Chapter Blockchain Applications in Cybersecurity

Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure i...

Full description

Saved in:
Bibliographic Details
Main Author: Gómez, Eneko (auth)
Other Authors: de Diego, Santiago (auth), Lage, Oscar (auth), Urkizu, Borja (auth), Gutiérrez, Iván (auth)
Format: Electronic Book Chapter
Language:English
Published: InTechOpen 2019
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_70434
005 20210210
003 oapen
006 m o d
007 cr|mn|---annan
008 20210210s2019 xx |||||o ||| 0|eng d
020 |a intechopen.90061 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.90061  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UTC  |2 bicssc 
100 1 |a Gómez, Eneko  |4 auth 
700 1 |a de Diego, Santiago  |4 auth 
700 1 |a Lage, Oscar  |4 auth 
700 1 |a Urkizu, Borja  |4 auth 
700 1 |a Gutiérrez, Iván  |4 auth 
245 1 0 |a Chapter Blockchain Applications in Cybersecurity 
260 |b InTechOpen  |c 2019 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Cloud computing  |2 bicssc 
653 |a blockchain, DLT, trust, cybersecurity, IoT, IIoT 
773 1 0 |7 nnaa 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/49299/1/70087.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/49299/1/70087.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/70434  |7 0  |z DOAB: description of the publication