SECURITY1 Contents Part 1: Abstract...........................................................................................................................2 Part 2: Security of blockchain-enabled applications (BCA) 1200.............................................3 Introduction................................................................................................................................3 Highlighting the challenges or problems in BCA......................................................................4 Scalability...............................................................................................................................4 Lack of interoperability..........................................................................................................4 Lack of blockchain talent.......................................................................................................4 Integration with legacy systems.............................................................................................5 Discussing issues addressed in the current literature.................................................................5 Highlighting issues not addressed..............................................................................................5 Discussing personal view on the issues.....................................................................................6 Conclusion..................................................................................................................................6 References..................................................................................................................................8
SECURITY2 Part 1: Abstract The research paper is based on investigating the security of Blockchain-enabled Applications (BCA). The topic has been selected as the key area for the research project because Blockchain Technology (BT) has become essentially important as it allows people to own digital assets, goods, and data efficiently. In this era, BT could be further revolutionized through retail experiences for loyalty rewards. Modern businesses are using BCA at a large level so as to make their business efficient, effective and adaptable as per the millennial generation. While using BCA for business development and growth, and personal use by the users, some key issues are being faced by both business developers and BCA users. The key issues may include technical scalability, slow-moving adoption, limited interoperability, insufficient standardization and most importantly the security of the data and information shared with the BCAs. Thus, the paper has conducted in-depth research on security issues of BCAs in a real-life context. It has been found that key possible solutions to these security issues in blockchain-based applications can be found out only by assessing and integrating diverse sectors such as business, supply chain, healthcare, privacy, IoT, and effective data management within block-chain based applications.
SECURITY3 Part 2: Security of blockchain-enabled applications (BCA) 1200 Introduction This research report is mainly focused on identifying security aspects as well as issues of BCA. The discussion will mainly provide a systematic literature review of BCA all across the security domain. The key aim of this research report is to investigate the present state of BT as well as its applications for highlighting how security issues are affecting this disruptive technology. While doing so, the paper is going to talk about challenges in using BCA in this digital era. Most importantly, an identification of the gaps in the literature of BCA will be done(Modex, 2019). The paper will discuss issuesthat have been addressed in the present literature. In addition, research is going to highlight key issues which have not been addressed or adequately addressed to date. Moreover, with this discussion personal views on the identified critical security issues will be provided while summarizing the future research directions on the basis of above-identified research gaps in the chosen research field of block- chain based applications(Yu, Li, Tian, & Liu, 2018). Source:(Modex, 2019)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SECURITY4 Highlighting the challenges or problems in BCA This section is going to highlight the key challenges in the field of BCA so that possible solutions can be found in order to address them. In general, blockchain is a kind of technology which allows us to keep a ledger including the whole transaction data as well as to update the ledgers for further maintaining integrity in a new transaction(Casino, Dasaklis, & Patsakis, 2019).It has been found that since the advancement of encryption technology and the Internet, BT has made it possible for people to verify any transaction’s reliability. Thus, with the help of BT, the single point of failure on an authorized third party arising from the dependency has been solved successfully. The key challenges of BCA are as follows: Scalability The scalability is the huge challenge of using blockchain networks and it is directly associated with the technical scalability of the blockchain network. It has been found that an efficient solution for this issue of scalability is to add a second layer to the prime blockchain network for further facilitating faster transactions(Yu, Li, Tian, & Liu, 2018). Lack of interoperability This challenge in BCA is usually occurred due to so many different networks. It is because the blockchain space has an abundance of solutions and players too. Thus, due to a lack of standards, BT allows diverse networks to communicate with each other which ultimately escalate the issue of lack of interoperability. As a solution, there are some key projects which offer interoperability like Ark that uses the SmartBridges architecture for further addressing the challenge of interoperability(Modex, 2019). Lack of blockchain talent As BT is newly emerging technology hence developer community requires more resources as well as time to accommodate the new demands hence lack of blockchain talent is again a new challenge while using BCAs. In this way, such a gap in market demand and current blockchain talent availability can be resolved with skilled developers. The company can also pay the higher than average salaries to a blockchain professional to resolve the challenge of blockchain skilled people(Evans, Barry, & Mason, 2018). Integration with legacy systems In addition, the integration of blockchain with the legacy system of any organization requires to completely restructuring the previous system. Thus, to address this challenge
SECURITY5 organization can devise a way to successfully integrate the two technologies(Yu, Li, Tian, & Liu, 2018). Discussing issues addressed in the current literature The key issues, as well as challenges related to security, have been addressed in the currentliterature(Macaulay,2018).Asweknow,severalindustrial,governmentand commercial sectors adopt BT; hence there is a need to address such security issues until they become paramount. There are some key security issues which have been successfully addressed in the current literature as follows: Endpoint vulnerabilities(Yu, Li, Tian, & Liu, 2018) 51% of attacks are addressed with the Proof-of-Work (PoW) consensus mechanism Exchange security hacks with the use of paper or hardware wallet Socialengineeringchallengeswiththeenhancedtrainingandstudyingabout engineering scams so as to avoid facing them Software and Malware flaws through vigilance, contract audits, penetration testing, and code reviews(Casino, Dasaklis, & Patsakis, 2019). Highlighting issues not addressed In addition to that, there are some critical security issues which have not been addressed or adequately addressed; they are as follows: Public and Private Key Security Vendor Risks Untested Code(Dhillon, Metcalf, & Hooper, 2017) Protection against data tampering Untested at Full Scale Prevention of identity theft Lack of Standards and Regulation structural security of IoT devices Security of internal communications Making passwords obsolete Privacy and security of digital chats Protection of critical infrastructure
SECURITY6 Security of Transaction In this context, the above-mentioned security issues and threats are those concerns related to blockchain-based applications which are pending to be addressed fully and effectively yet(Modex, 2019). Discussing personal view on the issues In my opinion, BT and BCA have proven to be secure and robust in the past yet there are several security issues and challenges which are affecting the security of the whole ecosystem. I consider that it is required to have a detailed understanding of the security issues and concerns in order to navigate the highly complex area of blockchain development in the formofblockchain-enabledapplications(Yu,Li,Tian,&Liu,2018).Ibelievethat mitigation, prevention and addressing of security issues ofblockchain technology can only be possible by manifesting the real interest in the efficient applicability of BT in an organization use cases. Based on this research, I have found that there is an increase in trust and eagerness to tap into the benefits of blockchain which is clear through increased use of BCA. On the contrary, there are still numerous challenges including security and privacy challenges which need to be addressed prior to the critical stage(Casino, Dasaklis, & Patsakis, 2019). Apart from these security and vulnerability issues,the key benefits of blockchain are showing that the technology is on the right track of digitalization. I can now say that emerging disruptors like blockchain technology need to focus to create a perfect single form of the technology, as well as focus on multiple iterations, with the unique use case(Arli, Dylke, Burgess, Campus, & Soldo, 2013). Conclusion In whole, this research paper has successfully explored blockchain as an embarked on an ascending trend of BCA. It has been found that in the form of Blockchain-enabled Application, global countries are constantly manifesting key interest in the applicability of the BT within enterprise use cases. The discussion on security issues of BCA suggests that blockchain is steadily maturing with the benefits and challenges both. The paper has included a shortlist of blockchain security issues that need to be addressed adequately and effectively. Based on the identified gaps in the literature review conducted above, this research is indicating that cybercriminals always update their tactics with the evolution of security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SECURITY7 strategies. In this way, for avoiding becoming a victim, it is required to stay up-to-date with the latest blockchain security issues as well as preventative security measures. In whole, addressing identified security issues in blockchain technology has become essential as it only takes a blockchain security vulnerability to cause permanent damage to a business or an institution.
SECURITY8 References Arli, V., Dylke, S., Burgess, R., Campus, R., & Soldo, E. (2013). Woolworths Australia and Walmart US: Best practices in supply chain collaboration.Journal of Economics, Business & Accountancy Ventura (JEBAV), 16(1). Casino, F., Dasaklis, T., & Patsakis, C. (2019). A systematic literature review of blockchain- based applications: current status, classification and open issues.Telematics and Informatics, 36, 55-81. Dhillon, V., Metcalf, D., & Hooper, M. (2017).Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You.London: Apress. Evans, Barry, & Mason, R. (2018).The lean supply chain: managing the challenge at Tesco (2nd ed.). London : Kogan Page . Macaulay, T. (2018).Eddie Stobart CIO John Court on how IoT, blockchain and AI are transforming transport and logistics. Retrieved from CIO: https://www.cio.com/article/3525254/eddie-stobart-cio-john-court-on-how-iot- blockchain-and-ai-are-transforming-transport-and-logistics.html Modex. (2019).The Challenges Of Blockchain Adoption. Retrieved from Modex: https://modex.tech/the-challenges-of-blockchain-adoption/ Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). Blockchain-based solutions to security and privacy issues in the Internet of Things.IEEE Wireless Communications, 25(6), 12-18.