• Thu. Jun 13th, 2024

Applying the blockchain to stop knowledge breaches


Feb 12, 2023
Using the blockchain to prevent data breaches


Check out out all the on-desire classes from the Intelligent Security Summit right here.

Info breaches have, however, turn out to be an all-far too-typical actuality. The Varonis 2021 Info Danger Report implies that most organizations have lousy cybersecurity procedures and unprotected facts, making them susceptible to cyberattacks and info decline.

With a solitary data breach costing a business an normal of $3.86 million and eroding a brand’s popularity and its consumers’ have confidence in, mitigating the dangers is no for a longer period a luxury. Even so, as cyberattacks get far more pervasive and complex, simply patching up regular cybersecurity actions may perhaps not be sufficient to fend off upcoming facts breaches.

As a substitute, it’s critical to start off trying to get a lot more highly developed protection options. As considerably as modern methods go, preventing info breaches by using the blockchain could be our ideal hope.

Blockchain technology 101

Blockchain technology, also referred to as distributed ledger know-how (DLT), is the fruits of a long time of research and development in cryptography and cybersecurity. The phrase “blockchain” was 1st popularized many thanks to cryptocurrency, as it’s the technological innovation powering record-retaining in the Bitcoin community. 


Intelligent Stability Summit On-Desire

Understand the vital role of AI & ML in cybersecurity and market specific case studies. Look at on-desire sessions these days.

Check out Below

This technological innovation will make it extremely tough to adjust or hack a process, as it allows for the info to be recorded and dispersed but not copied. Due to the fact it supplies a model-new technique to storing facts securely, it can be a promising answer for information breaches in any surroundings with higher-stability requirements.

Developed on the concept of P2P networks, a blockchain is a community, digital ledger of stored details shared across a complete network of computer methods. Each individual block holds quite a few transactions, and whenever a new transaction occurs, a report of that transaction receives included to just about every community participant’s ledger.

Its sturdy encryption and decentralized and immutable mother nature could be the reply to protecting against information breaches.

Boosting facts safety by way of encryption

Entire world Extensive Net inventor Tim Berners-Lee has claimed a short while ago that “we’ve shed command of our personalized data.” Corporations retailer great amounts of individually identifiable details (PII), together with usernames, passwords, payment aspects, and even social protection quantities, as the Domino’s details leak in India (among other people) has produced clear.

Although this details is nearly often encrypted, it’s in no way as safe as it would be in a blockchain. By building use of the ideal features of cryptography, blockchain can finally set an finish to info breaches.

How can a shared ledger be a lot more secure than standard encryption techniques?

To safe stored data, blockchain employs two unique styles of cryptographic algorithms: hash capabilities and uneven-crucial algorithms. This way, the knowledge can only be shared with the member’s consent, and they can also specify how the recipient of their data can use the facts and the window of time in which the recipient is authorized to do so.

Hash functions

When the initially transaction of a chain happens, the blockchain’s code presents it a exclusive hash value. As a lot more transactions occur, their hash values are then hashed and encoded into a Merkle tree, thus generating a block. Just about every block receives a distinctive hash with the hash of the past block’s header and timestamp encoded.

This produces a website link amongst the two blocks, which, in transform, turns into the first url in the chain. Considering that this website link is produced working with exclusive data from each block, the two are immutably bound.

Asymmetric encryption

Asymmetric encryption, also identified as community-essential cryptography, encrypts basic textual content making use of two keys: a non-public crucial that is commonly generated by means of a random range algorithm, and a community one. The general public vital is out there freely and can be transferred about unsecured channels.

On the other hand, the personal critical is held a top secret so that only the user can know it. With no it, it’s just about unachievable to entry the knowledge. It functions as a digital signature, like serious-entire world signatures.

This way, blockchain offers individual individuals the ability to regulate their individual info and specify with whom to share it above cryptographically encoded networks. 


A principal purpose for the increase in information breaches is around-reliance on centralized servers. When consumers and app buyers enter their individual knowledge, it is straight penned into the company’s database, and the user does not get substantially say in what takes place to it afterward.

Even if consumers endeavor to limit the information the company can share with third parties, there will be loopholes to exploit. As the Facebook–Cambridge Analytica data-mining scandal showed, the effects of these kinds of centralization can be catastrophic. In addition, even assuming goodwill, the company’s servers could nonetheless get hacked by cybercriminals.

In contrast, blockchains are decentralized, immutable documents of info. This decentralization eliminates the need to have for 1 reliable, centralized authority to validate info integrity. As a substitute, it permits users to share details in a trustless environment. Just about every member has accessibility to their own data, a method regarded as zero-know-how storage.

This also makes the community a lot less probably to fall sufferer to hackers. Until they bring down the full community concurrently, the undamaged nodes will quickly detect the intrusion.

Due to the fact decentralization reduces details of weak point, blockchains also have a considerably lessen chance of succumbing to an IP-dependent DDoS assault than centralized devices applying customer/server architectures.


In addition to remaining decentralized, blockchains are also made to be immutable, which increases details integrity. The blockchains’ immutability would make all the data saved therein pretty much difficult to change.

Mainly because every single person in the network has obtain to a duplicate of the distributed ledger, any corruption that occurs in a member’s ledger will mechanically trigger it to be turned down by the relaxation of the community members. Hence, any alteration or transform in the block info will lead to inconsistency and split the blockchain, rendering it invalid.

The bottom line

Even however blockchain engineering has been around since 2009, it has a lot untapped prospective in the subject of cybersecurity, primarily when it comes to avoiding information breaches.

The top-notch cryptography employed by blockchain protocols guarantees the security of all data stored in the ledger, generating it a promising option.

Because nodes functioning the blockchain have to constantly validate any transaction’s validity ahead of it is executed, cybercriminals are pretty much confirmed to be stopped in their tracks before they attain access to any non-public facts.

Jenelle Fulton-Brown is a protection architect and internet privacy advocate based in Toronto, Canada helping Fortune 500 corporations establish foreseeable future-evidence interior methods.


Welcome to the VentureBeat local community!

DataDecisionMakers is where authorities, which include the specialized people undertaking information get the job done, can share information-related insights and innovation.

If you want to browse about chopping-edge suggestions and up-to-date facts, finest techniques, and the upcoming of knowledge and information tech, join us at DataDecisionMakers.

You might even consider contributing an article of your very own!

Study Extra From DataDecisionMakers

Leave a Reply

Your email address will not be published. Required fields are marked *