Privacy Requirements in Cybersecurity Applications of Blockchain
Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity appl...
Main Authors: | , , |
---|---|
Format: | Book section |
Published: |
Elsevier
2018
|
_version_ | 1797059250373001216 |
---|---|
author | Axon, L Goldsmith, M Creese, S |
author_facet | Axon, L Goldsmith, M Creese, S |
author_sort | Axon, L |
collection | OXFORD |
description | Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties, yet many of the potential applications have complex requirements for privacy. Privacy-enabling approaches for Blockchain have been introduced, such as private Blockchains, and methods for enabling parties to act pseudonymously, but it is as yet unclear which approaches are suitable in which applications. We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer. |
first_indexed | 2024-03-06T20:01:30Z |
format | Book section |
id | oxford-uuid:2774b475-3573-4af0-988c-1f37277471ca |
institution | University of Oxford |
last_indexed | 2024-03-06T20:01:30Z |
publishDate | 2018 |
publisher | Elsevier |
record_format | dspace |
spelling | oxford-uuid:2774b475-3573-4af0-988c-1f37277471ca2022-03-26T12:07:04ZPrivacy Requirements in Cybersecurity Applications of BlockchainBook sectionhttp://purl.org/coar/resource_type/c_3248uuid:2774b475-3573-4af0-988c-1f37277471caSymplectic Elements at OxfordElsevier2018Axon, LGoldsmith, MCreese, SBlockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties, yet many of the potential applications have complex requirements for privacy. Privacy-enabling approaches for Blockchain have been introduced, such as private Blockchains, and methods for enabling parties to act pseudonymously, but it is as yet unclear which approaches are suitable in which applications. We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer. |
spellingShingle | Axon, L Goldsmith, M Creese, S Privacy Requirements in Cybersecurity Applications of Blockchain |
title | Privacy Requirements in Cybersecurity Applications of Blockchain |
title_full | Privacy Requirements in Cybersecurity Applications of Blockchain |
title_fullStr | Privacy Requirements in Cybersecurity Applications of Blockchain |
title_full_unstemmed | Privacy Requirements in Cybersecurity Applications of Blockchain |
title_short | Privacy Requirements in Cybersecurity Applications of Blockchain |
title_sort | privacy requirements in cybersecurity applications of blockchain |
work_keys_str_mv | AT axonl privacyrequirementsincybersecurityapplicationsofblockchain AT goldsmithm privacyrequirementsincybersecurityapplicationsofblockchain AT creeses privacyrequirementsincybersecurityapplicationsofblockchain |