BLOCKCHAIN TECHNOLOGY FOR ENHANCING CYBERSECURITY IN INDIA
Keywords:
Blockchain, Cybersecurity, India, Decentralized Nature, Single Points Of Failure, Consensus Mechanisms, Transaction Authenticity, Data ManipulationAbstract
Blockchain technology has emerged as a revolutionary force in the field of cybersecurity, offering innovative solutions to address the escalating threats faced by nations, including India. This article explores the potential of blockchain technology as a robust framework for enhancing cybersecurity in the Indian context. By providing a decentralized and tamper-resistant ledger, blockchain ensures the integrity and transparency of data, thereby fortifying the security infrastructure. This article explores how blockchain enhances cybersecurity in India by eliminating single points of failure and ensuring transaction authenticity. It discusses specific use cases, including securing critical infrastructure and safeguarding government records, backed by real-world examples. Challenges such as scalability and regulatory frameworks are addressed, offering insights for policymakers and cybersecurity professionals aiming to integrate blockchain into India's cybersecurity landscape.
References
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
Swan, M. (2015). Blockchain: Blueprint for a new economy. O'Reilly Media, Inc.
Zheng, Z., Xie, S., Dai, H.-N., Wang, H., & Dong, X. (2018). An overview of blockchain technology: Applications, consensus mechanisms, and future trends. IEEE Access, 6, 5880-5893.
Chen, Z., Liang, H., Xu, X., & Wang, R. (2019). Blockchain-based identity management: A state-of-the-art survey. IEEE Access, 7, 83006-83024.
Kuraku, S., & Kalla, D. (2023). Impact of Phishing on Users with Different Online Browsing Hours and Spending Habits. International Journal of Advanced Research in Computer and Communication Engineering, 12(10), 34-41. DOI: 10.17148/IJARCCE.2023.121005
Azouvi, Y., Moller, B., & Aviv, Y. (2018). Towards a taxonomy of blockchain-based systems for secure data storage. IEEE Security & Privacy, 16(6), 16-24.
Kuraku, S., Kalla, D., Samaah, F., & Smith, N. (2023). Cultivating Proactive Cybersecurity Culture among IT Professionals to Combat Evolving Threats. International Journal of Electrical, Electronics and Computers, 8(6), 1-7.
Yu, J., Ren, Y., He, W., & Yu, X. (2020). Blockchain-based secure communication for the internet of things. IEEE Internet of Things Journal, 7(8), 7555-7566.
Jangampet, V. D., Desetty, A. G., & Pulyala, S. R. (2023, November). A comprehensive analysis of cybersecurity threats in small and large enterprises: Mitigation strategies and best practices. Journal of Advanced Medical Sciences and Applied Technologies, 13(11), 160-165.
Kshetri, N. (2022). Can blockchain secure critical infrastructure? An assessment of opportunities and challenges. Information Systems Journal, 32(4), 579-602.
The Economic Times (2023, June 28). Government mulls blockchain for land record management.
Kalla, D., & Kuraku, S. (2023). Phishing Website URL’s Detection Using NLP and Machine Learning Techniques. Journal on Artificial Intelligence, 5(1), 145-162. https://doi.org/10.32604/jai.2023.043366
Inc42 (2022, August 25). 5 Indian startups using blockchain for cybersecurity. https://inc42.com/tag/cyber-security/
Chaintech Network (2023, October 26). The Inextricable Link between Blockchain Technology and India's Cybersecurity Landscape. https://medium.com/@indersinha83/cryptography-and-network-security-9e36c81d3561
Baliga, A. (2002). Peer-to-peer computing: technological advancements and the implications of Napster. Communications of the ACM, 44(8), 30-31.
Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. In Proceedings of the 2nd International Conference on Cryptography and Coding (pp. 386-395). Springer, Berlin, Heidelberg.
Back, A. (2002). Hashcash: A digital cash payment system based on proof-of-work. Computer science, 2(4), 20-26.
N. Kannan, Ethical AI in Action: Strategies and Techniques for Bias Mitigation in Machine Learning Models. International Journal of Machine Intelligence (IJMI), 1(1), 2024, 1-11.
Kalla, D., Samaah, F., & Kuraku, S. (2021). Enhancing Cybersecurity by Predicting Malwares Using Supervised Machine Learning Models. International Journal of Computing and Artificial Intelligence, 2(2), 55-62. DOI: https://doi.org/10.33545/27076571.2021.v2.i2a.71
Nivedhaa N, A Comprehensive Analysis of Current Trends in Data Security, International Journal of Cyber Security (IJCS), 2(1), 2024, 1-16.
Bhargava, S., & Sengupta, S. (2016). Blockchain technology: the next big thing in supply chain management. IIMB management review, 28(3), 3-10.
Chaudhuri, S., & Jain, S. (2017). Leveraging blockchain technology for public good in developing countries. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 2523-2528). IEEE.
Kuraku, S., Kalla, D., & Samaah, F. (2022). Navigating the Link Between Internet User Attitudes and Cybersecurity Awareness in the Era of Phishing Challenges. International Advanced Research Journal in Science, Engineering and Technology, 9(12), 116-124. DOI: 10.17148/IARJSET.2022.91224
N. Kannan, A review of Deep Generative Models for Synthetic Financial Data Generation. International Journal of Financial Data Science (IJFDS), 2(1), 2024, 1-10.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 K K Ramachandran (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.