Privacy Requirements in Cybersecurity Applications of Blockchain

Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity appl...

Full description

Bibliographic Details
Main Authors: Axon, L, Goldsmith, M, Creese, S
Format: Book section
Published: Elsevier 2018
_version_ 1797059250373001216
author Axon, L
Goldsmith, M
Creese, S
author_facet Axon, L
Goldsmith, M
Creese, S
author_sort Axon, L
collection OXFORD
description Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties, yet many of the potential applications have complex requirements for privacy. Privacy-enabling approaches for Blockchain have been introduced, such as private Blockchains, and methods for enabling parties to act pseudonymously, but it is as yet unclear which approaches are suitable in which applications. We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer.
first_indexed 2024-03-06T20:01:30Z
format Book section
id oxford-uuid:2774b475-3573-4af0-988c-1f37277471ca
institution University of Oxford
last_indexed 2024-03-06T20:01:30Z
publishDate 2018
publisher Elsevier
record_format dspace
spelling oxford-uuid:2774b475-3573-4af0-988c-1f37277471ca2022-03-26T12:07:04ZPrivacy Requirements in Cybersecurity Applications of BlockchainBook sectionhttp://purl.org/coar/resource_type/c_3248uuid:2774b475-3573-4af0-988c-1f37277471caSymplectic Elements at OxfordElsevier2018Axon, LGoldsmith, MCreese, SBlockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties, yet many of the potential applications have complex requirements for privacy. Privacy-enabling approaches for Blockchain have been introduced, such as private Blockchains, and methods for enabling parties to act pseudonymously, but it is as yet unclear which approaches are suitable in which applications. We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer.
spellingShingle Axon, L
Goldsmith, M
Creese, S
Privacy Requirements in Cybersecurity Applications of Blockchain
title Privacy Requirements in Cybersecurity Applications of Blockchain
title_full Privacy Requirements in Cybersecurity Applications of Blockchain
title_fullStr Privacy Requirements in Cybersecurity Applications of Blockchain
title_full_unstemmed Privacy Requirements in Cybersecurity Applications of Blockchain
title_short Privacy Requirements in Cybersecurity Applications of Blockchain
title_sort privacy requirements in cybersecurity applications of blockchain
work_keys_str_mv AT axonl privacyrequirementsincybersecurityapplicationsofblockchain
AT goldsmithm privacyrequirementsincybersecurityapplicationsofblockchain
AT creeses privacyrequirementsincybersecurityapplicationsofblockchain