Chapter Blockchain Applications in Cybersecurity

Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure i...

Full description

Bibliographic Details
Format: eBook
Language:English
Published: InTechOpen 2019
Subjects:
Online Access:Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
LEADER 02201namaa2200421uu 4500
001 doab70434
003 oapen
005 20210210
006 m o d
007 cr|mn|---annan
008 210210s2019 xx |||||o ||| 0|eng d
020 |a intechopen.90061 
024 7 |a 10.5772/intechopen.90061  |2 doi 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
072 7 |a UTC  |2 bicssc 
720 1 |a Gómez, Eneko  |4 aut 
720 1 |a de Diego, Santiago  |4 aut 
720 1 |a Gutiérrez, Iván  |4 aut 
720 1 |a Lage, Oscar  |4 aut 
720 1 |a Urkizu, Borja  |4 aut 
245 0 0 |a Chapter Blockchain Applications in Cybersecurity 
260 |b InTechOpen  |c 2019 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |f Unrestricted online access  |2 star 
520 |a Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |u https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Cloud computing  |2 bicssc 
653 |a blockchain, DLT, trust, cybersecurity, IoT, IIoT 
773 1 |7 nnaa 
793 0 |a DOAB Library. 
856 4 0 |u https://directory.doabooks.org/handle/20.500.12854/70434  |7 0  |z Open Access: DOAB: description of the publication 
856 4 0 |u https://library.oapen.org/bitstream/20.500.12657/49299/1/70087.pdf  |7 0  |z Open Access: DOAB, download the publication