IDENTIFICATION OF VARIABLES RELATED TO COMPUTER SECURITY FROM THE BLOCKCHAIN APPLICATION

Authors

DOI:

https://doi.org/10.33571/rpolitec.v20n40a1

Keywords:

Blockchain, computer security, cybersecurity, information security, cyber attacks

Abstract

The protection of data and information has become a fundamental pillar for both people and organizations. With the increasing dissemination, appropriation and literacy regarding the use of information and communication technologies, as well as the need that arises regarding their use in different contexts, data are increasingly available to community. This has become an aspect of discussion due to the fragility of the different information systems that can allow the exposure of sensitive and personal information. Therefore, the objective of this work is to identify the variables related to computer security from the application of blockchain through a systematic literature review. Among the main results is the application of different artificial intelligence techniques and Robotic Process Automation (RPA) in the blockchain ecosystem.

Article Metrics

 Abstract: 218  PDF (Español (España)): 110 

PlumX metrics

References

C. Pastorino, “Blockchain: qué es y cómo funciona esta tecnología,” ESET.

IBM, “¿Qué es la seguridad de blockchain?,” La seguridad de blockchain es un sistema integral de gestión de riesgos para una red de blockchain, que utiliza estructuras de ciberseguridad, servicios de garantía y mejores prácticas para reducir los riesgos contra ataques y fraudes.

SAP, “¿Qué es la tecnología de blockchain?,” El blockchain es un registro digital descentralizado de transacciones compartidas entre una red que es inmutable o inmodificable. Usa algo llamado “tec-nología de ledger distribuido”.

D. , & T. A. Tapscott, Blockchain revolution, Senai-SP Editora. 2018.

A. Bartolomé, “Cambiando el futuro ‘blockchain’ y Educación,” Comunicación y Pedagogía: nuevas tecnologías y recursos didácticos, vol. 303–304, pp. 7–12, 2017.

P. Rivera and C. Lindin, “Blockchain en Educación. Entre la búsqueda de seguridad en el mundo digital y el determinismo tecnológico,” Revista de la educación superior, vol. 27, 2020.

A. Wright and P. De Filippi, “Decentralized Blockchain Technology and the Rise of Lex Cryptograph-ia,” SSRN Electronic Journal, 2015, doi: 10.2139/ssrn.2580664.

Hacknoid, “Estadísticas Ciberseguridad Mayo 2023 | Lo que debes saber,” En este artículo te con-tamos los principales acontecimientos de ciberseguridad de mayo 2023. Qué sectores se vieron más afectados y qué nuevas leyes y resoluciones han surgido.

Fortinet, “Informe global sobre el ransomware 2023 INFORME,” 2023. Accessed: Nov. 01, 2023. [Online]. Available: https://global.fortinet.com/ai-la-lp-es-ap-global-ransomware-report2023?utm_source=website&utm_medium=LATHERO&utm_campaign=LATHERO-BAN3-Ransomware-LATAM-LAT&utm_content=LATHERO-BAN3-Ransomware

J. De Marco, “Filtran datos de 200 mil usuarios de la emergencia medica del Casmu y hackers los ponen a la venta en internet,” Robo de Información, Uruguay, May 22, 2023.

Instituto Nacional de Ciberseguridad, “Distribución malware a través de un phishing que suplanta a Endesa,” España, May 2023.

X. Duque, “Ciberseguridad y estándares en el cuidado,” El Tiempo, 2023. [Online]. Available: https://www.eltiempo.com/opinion/columnistas/ximena-duque/ciberseguridad-y-estandares-en-el-cuidado-columna-de-ximena-duque-765439

J. Muñoz, “Masivo ciberataque secuestra los datos de cientos de portales en Chile, Colombia y Panamá,” BioBio Chile, Chile, Sep. 15, 2023.

L. Lesmes, “Colombia recibió 20.000 millones de ciberataques en 2022,” El Tiempo, Bogotá, Apr. 10, 2023.

D. Amo, M. Alier, F. García-Peñalvo, D. Fonseca, and M. J. Casañ, “Privacidad, seguridad y legali-dad en soluciones educativas basadas en Blockchain: Una Revisión Sistemática de la Literatura,” RIED. Revista Iberoamericana de Educación a Distancia, vol. 23, no. 2, p. 213, Jul. 2020, doi: 10.5944/ried.23.2.26388.

Ó. A. Beltrán, “Revisiones sistemáticas de la literatura,” Rev Colomb Gastroenterol, vol. 20, pp. 60–69, 2005, Accessed: Jun. 05, 2019. [Online]. Available: http://www.scielo.org.co/pdf/rcg/v20n1/v20n1a09.pdf

C. Mamédio, C. Santos, C. Andrucioli De Mattos Pimenta, M. Roberto, and C. Nobre, “ESTRATE-GIA PICO PARA LA CONSTRUCCIÓN DE LA PREGUNTA DE INVESTIGACIÓN Y LA BÚSQUEDA DE EVIDENCIAS,” Rev Latino-am Enfermagem, vol. 15, no. 3, 2007, [Online]. Available: www.eerp.usp.br/rlaeArtigodeAtualização

O. R. Akinyemi, M. N. Sibiya, and O. Oladimeji, “Communication model enhancement using elec-tronic health record standard for tertiary hospital,” SA Journal of Information Management, vol. 24, no. 1, Apr. 2022, doi: 10.4102/sajim.v24i1.1472.

P. A. Astorga and Y. G. Garcia, “Internet de las cosas en el ámbito de la atención médica: tenden-cias y desafíos,” Revista Cubana de Informática Médica, vol. 14, no. 1, 2022.

N. L. Marques, L. L. Gomes, and L. E. Brandão, “A blockchain-based model for token renewable energy certificate offers,” Revista Contabilidade & Finanças, vol. 34, no. 91, 2023, doi: 10.1590/1808-057x20221582.en.

R. Pava, J. N. Perez Castillo, and L. F. Niño Vasquez, “Perspectiva para el uso del modelo P6 de atención en salud bajo un escenario soportado en IoT y blockchain,” Tecnura, vol. 25, no. 67, pp. 112–130, Jan. 2021, doi: 10.14483/22487638.16159.

P. E. Romero, A. 1 Elizardo, and S. Costa, “Control and surveillance in digital capitalism: an analysis of blockchain technologies and their business implementation Controle e vigilância no capitalismo di-gital: uma análise da tecnologia blockchain e sua implementação empresarial Resumo,” pp. 1–13, 2023, doi: 10.1590/1679-395120220020x.

E. Rodrigues, W. Lourenzani, and E. Satolo, “Blockchain in Supply Chain Management: Characteris-tics and Benefits,” BAR - Brazilian Administration Review, vol. 18, no. spe, 2021, doi: 10.1590/1807-7692bar2021200065.

I. González-Puetate, C. L. Marín Tello, and H. Reyes Pineda, “Agri-food safety optimized by block-chain technology: review,” Rev Fac Nac Agron Medellin, vol. 75, no. 1, Jan. 2022, doi: 10.15446/rfnam.v75n1.95760.

E. Rodrigues, W. Lourenzani, and E. Satolo, “Blockchain in Supply Chain Management: Characteris-tics and Benefits,” BAR - Brazilian Administration Review, vol. 18, no. spe, 2021, doi: 10.1590/1807-7692bar2021200065.

Y.-I. Llanten-Lucio, S. Amador-Donado, and K. Marceles-Villalba, “Validation of Cybersecurity Framework for Threat Mitigation,” Revista Facultad de Ingeniería, vol. 31, no. 62, p. e14840, Oct. 2022, doi: 10.19053/01211129.v31.n62.2022.14840.

B. García, M. A. Sánchez, and J. Abadía, “Herramienta web con tecnología de cadena de bloques para un sistema de facturación electrónica en Colombia,” Información tecnológica, vol. 32, no. 3, pp. 15–24, Jun. 2021, doi: 10.4067/S0718-07642021000300015.

I. Gallardo, P. Bazan, and P. Venosa, “Arquitectura de Certificados Digitales: de una arquitectura jerárquica y centralizada a una distribuida y descentralizada,” RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, no. 32, pp. 49–66, Jun. 2019, doi: 10.17013/risti.32.49-66.

I. González-Puetate, C. L. Marín Tello, and H. Reyes Pineda, “Agri-food safety optimized by block-chain technology: review,” Rev Fac Nac Agron Medellin, vol. 75, no. 1, Jan. 2022, doi: 10.15446/rfnam.v75n1.95760.

I. Gallardo, P. Bazan, and P. Venosa, “Arquitectura de Certificados Digitales: de una arquitectura jerárquica y centralizada a una distribuida y descentralizada,” RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, no. 32, pp. 49–66, Jun. 2019, doi: 10.17013/risti.32.49-66.

F. R. Cádima, “A Publicidade face aos novos contextos da era Digital: privacidade, transparência e disrupção,” Media & Jornalismo, vol. 19, no. 34, pp. 35–46, Jun. 2019, doi: 10.14195/2183-5462_34_3.

T. Liu, P. Qin, L. Li, and Y. Tang, “Software-defined converged access network with cross-layer intelligent control architecture,” Optical Fiber Technology, vol. 50, pp. 242–249, Jul. 2019, doi: 10.1016/j.yofte.2019.04.001.

G. He, C. Li, Y. Shu, and Y. Luo, “Fine-grained access control policy in blockchain-enabled edge computing,” Journal of Network and Computer Applications, vol. 221, p. 103706, Jan. 2024, doi: 10.1016/j.jnca.2023.103706.

J. Seo and S. Park, “SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse,” Future Generation Computer Systems, vol. 151, pp. 85–97, Feb. 2024, doi: 10.1016/j.future.2023.09.022.

S. M. N. Sakib, “Navigating the New Frontier of Finance, Art, and Marketing,” 2023, pp. 64–90. doi: 10.4018/978-1-6684-9919-1.ch005.

W. Sardjono, A. Cholidin, and Johan, “Applying Digital Advertising in Food and Beverage Industry for McDonald’s with Marketing 5.0 Approach,” E3S Web of Conferences, vol. 426, p. 02009, Sep. 2023, doi: 10.1051/e3sconf/202342602009.

A. H. Karbasi and S. Shahpasand, “A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks,” Peer Peer Netw Appl, vol. 13, no. 5, pp. 1423–1441, Sep. 2020, doi: 10.1007/s12083-020-00901-w.

V. J. Aski, V. S. Dhaka, A. Parashar, S. kumar, and I. Rida, “Internet of Things in healthcare: A survey on protocol standards, enabling technologies, WBAN architectures and open issues,” Physi-cal Communication, vol. 60, p. 102103, Oct. 2023, doi: 10.1016/j.phycom.2023.102103.

D. P. Krishna et al., “SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier,” Sci Rep, vol. 13, no. 1, p. 18335, Oct. 2023, doi: 10.1038/s41598-023-44586-6.

C. Sharma, S. S. Bharadwaj, N. Gupta, and H. Jain, “Robotic process automation adoption: contex-tual factors from service sectors in an emerging economy,” Journal of Enterprise Information Man-agement, vol. 36, no. 1, pp. 252–274, Jan. 2023, doi: 10.1108/JEIM-06-2021-0276.

S. Mitrevska, E. Vrangalovska, S. Baloska, D. Mechkaroska, and E. Domazet, “Blockchain as a Service, an overview on AWS and its BaaS,” in 2022 30th Telecommunications Forum (TELFOR), IEEE, Nov. 2022, pp. 1–4. doi: 10.1109/TELFOR56187.2022.9983746.

A. J. Cabrera-Gutiérrez, E. Castillo, A. Escobar-Molero, J. Cruz-Cozar, D. P. Morales, and L. Parril-la, “Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Plat-form Module Applied to Electric Vehicle Charging Stations,” Energies (Basel), vol. 16, no. 11, p. 4285, May 2023, doi: 10.3390/en16114285.

S. Li et al., “Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Con-tracts,” IEEE Internet Things J, vol. 10, no. 16, pp. 14269–14284, Aug. 2023, doi: 10.1109/JIOT.2023.3285939.

S. Lin, Z. Li, S. Zhao, H. Zhao, Y. Li, and S. Wang, “Design and Implementation of Blockchain-based College Education Integrity System,” in 2022 IEEE 5th International Conference on Infor-mation Systems and Computer Aided Education (ICISCAE), IEEE, Sep. 2022, pp. 276–281. doi: 10.1109/ICISCAE55891.2022.9927601.

R. T, A. A, D. G, and D. K, “Intelligent Crypto Currency Mining Farm for E-Vehicle,” in 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), IEEE, Aug. 2023, pp. 1869–1875. doi: 10.1109/ICAISS58487.2023.10250588.

G. Bindu, H. M. Moyeenudin, and R. Anandan, “Blockchain of Cryptocurrency Using a Proof-of-Work-Based Consensus Algorithm with an SHA-256 Hash Algorithm to Make Secure Payments,” 2024, pp. 243–252. doi: 10.1007/978-3-031-35751-0_17.

N. Khanam and M. S. Islam, “Role of cloud computing and blockchain technology in paradigm shift to modern online teaching culture in the education sector,” in Artificial Intelligence and Blockchain in Industry 4.0, Boca Raton: CRC Press, 2023, pp. 263–276. doi: 10.1201/9781003452591-18.

N. us Sehar et al., “Blockchain enabled data security in vehicular networks,” Sci Rep, vol. 13, no. 1, p. 4412, Mar. 2023, doi: 10.1038/s41598-023-31442-w.

K. Godewatte Arachchige, P. Branch, and J. But, “Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks,” Future Internet, vol. 15, no. 9, p. 317, Sep. 2023, doi: 10.3390/fi15090317.

S. Wang, N. Karandikar, K. E. Knutsen, X. G. Tony Tong, T. Edseth, and Z. X. Zile, “Enhancing Maritime Data Standardization and Integrity using Docker and Blockchain,” in 2023 IEEE/ACM 45th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), IEEE, May 2023, pp. 370–374. doi: 10.1109/ICSE-Companion58688.2023.00105.

I. Keshta et al., “Blockchain aware proxy re-encryption algorithm-based data sharing scheme,” Physical Communication, vol. 58, p. 102048, Jun. 2023, doi: 10.1016/j.phycom.2023.102048.

A. Jain, C. Jain, and K. Krystyniak, “Blockchain transaction fee and Ethereum Merge,” Financ Res Lett, vol. 58, p. 104507, Dec. 2023, doi: 10.1016/j.frl.2023.104507.

H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain challenges and opportunities: a survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018, doi: 10.1504/IJWGS.2018.10016848.

A. Hombalimath, N. Mangla, and A. Balodi, “Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer,” Informatica, vol. 47, no. 3, Jun. 2023, doi: 10.31449/inf.v47i3.4158.

B. Deena Divya Nayomi, S. Suguna Mallika, P. Laxmikanth, and M. Bhavsingh, “A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities,” in Original Research Paper International Journal of Intelligent Sys-tems and Applications in Engineering IJISAE, 2023, pp. 313–327. [Online]. Available: www.ijisae.org

A. Serada, J. Grym, and T. Sihvonen, “The Economy of Attention on Blockchain in the Brave Browser,” in Futures of Journalism, Cham: Springer International Publishing, 2022, pp. 49–62. doi: 10.1007/978-3-030-95073-6_4.

T. Yuvaraj et al., “Comparative analysis of various compensating devices in energy trading radial distribution system for voltage regulation and loss mitigation using Blockchain technology and Bat Algorithm,” Energy Reports, vol. 7, pp. 8312–8321, Nov. 2021, doi: 10.1016/j.egyr.2021.08.184.

W. Liang, L. You, and G. Hu, “LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures,” Computer Networks, vol. 237, p. 110043, Dec. 2023, doi: 10.1016/j.comnet.2023.110043.

Published

2024-09-27

How to Cite

Rueda-Castañeda, J. E., Gallego-Gómez , N., Estanling-Cárdenas, E., Tello, J. S., & García-Pineda, V. (2024). IDENTIFICATION OF VARIABLES RELATED TO COMPUTER SECURITY FROM THE BLOCKCHAIN APPLICATION. Revista Politécnica, 20(40), 09–29. https://doi.org/10.33571/rpolitec.v20n40a1