SlideShare a Scribd company logo
1 of 10
Download to read offline
Blockchain's Role
in Data Security
Presentated by Avinash Kumar Dubey
31st October 2023
AVINASH KUMAR DUBEY
I have done MS in Artificial intelligence
and Machine Learning from Arizona
University US. I have 15 + years of
experience in Webrtc, tele
communication using webrtc, E-
commerce, health tech, ed tech and
enterprise saas space. I have worked
across multiple technology stacks like
.net, c#, java, nodejs.
WHY WE NEED TO UNDERSTAND THE AGENDA?
Understanding blockchain in cybersecurity is critical today due
to increasing cyber threats. Blockchain's decentralized,
tamper-resistant nature enhances data security,
authentication, and trust. It's a vital tool in safeguarding digital
assets and privacy in an increasingly interconnected world.
Blockchain Basics
OUTLINE FOR
PRESENTATION
Cybersecurity Challenges
Blockchain Solutions
Use Cases
Conclusion
Blockchain basics?
Blockchain is a shared, decentralized, and digital ledger that
records transactions in the form of blocks. This ledger helps to
store information transparently due to its property of
immutability and access to allowed members only.
• Distributed shared ledger.
• Immutable records.
• Decentralized consensus mechanisms.
• Smart contracts.
• Cryptographic key pair.
• Identity and access management.
• Enhanced security.
• Peer to peer network.
• Traceability and transparency in transactions.
• No central authority or need for trusted third-party involvement.
Key Blockchain
Features:
Elements that help blockchain support data privacy
• Blocks and hashing
⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body.
• Distributed architecture
⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it
impossible for the attackers to target the data.
• Consensus validation
⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward.
• Encryption
⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node.
• Public addresses
⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People
on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
Elements that help blockchain support data privacy
• Blocks and hashing
⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body.
• Distributed architecture
⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it
impossible for the attackers to target the data.
• Consensus validation
⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward.
• Encryption
⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node.
• Public addresses
⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People
on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
Security Usecases
• Secure messaging
⚬ An example of this can be seen in the Wispr app which is built on the VOBP (Voice Over Blockchain Protocol)
security system that employs encryption protocols like AES – 256, making it impossible for third-party users to see
the messages.
• IOT Security
⚬ Enabling a real-time tracking of connected devices and sensor data,
⚬ Looking for content duplicacy from harmful data sources
⚬ Embedding consensus algorithms to ensure identity verification.
⚬ Encrypting the information that gets transmitted between the devices on the network.
⚬ Decentralizing the central admin or authority.
• Secure DNS & DDOS
⚬ DNS attacks happen due the centralized nature of the Domain Name System making it ideal for attackers to
infiltrate the connection between the website and IP address.
• Immutable data storage
⚬ Decentralized network within a transparent system where only the people who have the access to the data can
view or use it.
Security Usecases
• Ownership validation
⚬ The blockchain data privacy solution to this can be found in creating immutable record of authenticity, performing
KYC, and having cryptographic keys to eliminate plagiarism of documents.
⚬ Data minimization
⚬ Identity theft elimination
⚬ Sensitive data protection
⚬ Multisignature access control.

More Related Content

Similar to Blockchain's Role in Data Security.pptx

BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.Rajasekhar364622
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptjishnub8
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewGokul Alex
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinM Shamim Iqbal
 
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEEcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEJohn Lilic
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 
Crypto Space
Crypto SpaceCrypto Space
Crypto SpaceNinaJess1
 
Blockchain Smart Manufacturing .pdf
Blockchain Smart Manufacturing .pdfBlockchain Smart Manufacturing .pdf
Blockchain Smart Manufacturing .pdfJohnWard824710
 
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxUnlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxAnalog3
 

Similar to Blockchain's Role in Data Security.pptx (20)

BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain
BlockchainBlockchain
Blockchain
 
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEEcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Crypto Space
Crypto SpaceCrypto Space
Crypto Space
 
Blockchain Smart Manufacturing .pdf
Blockchain Smart Manufacturing .pdfBlockchain Smart Manufacturing .pdf
Blockchain Smart Manufacturing .pdf
 
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxUnlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
 

Recently uploaded

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 

Recently uploaded (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 

Blockchain's Role in Data Security.pptx

  • 1. Blockchain's Role in Data Security Presentated by Avinash Kumar Dubey 31st October 2023
  • 2. AVINASH KUMAR DUBEY I have done MS in Artificial intelligence and Machine Learning from Arizona University US. I have 15 + years of experience in Webrtc, tele communication using webrtc, E- commerce, health tech, ed tech and enterprise saas space. I have worked across multiple technology stacks like .net, c#, java, nodejs. WHY WE NEED TO UNDERSTAND THE AGENDA? Understanding blockchain in cybersecurity is critical today due to increasing cyber threats. Blockchain's decentralized, tamper-resistant nature enhances data security, authentication, and trust. It's a vital tool in safeguarding digital assets and privacy in an increasingly interconnected world.
  • 3. Blockchain Basics OUTLINE FOR PRESENTATION Cybersecurity Challenges Blockchain Solutions Use Cases Conclusion
  • 4.
  • 5.
  • 6. Blockchain basics? Blockchain is a shared, decentralized, and digital ledger that records transactions in the form of blocks. This ledger helps to store information transparently due to its property of immutability and access to allowed members only. • Distributed shared ledger. • Immutable records. • Decentralized consensus mechanisms. • Smart contracts. • Cryptographic key pair. • Identity and access management. • Enhanced security. • Peer to peer network. • Traceability and transparency in transactions. • No central authority or need for trusted third-party involvement. Key Blockchain Features:
  • 7. Elements that help blockchain support data privacy • Blocks and hashing ⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body. • Distributed architecture ⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it impossible for the attackers to target the data. • Consensus validation ⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward. • Encryption ⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node. • Public addresses ⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
  • 8. Elements that help blockchain support data privacy • Blocks and hashing ⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body. • Distributed architecture ⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it impossible for the attackers to target the data. • Consensus validation ⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward. • Encryption ⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node. • Public addresses ⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
  • 9. Security Usecases • Secure messaging ⚬ An example of this can be seen in the Wispr app which is built on the VOBP (Voice Over Blockchain Protocol) security system that employs encryption protocols like AES – 256, making it impossible for third-party users to see the messages. • IOT Security ⚬ Enabling a real-time tracking of connected devices and sensor data, ⚬ Looking for content duplicacy from harmful data sources ⚬ Embedding consensus algorithms to ensure identity verification. ⚬ Encrypting the information that gets transmitted between the devices on the network. ⚬ Decentralizing the central admin or authority. • Secure DNS & DDOS ⚬ DNS attacks happen due the centralized nature of the Domain Name System making it ideal for attackers to infiltrate the connection between the website and IP address. • Immutable data storage ⚬ Decentralized network within a transparent system where only the people who have the access to the data can view or use it.
  • 10. Security Usecases • Ownership validation ⚬ The blockchain data privacy solution to this can be found in creating immutable record of authenticity, performing KYC, and having cryptographic keys to eliminate plagiarism of documents. ⚬ Data minimization ⚬ Identity theft elimination ⚬ Sensitive data protection ⚬ Multisignature access control.