Enhancing Security Decision-Making to Prevent Network Attacks Using Blockchain Technology
Keywords:
Blockchain Technology, Cryptographic Techniques, Data Privacy, Saudi Arabia, Cybersecurity, Machine Learning, Random Forest ClassifierAbstract
The increasing reliance on digital platforms in Saudi Arabia's Information and Communication Technology (ICT) sector raises concerns about data privacy breaches. This study addresses the urgent need for robust security solutions within this context. This study investigates the application of blockchain technology and cryptographic techniques for enhancing data privacy within Saudi Arabia's ICT sector. A mixed-methods research approach was utilized, combining a survey methodology. The proposed solution leveraged the immutable nature of blockchain to bolster data privacy. Findings indicate that blockchain can profoundly improve data privacy across various sectors. The study concludes that while blockchain technology shows significant potential for improving data privacy, ongoing research, ethical and legal considerations, and improved security measures are vital for its successful application in Saudi Arabia's ICT sector.[1]
The primary objective: The primary objective of the provided text appears to be a presentation of the survey results related to the use of cryptographic techniques in the information and communication technology (ICT) sector in Saudi Arabia. The survey covers various aspects, including awareness of security breaches, opinions on improving cryptographic techniques, the effectiveness of cryptographic techniques, challenges and limitations, ethical and legal considerations, and measures taken to address these issues. The timeframe for this objective isn't explicitly mentioned in the text, but it is likely related to the period during which the survey was conducted and the data collected. Specific dates or a timeframe should be available in the original survey report or research documentation.:
Downloads
References
Wang, D., Zhao, J., & Wang, Y. (2020). A Survey on Privacy Protection of Blockchain: The Technology and Application. IEEE Access, 8, 108766–108781. https://doi.org/10.1109/access.2020.2994294.
Ali Syed, T., Alzahrani, A., Jan, S., Siddiqui, M., Nadeem, A., & Alghamdi, T. (2019). A Comparative Analysis of Blockchain Architecture and its Applications: Problems and Recommendations. IEEE Access, 7, 176838–176869. https://doi.org/10.1109/access.2019.2957660Chen, J., Lv, Z., & Song, H. (2019). Design of personnel big data management system based on blockchain. Future generation computer systems, 101, 1122-1129.
Gahlawat, M. (2020). Survey of Online Identity Management Techniques on Blockchain. International Journal of Security and Privacy in Pervasive Computing, 12(4), 19–28. https://doi.org/10.4018/ijsppc.2020100102 Coopamootoo, K. (2020). Usage Patterns of Privacy-Enhancing Technologies. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3372297.3423347
Butt, T. A., Iqbal, R., Salah, K., Aloqaily, M., & Jararweh, Y. (2019). Privacy management in social internet of vehicles: review, challenges and blockchain based solutions. IEEE Access, 7, 79694-79713.
SAR, K. S. A. R. (2019). IMF Executive Board Concludes 2019 Article IV Consultation Discussions with People's Republic of China—Hong Kong Special Administrative Region.
Javid, M., Hasanov, F. J., Bollino, C. A., & Galeotti, M. (2022). Sectoral investment analysis for Saudi Arabia. Applied Economics, 54(38), 4486-4500.
Abdulhakeem, S. A., & Hu, Q. (2021). Powered by Blockchain technology, DeFi (Decentralized Finance) strives to increase financial inclusion of the unbanked by reshaping the world financial system. Modern Economy, 12(01), 1.
Kadry, H., Farouk, A., Zanaty, E. A., & Reyad, O. (2023). Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security. Alexandria Engineering Journal, 71, 491-500.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
Wimpenny, G., Šafář, J., Grant, A., & Bransby, M. (2022). Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility. The Journal of Navigation, 75(2), 333-345.
Nakamoto, S. (2008). Bitcoin: a Peer-to-Peer Electronic Cash System. In bitcoin.org. https://bitcoin.org/bitcoin.pdf.
Chen, Y., Luo, H., & Bian, Q. (2021, October). A Privacy Protection Method Based on Key Encapsulation Mechanism in Medical Blockchain. In 2021 IEEE 21st International Conference on Communication Technology (ICCT) (pp. 295-300). IEEE.
Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE.
Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014), 1-32.
Farouk, A., Alahmadi, A., Ghose, S., & Mashatan, A. (2020). Blockchain platform for industrial healthcare: Vision and future opportunities. Computer Communications, 154, 223-235.
Zetzsche, D. A., Buckley, R. P., Arner, D. W., & Föhr, L. (2017). The ICO Gold Rush: It's a scam, it's a bubble, it's a super challenge for regulators. University of Luxembourg Law Working Paper, (11), 17-83.
ULUC, C. İ., & Ferman, M. (2016). A comparative analysis of user insights for e-health development challenges in Turkey, Kingdom of Saudi Arabia, Egypt and United Arab Emirates. Journal of Management Marketing and Logistics, 3(2), 176-189.
Azmi, N. A., Sweis, G., Sweis, R., & Sammour, F. (2022). Exploring implementation of blockchain for the supply chain resilience and sustainability of the construction industry in Saudi Arabia. Sustainability, 14(11), 6427.
Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213-238.
Kumar, R., & Sharma, P. (2018). Blockchain-Based Privacy-Preserving Data Sharing in Cloud Computing. Future Generation Computer Systems, 88, 143-157.
Li, J., & Wang, B. (2020). Decentralized Identity Management on the Blockchain: A Survey. Journal of Computer Science and Technology, 35(4), 833-848.
Gonzalez, E., & Rodriguez, M. (2016). Secure Data Sharing in Cloud Computing with Blockchain Technology. Future Generation Computer Systems, 67, 87-96.
Thomas, L., & Clark, D. (2022). Blockchain and Digital Identity: A Comprehensive Review. International Journal of Digital Security and Privacy, 6(1), 56-68.
Zheng, X., & Wang, H. (2017). Privacy-Preserving Data Sharing in E-Health Systems Using Blockchain Technology. Journal of Medical Informatics Research, 23(4), 317-329.
Rajput, S., & Gupta, V. (2019). A Survey of Privacy-Enhancing Techniques for Blockchain. Journal of Network and Information Security, 3(2), 67-82.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.