availability, the distributed character of the blockchain network makes it highly available. Also, transactions on public blockchain networks usually involve a cost to the sender equivalent to their processing and storage consumption. This cost results in a reward for the miner of the block containing the transaction. Furthermore, it protects against Denial of Service (DoS) attacks, since an attack involves a cost proportional to the resources consumed for a potential attacker. For example, in Ethereum MainNet, this cost is reflected in the concept of gas. Gas represents the computational and storage cost of the transaction. At the same time, this gas has a variable cost in Ether, Ether that is obtained by mining or buying it. The availability concept is linked with the anti-SPoF (anti-Single Point of Failure) concept. Preventing a SPoF is usually a mandatory requirement when it comes to critical applications and, which need to offer a high availability rate, and even not-so-critical ones. If this point of failure is exploited, accidentally or intentionally by an attacker, the whole ecosystem breaks down, so it’s interesting to be able to use resilient infrastructures, like Blockchain, to avoid this issue.

As for privacy, it is important not to confuse this concept with confidentiality, although they usually come hand in hand. In general, public blockchain networks bind transactions to accounts. These accounts are represented by a public-private key pair and may have a state associated with them, but they are not usually associated with an entity or individual. Only the individual in possession of the corresponding private key can launch a transaction on behalf of the account through a cryptographic signature, but the identity of the individual behind the key pair is unknown. In this way, a high degree of privacy is offered thanks to this pseudo-anonymity. Of course, there are identity management frameworks for blockchain, but these frameworks are not part of the core of a classic blockchain network.

One of the strong points of blockchain technologies is the transparency of transactions, a concept that in general is at odds with confidentiality (understood as encryption). Therefore, and except for specific blockchain technologies and private networks, blockchain does not provide encryption capabilities and this, if applies, must be implemented at the application level.

On the other hand, authorization is usually left to the application level in regular non-permissioned blockchain networks, while it can be part of the core of the technology in permissioned blockchain networks.

In short, we can conclude that blockchain is an extremely secure and resilient technology, but in general, does not include confidentiality (understood as encryption) among its main objectives.

3. Blockchain for backup and recovery

Having shown to the reader the blockchain capabilities as a secure ledger, this section wants to analyze blockchain as a support tool to implement back up and recovery strategies. We have chosen this use case because it shows differently another use of blockchain, far from the common ones which usually appear in the literature.

One of the most innovative applications of blockchain technologies is to use it by secure storage and recovery systems. A Backup & recovery system usually has the following features:

Continuous/Automatic data backup: It ensures that the changes you make to your files are simultaneously copied to the storage location. This lets you recover even the most recent changes in case of data loss, thus lowering your recovery point objective.

Incremental backup: This is a type of backup where only the changes are copied, not the full file. This reduces the time taken for copying data and does not slow down your work.

Instant recovery: This feature allows a backup snapshot to run temporarily on secondary storage to reduce the downtime of an application.

Data deduplication: It eliminates duplicate data record blocks while data is transferred to the backup storage location. This reduces the network load and the storage space you require.

Error-free copy: Data backup software features also ensure that the data copied from a source and stored at the backup server are the same and do not mismatch nor contain errors.

Historically, backup and recovery procedures were applied mainly to general-purpose devices in the enterprise environment. The number of incidents grows daily, and the consequences are increasingly alarming as, for example, security holes in IP cameras, DDOS attacks generated from the Mirai botnet known as Dyn Attack or event take control of a vehicle. Due to these problems, Backup & Recovery systems are being extended to cover these devices too.

3.1 General-purpose devices

From general-purpose systems, the main challenge that blockchain is expected to solve is the control data from tampering attacks; directly related to the integrity of the data.

We could find proprietary solutions that offer blockchain backup services at an enterprise level. This solution provides mechanisms to ensure that legal documents existed on certain dates or to certificate authenticity of medical records.

3.2 IoT devices

Most IoT systems are managed through firmware so ensuring the integrity and authenticity of the firmware update of the devices is a complex and critical task that must be carefully addressed. Also, multiple devices with their various subsystems may need to be updated urgently and simultaneously, for example, to apply a critical fix. Therefore, the high availability of updates is a requirement.

Most existing solutions for firmware upgrades depend on the client-server model in which the manufacturer delegates the firmware distribution process to the suppliers of its products. The central client-server architecture has the drawback to be a Single Point of Failure (SPOF), and in case the server is not available IoT devices cannot access resources (updates). There are two approaches: manual and automatic.

On the one hand, in the manual update process, the device owner must start the firmware update process. In general, this type of update is adopted by devices that have limited bandwidth, or directly it is the owner who decides to do it this way. However, the manual firmware update mechanism is not as efficient as the owner of the device must perform all operations manually. Also, there is a high probability that human error may occur during the firmware update process or that devices are outdated due to a lack of resources for updating.

On the other hand, the automatic updating seems more tempting to be adopted today. This way, the manufacturer of the IoT device could initiate the firmware update without the active participation of the device owner. The current automatic firmware update process uses the client-server architecture, where the repository of the provider is the server and the IoT device becomes the client-side. In general, there are two ways to deliver the firmware from the server to the client: PUSH and PULL methods. The differences between these two methods are in the initiator of the project firmware upgrade process. In the PUSH method, the device manufacturer starts the firmware update process by distributing the firmware binary file. In the PULL method, on the other hand, it is the IoT device that starts the firmware update process by sending a binary request to download the firmware to the server.

In, a blockchain-based firmware check and firmware update were proposed for IoT device systems. In the Lee and Lee scheme, the blockchain technology is used in your firmware proposal to verify the firmware version and the firmware authenticity file, as well as to distribute the firmware binary to the nodes connected to the network. Each IoT device is a network node, so each node must store all or part of the chain in its local storage, which means that only a few IoT devices can adopt this solution. So, the Lee and Lee proposition is not suitable for a heterogeneous IoT ecosystem.

In the application of blockchain technology was proposed to update the firmware of IoT devices from different vendors. In this solution, each IoT device must periodically probe any random node in the network to check the firmware version. When a device vendor publishes a new version of the firmware upgrade to the block network, the newly created firmware upgrade needs to be verified first by the network through a consensus protocol. When one of the IoT devices of the associated device vendor wants to perform the firmware upgrade process, the device must create a transaction for the firmware upgrade request. In this scheme, IoT devices would not be able to download the firmware from their corresponding vendor unless all nodes in the network have verified the associated firmware. In this solution, all network nodes must store all firmware that has been published on the network.

3.3 Distributed file system (DFS)

When we find use cases such as the previous ones that require a distributed storage it is necessary to resolve where to store the files and who can access them. Blockchain technology does not offer storage solutions and it is not a recommended practice to store files in the blockchain. A possible solution is the use of distributed storage systems, like the decentralized P2P file storage systems. When using this kind of storage, files are divided into pieces that are replicated in different peers. A peer requiring access to an archive collects pieces of this archive, which is partially located in several peers at a time. The performance is similar to that of the P2P BitTorrent network and files are indexed by their hash or fingerprint.

As the main solution for implementing this kind of storage is to use IPFS. IPFS is a decentralized hypermedia P2P protocol that allows the storage of distributed files dividing the files in chunks and replicating them in the peers that require them. When a file is downloaded, chunks are collected from different sources at the same time. Each file is identified and accessed through its hash or fingerprint. IPFS is the basis of Filecoin, a distributed storage network based on Blockchain. This network basically integrates IPFS in a specific Blockchain network for data storage in which the nodes get tokens as payment for the storage service provided (and the customers pay them). As for privacy and access control, the IPFS protocol does not include any encryption mechanism or access control. It is up to the client or DApp to encrypt each file before sharing the archive to prevent its disclosure to third parties, which is not a very versatile and interoperable solution either.

In short, IPFS provides distributed and decentralized storage of large files with a certain degree of resilience, integrity, and very high availability. By storing in the Blockchain the hash of the files, which occupies only a few bytes, both systems are linked and the integrity of the file is guaranteed.

4. Blockchain and content delivery networks (CDN)

Another interesting use case, maybe not so known as the previous one, is the application of blockchain strategies to content delivery networks. These networks are widely used nowadays, so we have considered that they are a good example of how we can use blockchain to add value to existent processes or technologies.

4.1 Introducing the content delivery networks

A Content Delivery Network (CDN) consists of an overlapped network of computers containing different copies of the same set of data. The objective of its creation is to maximize the bandwidth available in service to improve, as far as possible, the availability and access to data.

A client accesses one of the copies of the data. By providing information replicas and bringing closer the node that provides the service, the response time should be improved, and service outages avoided. But, how does that affect the information a customer can see? The Byzantine Generals Problem enunciated by establishes that the components of a distributed computing system may fail, reaching a condition of imperfect information. In this situation, an observer could have different information depending on unnoticed facts, like the server consulted or the client’s location. A different observer could have different information for the same service consulted if an inconsistent CDN state is making the network to fail in its responses. A consensus regarding which component has failed in the first place and which information is trustworthy would make things easier.

Before the emergence of Blockchain and the definition of the Distributed Ledger Technologies, it was already possible to find collaborative networks that allowed greater resistance to targeted attacks, such as DDoS. But it was difficult to incentivize a participant to offer their computing power to these networks. This lack of ability to attract new collaborators made the network growth very difficult and undermined the power of defense systems. Blockchain, as a new concept of a distributed system, allows giving a reward to the participants who take part in the improvement of a security system.

In addition to its application in cybersecurity, it is also possible to find deployments of CDNs with other purposes such as databases and DNS services, either privately or collaboratively. But they can also offer other different services such as the exchange of multimedia files or the distribution of software.

As stated by, the distribution of services is thought of as a solution to the problem presented by a centralized service. The distributed nature of blockchain allows these services to be decentralized. The characteristics obtained are common to both approaches, of which the most important and their counterpart are listed below.

The load on each server is lowered, but the number of servers of the system is increased.

The network traffic is distributed, but the information needs to be synchronized.

The latency is diminished, and the bandwidth increased, in exchange for a higher maintenance cost.

In short, the use of CDNs adds some advantages, but it also increases the complexity of the architecture. Several aspects are affected by the need for offering copy mirrors and closer access to the client. The original server must have substitutes to ensure the high availability of the service. On the other hand, it is necessary to ensure the consistency of the data served. As there are several geographically distributed machines, which theoretically have the same information at all times, synchronization problems may arise.

Additionally, there must be a constant internal routing service to find all nodes in the network, to synchronize information internally, and to provide better customer service externally. Furthermore, all these mechanisms are based on a record of user accesses and server use that improves the quality of service but generates an additional cost in computing and storage.

4.2 Use cases

Usually, actors such as data centers, mobile operators, digital advertising companies, or online music providers, act as clients for companies like ISPs, media, or news agencies, which distribute their content using this type of system.

One well known and widely used example for distributed data management is the peer-to-peer exchange of torrent files. The BitTorrent protocol defined by uses computer networks that simultaneously and in a decentralized manner upload and download content over the network. But these exchanges are made without order or agreement on what content is propagated. What if we established a mechanism for the verification and validation of the exchanges? What if in addition to data we could transfer value? What if each of these participants could execute a business logic accepted by all?

Cybersecurity is a fundamental aspect of the industry at a global level. In modern times much media attention is being given to attacks that appear and cause serious damage all over the world. It is curious that so many systems are affected by security breaches, because a indicates the attack vectors have not changed in the last 20 years.

Although there are mechanisms for distributing content before Blockchain, all the defense systems offered by security companies are, to a greater or lesser extent, centralized. In contrast, attacks are distributed. This fact already places the defenders in an initial disadvantageous situation.

A Blockchain-based defense would behave like Uber or like carsharing: in these two examples, the goal is to take advantage of resources that are normally underused for most of the vehicle’s useful life, whereas when it comes to blockchain, the goal is to be able to use the computation of a data center that is not being used at a specific time. Resources could be rented from other network members and used to manage a powerful coordinated defense system. All of this without affecting the other computer owners when they need to use their resources.

Notice that a Blockchain solution is intended to record changes of ownership, different states of information, etc. that happen between two or more parties. Both the origin and the destination are known, although in many implementations of Blockchain it is only pseudonymous. And the execution of each one of these changes is deterministic, meaning that it will end with the same result regardless of who executes it within the network.

Coming back to the BitTorrent example, the question is if it is possible to be sure that the content offered by another user will always be available and whether any user should offer me the same content. The answer is no. And this is what will be changed by using Blockchain.

4.3 The great leap

Blockchain has revolutionized the Fintech world as we know it today. Revolutionizing content distribution could be its next goal. The big bet is the decentralization of services and the suppression of a single trust entity, relying on the system operation on distributed services.

To leverage the Blockchain capabilities and create a CDN that is truly disruptive, a method has been sought to obtain good latencies, and also to allow p2p files to be exchanged securely, without requiring an external auditor.

Using Blockchain can improve fundamental aspects of computational efficiency. Businesses adopting Blockchain could save on infrastructure and gain greater flexibility in the services they offer. Besides, related aspects such as scalability, security, reliability, and performance could be improved. But as explained above, Blockchain also requires a physical network, software, and security procedures to allow it to operate properly.

The method that will achieve the best result is the simplest in its conception. It consists of taking successful projects and arranging them in such a way that they work in an ideal flow. In other words, it is the creation of nodes that participate collaboratively in a large resilient network of file exchanges as in BitTorrent, using hash tables as explained in about Kadmelia, and versioning the contents like Git. Everything is self-certified by the network itself.

Storj, the before-mentioned IPFS, DECENT, or BlockCDN are some of the initiatives that are based on the distribution of contents that Blockchain offers to create new horizons in the CDN ecosystem. These solutions take advantage of storage times, downloads, or bandwidth to boost their businesses. This means that the creators of these systems, with very different market viewpoints, can encourage users to adopt the network that each one promotes. These networks are focused on the needs of the user and reward participants for maintaining the network, without the need for a trusted third party to intervene to control all of them.

This is how the concept of “distribution” is being reinvented in the Content Distribution Networks. Content transparency and user privacy begin a new path together.

5. Blockchain for threat intelligence

Another interesting use case for blockchain is threat intelligence. As written in, threat intelligence is an advanced process that involves gathering valuable insights including mechanisms, context, indicators, actionable advice, and implications about an emerging or existing cyberthreat. Threat intelligence processes must be adapted to a company ecosystem to integrate it properly.

One of the issues related to threat intelligence these days is that companies usually spend a lot of time researching the same threats, while others are unnoticed. As a consequence, new tendencies emerge, being now crucial to be able to share information between different interested parties. Following this principle, different companies can share information about threats to benefit each other. In the end, a distributed ledger of shared information is the ultimate goal of the threat intelligence philosophy.

Decentralization in the threat management ecosystem is not new at all. Previous works, as, study decentralization strategies applied to threat intelligence use cases. Others, like, propose a shared infrastructure to implement a threat intelligence solution. With decentralization, a single view of data, and information shared concepts, blockchain comes into mind. Synchronization between different parties is also a crucial requirement, which is naturally made by blockchain due to its peer-to-peer-oriented architecture, as stated before.

When discussing the application of blockchain for threat intelligence use cases, Smart Contracts are a good asset too. For clarification, a Smart Contract is a computer program shared between nodes in a network that can be executed by all of them with a deterministic output. This piece of code allows us to verify, enforce, or perform specific actions that can be audited so everyone knows the logical flow of the system. In other words, everyone is aware of the system functioning and is enforced to comply with it. Furthermore, the consensus is presented as a mechanism to guarantee synchronization between all the nodes. The aforementioned Smart Contracts enable high-level computations far from traditional distributed architectures focused on only-sharing information. Also, we can ever think more philosophically and say blockchain is a more futuristic solution because it allows us to create networks controlled by no-one, but verifiable by everyone.

As an example, specifically focusing on healthy ecosystems, a European initiative is trying to implement a blockchain-based Threat Management platform, which is the SPHINX Project. In this project, health IoT devices within different medical centers share information about different threats ideally affecting the same ecosystem. Different components, within the scope of the same project, read from the same registry, so all of them have a single view of the data. This is one step forward in decentralization and information sharing solving a very specific problem applied to a very specific scenario. Focusing on the blockchain infrastructure, it acts as a BaaS (Blockchain as a Service), whose nodes are in different medical centers and the different IoT devices act as the users of this shared platform. This is a very clear example of how we can use Blockchain to solve a threat management problem wisely.

On the other hand, when it comes to other general cybersecurity solutions, blockchain can add some additional value to the traditional systems. For example, a very interesting use case is the distributed intrusion detection systems. However, these distributed intrusion detection systems are far from being fully secure as shown in, where the authors study the vulnerabilities that affect these systems. Blockchain can work as a distributed intrusion detection system, as shown in, avoiding the need to trust in third parties. It can also be very useful to detect some zero-days attacks in industrial environments by doing what we have named “log comparison”, which basically consists of comparing different logs from different devices against the ones stored in a Blockchain infrastructure. When an attacker breaks into a system, one of the first things he usually does is to delete every proof of his presence, so he usually tries to delete every log which can link him with a particular incident. By having a trusted anti-tampering infrastructure, we can detect almost in real-time if a system has been compromised or not just comparing the logs in the system with the ones stored in the Blockchain, which are immutable “by design”. It is important to mention that Blockchain grows very fast in the disk, but storing just simple information, like log hashes, for example, we can easily overcome this issue.

No just focusing on pure threat intelligence, rather than monitoring activities, some studies apply blockchain to enhance logging systems. One of the first examples is, written by some members of the University of La Sapienza in Rome and the University of Southampton, tries to find a solution to the European project Sunfish based on a distributed database which provides integrity and stability to the data, analyses the advantages and disadvantages of using this tool by implementing cloud computing. Nokia Bell Labs published a small report in which it proposes to make use of private and permissioned blockchains instead of public ones to manage the logs, in this case, it focused on information related to banks. As mentioned in the paragraph before, storing logs can be problematic. As a consequence, working with hashes is wiser, because it is always possible to get the integrity of the data without affecting blockchain the disk usage excessively.

To sum up, blockchain comes up when sharing information between different parties is a matter. Whether if we want to identify the issuers of this information or if we want to anonymize them, different blockchain technologies can help us to achieve these requirements.

6. Conclusions

As we have read, blockchain is much more than just cryptocurrencies. It is possible to build a vast number of use cases by using blockchain as a trusted infrastructure due to its security properties. In this document, we have shown several of these use cases, all of them security-related may be unknown for the reader and different from the now-trendy cryptocurrencies trading.

As far as we dig into the blockchain technology, we become more aware of its possibilities, ranging a huge spectrum of functionalities and covering various use cases in different fields, such as industry, health, finances… although this document has enlightened only the ones concerning the security field.

However, the future is continuously changing, and blockchain technologies are not the panacea for every problem in the world. The emergence of the so-called blockless technologies is a challenge for the blockchain technology itself, because they present a different way to achieve almost the same security requirements of the blockchain technologies, but trying to overcome its issues, such as latency and fees. The subsequent years will decide which ones of these technologies take advantage of the rest of them, but the decision does not seem to be easy.

What is Fireblock?

Fireblock allows distributed files to be trusted in their integrity and ownership by any of their users. To do this, we need: - To allow any author to create a trusted checkable certificate of ownership. - To allow any author to provide his users with an easy tool to verify origin and ownership of his files i.e his certificate. A file’s certificate of ownership contains: - A proven integrity of the file - A proven and verifiable identity - A proven link between the file and the identity - A timestamp - Tamper-proof properties We design integrity with hash functions and ownership with digital signatures and proven social identities. We package them together in a certificate. We detail here how we designed Fireblock.

#hope it's helpful to u...please consider my effort and give me a like....thank u....


Related Solutions

Instructions Research Topic Selection: Virtual Reality for business collaboration (e.g. Rumii is a software) Blockchain for...
Instructions Research Topic Selection: Virtual Reality for business collaboration (e.g. Rumii is a software) Blockchain for business security (e.g. Fireblocks is an app) Machine Learning for business predictions and decisions (e.g. SPSS is a software) Cloud Computing for business help desk support (e.g. Salesforce is a software) Select one out of the four research topics indicated above to create a professional PowerPoint presentation with audio-recorded narrative. Your PowerPoint submission should be 15 to 20 minutes long and covers at the...
research emerging wearable technology and develop a PowerPoint proposal on taking a non-healthcare related technology and...
research emerging wearable technology and develop a PowerPoint proposal on taking a non-healthcare related technology and using it or adapting it to meet the needs of patients with health needs.
To what extent will these emerging technology (blockchain and genetically modified organisms (GMOs)) foster sustainability practices...
To what extent will these emerging technology (blockchain and genetically modified organisms (GMOs)) foster sustainability practices on the economy in Mexico?
To what extent will these emerging technology (blockchain and genetically modified organisms (GMOs)) foster sustainability practices...
To what extent will these emerging technology (blockchain and genetically modified organisms (GMOs)) foster sustainability practices on the economy in Mexico?
what is Blockchain technology, and how can it be used in organizations and industries to create...
what is Blockchain technology, and how can it be used in organizations and industries to create value?
Unit III PowerPoint Presentation Imagine that you are a member of the health professional information technology...
Unit III PowerPoint Presentation Imagine that you are a member of the health professional information technology (IT) innovation council in a community hospital system. The council is exploring the use of smartphones as a support for recently discharged patients with chronic illnesses. Healthcare professionals will be readily available by phone for a patient if he or she has questions or concerns regarding treatments or medications. Consequently, the patient will not have to schedule office visits each time it is necessary...
This is the topic .professional development of hospitals .Introduce the topic Create a SMART goal for...
This is the topic .professional development of hospitals .Introduce the topic Create a SMART goal for your topic  - what should the learner achieve?
Create PowerPoint presentation slides on the following topic “Electronic waste management in China “
Create PowerPoint presentation slides on the following topic “Electronic waste management in China “
Research report on the topic : "Communication Technology in the Past'.
Research report on the topic : "Communication Technology in the Past'.
Students will create a 2 – 3-page infographic summarizing the effects of an emerging technology on...
Students will create a 2 – 3-page infographic summarizing the effects of an emerging technology on business and accounting. The objective of this assignment is to familiarize yourself with a variety of emerging data and technology topics and their importance to accounting. Before completing this assignment, make sure to read the documents related to ‘Data Analytics Mindset’ in the Week 5 Documents & Resources folder. An analytics mindset is the ability to: Ask the right questions Extract, transform, and load...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT