Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Information  /  Vol: 13 Par: 10 (2022)  /  Artículo
ARTÍCULO
TITULO

Secure and Efficient Exchange of Threat Information Using Blockchain Technology

Maryam Pahlevan and Valentin Ionita    

Resumen

In recent years, sharing threat information has been one of the most suggested solutions for combating the ever-increasing number of cyberattacks, which stem from the system-wide adoption of Information and Communication Technology (ICT) and consequently endangers the digital and physical assets of organizations. Several solutions, however, were proposed to facilitate data exchange between different systems, but none were able to address the main challenges of threat sharing such as trust, privacy, interoperability, and automation in a single solution. To address these issues, this paper presents a secure and efficient threat information sharing system that leverages Trusted Automated Exchange of Intelligence Information (TAXIITM) standard and private blockchain technology to automate the threat sharing procedure while offering privacy, data integrity, and interoperability. The extensive evaluation of the solution implementation indicates its capability to offer secure communication between participants without sacrificing data privacy and overall performance as opposed to existing solutions.

 Artículos similares

       
 
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia    
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance... ver más
Revista: Applied Sciences

 
Mira Lee and Minhye Seo    
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This... ver más
Revista: Applied Sciences

 
Abdullah As Sami, Saadman Sakib, Kaushik Deb and Iqbal H. Sarker    
Deep learning has enabled a straightforward, convenient method of road pavement infrastructure management that facilitates a secure, cost-effective, and efficient transportation network. Manual road pavement inspection is time-consuming and dangerous, ma... ver más
Revista: Algorithms

 
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information

 
Guo Li, Yida Teng and Huimin Zhou    
Aero engine compressor disks are typically life-limited parts and it is necessary to secure them through the implementation of an engineering plan and a manufacturing plan. Specifically, the engineering plan recommends the quantification of the safety of... ver más
Revista: Aerospace