Imagine a computing platform with no In 2009, Bitcoin became the first real-world application of blockchain, a secure, decentralized currency exchange that eliminated the need for a central broker. Today, the potential of blockchain technology is being recognized in other areas as well. Blockchain represents the culmination of decades of research and breakthroughs in cryptography and security, offering a radically different approach to storing information and performing functions, which makes it particularly suitable for environments with high security requirements and where the identities of participants are unknown to each other. The concept has been used in a number of innovative ways to improve network security and protect organizations and applications from cyberattacks. Preventing data manipulation and fraudOne of the main features of blockchain is immutability. The use of hashing and cryptography, combined with a decentralized structure, makes it impossible for any party to unilaterally change the data on the blockchain ledger. This feature can be used by organizations that need to handle sensitive information to maintain data integrity and prevent and detect any form of tampering. Data security startup Guardtime is now betting on blockchain technology and is using it to protect sensitive records. The company has used blockchain to create a keyless signature infrastructure (KSI) to replace the existing more traditional public key infrastructure (PKI), which uses asymmetric encryption and a public key cache and is maintained by a centralized certification authority (CA). Guardtime CTO Matthew Johnson believes that while PKI technology is suitable for digitally signing software, firmware and network configurations, it was never designed to verify data. Johnson said:
In contrast, rather than relying on secrets (keys), blockchain-based security is premised on distributing evidence to various institutions, making it impossible to delete and manipulate the data. Johnson explained:
KSI verifies data integrity by running a hash function and comparing the result with the initial metadata stored on the blockchain. Johnson said:
KSI has been considered by some organizations, such as the Defense Advanced Research Projects Agency (DARPA), an agency under the US Department of Defense, which is considering using KSI to protect sensitive military data, and the Estonian e-Health Foundation, which also intends to use the technology to protect millions of medical records. Preventing Distributed Denial of Service (DDoS) attacksOn October 21, 2016, millions of users in the United States were cut off from access to many large websites, such as Twitter, PayPal, Netflix, and Spotify. The reason was: the servers of DNS service provider Dyn suffered a massive DDoS attack. This incident warns us that the weaknesses of the current network backbone will become a bottleneck and single point of failure, involving millions or even tens of millions of users and nodes. Philip Saunders, founder of Nebulis, a distributed DNS system, said:
Saunders believes blockchain offers a solution — a decentralized system that makes it nearly impossible for infrastructure to collapse due to excessive demands. Nebulis uses the Ethereum blockchain and the InterPlanetary File System (IPFS), a distributed alternative to the centralized HTTP infrastructure, to protect its DNS infrastructure from DDoS attacks.
According to Saunders, using blockchain, you can read directly from your own copy without having to pay on the network. He said:
Prevent data theft in untrusted environmentsData encryption has become a norm in various industries today. However, when you want to use this data, you must decrypt it and display the data content. Guy Zyskind, CEO and founder of Enigma, said:
Another problem is that we live in an age of cloud computing and on-demand services, where untrusted third parties are able to access and process our data.
The Enigma platform enables different participants to jointly store data and run computations while maintaining complete privacy. The platform uses blockchain technology to record events and file hashes with timestamps, thus preventing attackers from hiding their tracks if they manipulate data. Additionally, Enigma uses multi-party computation (MPC), a cryptographic technique that performs computations by distributing data and tasks among multiple untrusted parties and ensuring that each party has partial access to the data. Zyskind explained:
According to Zyskind, this combination not only prevents data from being tampered with, but also protects it from falling into the wrong hands. He said:
This system is suitable for institutions that cannot directly share data but need to perform joint operations. Potential use cases include simple tasks such as bookkeeping, aggregation, and generating simple statistics. It can also be used to train machine learning models on encrypted datasets owned by different institutions. Enigma can also be used for fraud detection, where organizations can jointly execute fraud detection algorithms on their encrypted data without compromising privacy. Blockchain and the future of cybersecurityBlockchain offers a fundamentally different approach to cybersecurity that goes beyond the endpoint to include user identity security, transaction and communication security, and protection of critical infrastructure to support the operations of a wide range of organizations. The paradigm shift brought about by blockchain, which enables transparency and auditability, will enable us to make the most of shared online services while eliminating potential security and privacy trade-offs. |
<<: OCC Banking Charter Will Provide Bitcoin Exchanges with Special Banking Status
The first two-way Bitcoin ATM (commonly known as ...
Author's note: There are many pitfalls and ri...
There are many different palm lines on our palms,...
Every person around the world has some moles on t...
Moles can be divided into broad and narrow meaning...
Moles can be divided into broad and narrow meaning...
It is said that everything is determined by fate ...
People often say that good things come to those w...
Moles can appear anywhere on our body, and the pl...
In physiognomy, if a mole grows on the shoulder n...
On the evening of March 25, Zhikuang University o...
The 12th House of Physiognomy: The House of Migra...
There are no two leaves in the world that are exa...
If a person cannot control his emotions well, he ...
In physiognomy, the ear is called the organ of he...