海角大神

Modern field guide to security and privacy

Opinion: The tech behind Bitcoin could reinvent cybersecurity

Blockchains track, record, and secure transactions made within the virtual currency Bitcoin. They can also help defend many critical systems from devastating cyberattacks.

|
David Gray/Reuters/File
A customer of an Australian bank walks away after withdrawing money from an ATM next to a Bitcoin ATM.

Given the recent cyberattacks on critical infrastructure around the worldsuch as the Christmas 2016 power outage in听Ukraine, which left more than 200,000 people in the dark, the task of protecting vital systems and networks has become an issue of pressing global importance.

Meeting that challenge requires improving digital security standards and practices across all industries. It also demands investing in the听newest and most promising technologies such as blockchains.

Though Bitcoin gets most of the press, the technology undergirding it 鈥 blockchains 鈥 has the听potential to transform business, and maybe even revolutionize cybersecurity.听

A blockchain is simply an online ledger, e.g., a distributed database听of who owns what. The database is separated into transactions,听called听blocks. Once a new block is added to the chain, the data in the block cannot be changed, the digital equivalent of etching a Bitcoin transaction in stone.

From making businesses more efficient to recording property deeds to听, a range of huge organizations are investigating in new ways to deploy blockchain technology. Startups in the space have attracted 听Even the Defense Advanced Research Projects Agency, the Pentagon's experimental brain trust,听is researching blockchain technology to "create an unhackable messaging system."

But to date, relatively few firms are exploring the application of blockchain technology to help safeguard critical infrastructure. That needs to change, both on the part of US business leaders and policymakers.

One example of this kind of innovation is already underway. The cybersecurity firm听Guardtime uses听blockchain technology to secure Britain鈥檚 power grid, including its nuclear power plants and flood defenses. Guardtime uses blockchain technology known as Keyless Signature Infrastructure (KSI) to detect 鈥渦nauthorized changes in software configurations [by] ... providing a complete chain of the history of the data that is generated and transmitted.鈥

Estonia is also using Guardtime's approach and looking into ways blockchains can authenticate听marriage records and health data. US critical infrastructure operators and policymakers could learn from Estonia鈥檚 experimentation, while understanding the of the technology.

The anonymous developer known as Satoshi Nakamoto outlined the protocol that听leveraged peer-to-peer technology to create Bitcoin. It's a deceptively simple 听that "set off a spark that has excited, terrified, or otherwise captured the imagination of the computing world and has spread like wildfire." Netscape cocreator Marc Andreessen听 the innovation 鈥渢he distributed trust network that the internet always needed and never had.鈥

Indeed, blockchains have the potential to, according to the听, 鈥渢ransform how people and businesses cooperate.鈥 Such an outcome is by no means predetermined with an array of technological, economic, political, and governance听issues听to be overcome.

Undoubtedly, there is significant hype associated with blockchains, and they will be improperly deployed in some scenarios where a more traditional ledger might be suitable. However, in security, there is frequently a need for an authentic log of data, transactions, and records. If the authenticity of such records is mutable by a few authorities, then there is concern that targeted foul play can lead to untrustworthy records. Alternately, in some scenarios there are few clear authorities that should be trusted to establish authenticity 鈥 and those authorities may not themselves have mutual trust 鈥 meaning that a more grassroots approach is necessary.

Still, the promise of this technology, especially in the context of enhancing cybersecurity in听critical听infrastructure听systems, deserves our sustained attention. In other words, a sustainable blockchain edifice will not be built overnight, it will take ongoing attention by numerous stakeholders 鈥 including policymakers 鈥 over a period of years, perhaps decades. But by starting now, block-by-block, we can build trust in an age that has to date been defined by increasing cyber insecurity.

Scott Shackelford is an associate professor of business law and ethics at the Indiana University Kelley School of Business, as well as director of the , and Cybersecurity Program Chair of IU鈥檚 . He is also a research fellow at the Harvard Kennedy School.

Steven Myers is an associate professor in the Department of Computer Science in the School of Informatics and Computing at Indiana University, where he is also the School's Security Programs Director, and听a member of the Center for Applied Cybersecurity.听

The full article on which this essay is based, 鈥淏lock-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace鈥 is forthcoming in the Yale Journal of Law and Technology.听

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Opinion: The tech behind Bitcoin could reinvent cybersecurity
Read this article in
/World/Passcode/Passcode-Voices/2017/0227/Opinion-The-tech-behind-Bitcoin-could-reinvent-cybersecurity
QR Code to Subscription page
Start your subscription today
/subscribe