Enhancing Security Decision-Making to Prevent Network Attacks Using Blockchain Technology

Authors

  • Rawan Hamed Alsharari Computer Science Department, College of Computer and Information Science, Jouf University,Sakaka – 72321, KSA.
  • Hedi Hamdi Computer Science Department, College of Computer and Information Science, Jouf University,Sakaka – 72321, KSA. University of Manouba., Tunisia
  • Abdel Aziz A. Abdel Aziz Computer Science Department, College of Computer and Information Science, Jouf University,Sakaka – 72321, KSA. and Faculty of Graduate Studies for Statistical Research, Cairo University, Egypt
  • Mahmood A. Mahmood Computer Science Department, College of Computer and Information Science, Jouf University,Sakaka – 72321, KSA. and Faculty of Graduate Studies for Statistical Research, Cairo University, Egypt

Keywords:

Blockchain Technology, Cryptographic Techniques, Data Privacy, Saudi Arabia, Cybersecurity, Machine Learning, Random Forest Classifier

Abstract

The increasing reliance on digital platforms in Saudi Arabia's Information and Communication Technology (ICT) sector raises concerns about data privacy breaches. This study addresses the urgent need for robust security solutions within this context. This study investigates the application of blockchain technology and cryptographic techniques for enhancing data privacy within Saudi Arabia's ICT sector. A mixed-methods research approach was utilized, combining a survey methodology. The proposed solution leveraged the immutable nature of blockchain to bolster data privacy. Findings indicate that blockchain can profoundly improve data privacy across various sectors. The study concludes that while blockchain technology shows significant potential for improving data privacy, ongoing research, ethical and legal considerations, and improved security measures are vital for its successful application in Saudi Arabia's ICT sector.[1]

The primary objective: The primary objective of the provided text appears to be a presentation of the survey results related to the use of cryptographic techniques in the information and communication technology (ICT) sector in Saudi Arabia. The survey covers various aspects, including awareness of security breaches, opinions on improving cryptographic techniques, the effectiveness of cryptographic techniques, challenges and limitations, ethical and legal considerations, and measures taken to address these issues. The timeframe for this objective isn't explicitly mentioned in the text, but it is likely related to the period during which the survey was conducted and the data collected. Specific dates or a timeframe should be available in the original survey report or research documentation.:

Downloads

Download data is not yet available.

References

Wang, D., Zhao, J., & Wang, Y. (2020). A Survey on Privacy Protection of Blockchain: The Technology and Application. IEEE Access, 8, 108766–108781. https://doi.org/10.1109/access.2020.2994294.

Ali Syed, T., Alzahrani, A., Jan, S., Siddiqui, M., Nadeem, A., & Alghamdi, T. (2019). A Comparative Analysis of Blockchain Architecture and its Applications: Problems and Recommendations. IEEE Access, 7, 176838–176869. https://doi.org/10.1109/access.2019.2957660Chen, J., Lv, Z., & Song, H. (2019). Design of personnel big data management system based on blockchain. Future generation computer systems, 101, 1122-1129.

Gahlawat, M. (2020). Survey of Online Identity Management Techniques on Blockchain. International Journal of Security and Privacy in Pervasive Computing, 12(4), 19–28. https://doi.org/10.4018/ijsppc.2020100102 Coopamootoo, K. (2020). Usage Patterns of Privacy-Enhancing Technologies. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3372297.3423347

Butt, T. A., Iqbal, R., Salah, K., Aloqaily, M., & Jararweh, Y. (2019). Privacy management in social internet of vehicles: review, challenges and blockchain based solutions. IEEE Access, 7, 79694-79713.

SAR, K. S. A. R. (2019). IMF Executive Board Concludes 2019 Article IV Consultation Discussions with People's Republic of China—Hong Kong Special Administrative Region.

Javid, M., Hasanov, F. J., Bollino, C. A., & Galeotti, M. (2022). Sectoral investment analysis for Saudi Arabia. Applied Economics, 54(38), 4486-4500.

Abdulhakeem, S. A., & Hu, Q. (2021). Powered by Blockchain technology, DeFi (Decentralized Finance) strives to increase financial inclusion of the unbanked by reshaping the world financial system. Modern Economy, 12(01), 1.

Kadry, H., Farouk, A., Zanaty, E. A., & Reyad, O. (2023). Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security. Alexandria Engineering Journal, 71, 491-500.

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.

Wimpenny, G., Šafář, J., Grant, A., & Bransby, M. (2022). Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility. The Journal of Navigation, 75(2), 333-345.

Nakamoto, S. (2008). Bitcoin: a Peer-to-Peer Electronic Cash System. In bitcoin.org. https://bitcoin.org/bitcoin.pdf.

Chen, Y., Luo, H., & Bian, Q. (2021, October). A Privacy Protection Method Based on Key Encapsulation Mechanism in Medical Blockchain. In 2021 IEEE 21st International Conference on Communication Technology (ICCT) (pp. 295-300). IEEE.

Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE.

Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014), 1-32.

Farouk, A., Alahmadi, A., Ghose, S., & Mashatan, A. (2020). Blockchain platform for industrial healthcare: Vision and future opportunities. Computer Communications, 154, 223-235.

Zetzsche, D. A., Buckley, R. P., Arner, D. W., & Föhr, L. (2017). The ICO Gold Rush: It's a scam, it's a bubble, it's a super challenge for regulators. University of Luxembourg Law Working Paper, (11), 17-83.

ULUC, C. İ., & Ferman, M. (2016). A comparative analysis of user insights for e-health development challenges in Turkey, Kingdom of Saudi Arabia, Egypt and United Arab Emirates. Journal of Management Marketing and Logistics, 3(2), 176-189.

Azmi, N. A., Sweis, G., Sweis, R., & Sammour, F. (2022). Exploring implementation of blockchain for the supply chain resilience and sustainability of the construction industry in Saudi Arabia. Sustainability, 14(11), 6427.

Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213-238.

Kumar, R., & Sharma, P. (2018). Blockchain-Based Privacy-Preserving Data Sharing in Cloud Computing. Future Generation Computer Systems, 88, 143-157.

Li, J., & Wang, B. (2020). Decentralized Identity Management on the Blockchain: A Survey. Journal of Computer Science and Technology, 35(4), 833-848.

Gonzalez, E., & Rodriguez, M. (2016). Secure Data Sharing in Cloud Computing with Blockchain Technology. Future Generation Computer Systems, 67, 87-96.

Thomas, L., & Clark, D. (2022). Blockchain and Digital Identity: A Comprehensive Review. International Journal of Digital Security and Privacy, 6(1), 56-68.

Zheng, X., & Wang, H. (2017). Privacy-Preserving Data Sharing in E-Health Systems Using Blockchain Technology. Journal of Medical Informatics Research, 23(4), 317-329.

Rajput, S., & Gupta, V. (2019). A Survey of Privacy-Enhancing Techniques for Blockchain. Journal of Network and Information Security, 3(2), 67-82.

Downloads

Published

13.12.2023

How to Cite

Alsharari, R. H. ., Hamdi, H., Abdel Aziz, A. A. A. ., & Mahmood, M. A. . (2023). Enhancing Security Decision-Making to Prevent Network Attacks Using Blockchain Technology. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 414–425. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4132

Issue

Section

Research Article