2. AVINASH KUMAR DUBEY
I have done MS in Artificial intelligence
and Machine Learning from Arizona
University US. I have 15 + years of
experience in Webrtc, tele
communication using webrtc, E-
commerce, health tech, ed tech and
enterprise saas space. I have worked
across multiple technology stacks like
.net, c#, java, nodejs.
WHY WE NEED TO UNDERSTAND THE AGENDA?
Understanding blockchain in cybersecurity is critical today due
to increasing cyber threats. Blockchain's decentralized,
tamper-resistant nature enhances data security,
authentication, and trust. It's a vital tool in safeguarding digital
assets and privacy in an increasingly interconnected world.
6. Blockchain basics?
Blockchain is a shared, decentralized, and digital ledger that
records transactions in the form of blocks. This ledger helps to
store information transparently due to its property of
immutability and access to allowed members only.
• Distributed shared ledger.
• Immutable records.
• Decentralized consensus mechanisms.
• Smart contracts.
• Cryptographic key pair.
• Identity and access management.
• Enhanced security.
• Peer to peer network.
• Traceability and transparency in transactions.
• No central authority or need for trusted third-party involvement.
Key Blockchain
Features:
7. Elements that help blockchain support data privacy
• Blocks and hashing
⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body.
• Distributed architecture
⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it
impossible for the attackers to target the data.
• Consensus validation
⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward.
• Encryption
⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node.
• Public addresses
⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People
on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
8. Elements that help blockchain support data privacy
• Blocks and hashing
⚬ Blockchain stores data in the blocks – ones that are time stamped, signed by the creators and carry a header and a body.
• Distributed architecture
⚬ As it follows a distributed architecture with no single point of failure. The risk gets dispersed across multiple nodes on a geographically wide network, making it
impossible for the attackers to target the data.
• Consensus validation
⚬ Any modification in the block would require different authorized members to reach a consensus whether the change should be taken forward.
• Encryption
⚬ Uses two kinds of encryption, each with their share of subsets and branches – asymmetric-key algorithms, and hash functions across every node.
• Public addresses
⚬ In Blockchain, every node consists of a private key and public address. So when a node takes part in any transaction only the public address gets shared. People
on the network are able to see the transaction and the combination of letter and number but not the details that are stored in the private key.
9. Security Usecases
• Secure messaging
⚬ An example of this can be seen in the Wispr app which is built on the VOBP (Voice Over Blockchain Protocol)
security system that employs encryption protocols like AES – 256, making it impossible for third-party users to see
the messages.
• IOT Security
⚬ Enabling a real-time tracking of connected devices and sensor data,
⚬ Looking for content duplicacy from harmful data sources
⚬ Embedding consensus algorithms to ensure identity verification.
⚬ Encrypting the information that gets transmitted between the devices on the network.
⚬ Decentralizing the central admin or authority.
• Secure DNS & DDOS
⚬ DNS attacks happen due the centralized nature of the Domain Name System making it ideal for attackers to
infiltrate the connection between the website and IP address.
• Immutable data storage
⚬ Decentralized network within a transparent system where only the people who have the access to the data can
view or use it.
10. Security Usecases
• Ownership validation
⚬ The blockchain data privacy solution to this can be found in creating immutable record of authenticity, performing
KYC, and having cryptographic keys to eliminate plagiarism of documents.
⚬ Data minimization
⚬ Identity theft elimination
⚬ Sensitive data protection
⚬ Multisignature access control.