
Volume 12, Issue 3 (March 2025), Pages: 10-19

----------------------------------------------
Original Research Paper
Developing a framework for securing blockchain-driven systems with large amounts of data
Author(s):
Mahmoud Ahmad Al-Khasawneh 1, 2, Marwan Mahmoud 3, *
Affiliation(s):
1Department of Computer Science, College of Computer Science and Engineering, Taibah University, Medina, Saudi Arabia
2Applied Science Research Center, Applied Science Private University, Amman, Jordan
3The Applied College, King Abdulaziz University, Jeddah, Saudi Arabia
Full text
Full Text - PDF
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0000-0002-0787-8225
Digital Object Identifier (DOI)
https://doi.org/10.21833/ijaas.2025.03.002
Abstract
The rapid expansion of big data has boosted advancements in fields such as healthcare, finance, and marketing. However, handling and storing large amounts of sensitive data have raised significant concerns due to security and privacy risks. Research suggests that blockchain technology could help address these challenges to some extent. This study aims to create a framework for securing big-data systems powered by blockchain, using the design science method. The framework includes seven key components: authentication and access control, data encryption and key management, privacy and confidentiality, data integrity and authenticity, data provenance and audit trails, intrusion detection and prevention, and incident response and recovery. This framework allows organizations to harness the potential of big data without risking data integrity or privacy. The findings indicate that this framework offers comprehensive guidelines for safely using big data across different sectors. Combining blockchain and big data can safeguard sensitive information, ushering in a new era of secure, data-driven innovation and trust.
© 2025 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords
Big data, Blockchain technology, Design science research, Integrity, Privacy
Article history
Received 24 March 2024, Received in revised form 19 January 2025, Accepted 12 February 2025
Acknowledgment
No Acknowledgment.
Compliance with ethical standards
Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Citation:
Al-Khasawneh MA and Mahmoud M (2025). Developing a framework for securing blockchain-driven systems with large amounts of data. International Journal of Advanced and Applied Sciences, 12(3): 10-19
Permanent Link to this page
Figures
Fig. 1 Fig. 2 Fig. 3 Fig. 4
Tables
Table 1 Table 2 Table 3
----------------------------------------------
References (31)
- Alotaibi FM, Al-Dhaqm A, Yafooz WM, and Al-Otaibi YD (2023). A novel administration model for managing and organising the heterogeneous information security policy field. Applied Sciences, 13(17): 9703. https://doi.org/10.3390/app13179703 [Google Scholar]
- Badr B, Horrocks R, and Wu XB (2018). Blockchain by example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger. Packt Publishing Ltd., Birmingham, UK. [Google Scholar]
- Casas P, Soro F, Vanerio J, Settanni G, and D'Alconzo A (2017). Network security and anomaly detection with Big-DAMA, a big data analytics framework. In the IEEE 6th International Conference on Cloud Networking, IEEE, Prague, Czech Republic: 1-7. https://doi.org/10.1109/CloudNet.2017.8071525 [Google Scholar]
- Chen HM, Kazman R, Monarch I, and Wang P (2016). Predicting and fixing vulnerabilities before they occur: A big data approach. In the 2nd International Workshop on BIG Data Software Engineering, Association for Computing Machinery, Austin, USA: 72-75. https://doi.org/10.1145/2896825.2896829 [Google Scholar]
- Dong X, Li R, He H, Zhou W, Xue Z, and Wu H (2015). Secure sensitive data sharing on a big data platform. Tsinghua Science and Technology, 20(1): 72-80. https://doi.org/10.1109/TST.2015.7040516 [Google Scholar]
- Gottwalt F and Karduck AP (2015). SIM in light of big data. In the 11th International Conference on Innovations in Information Technology, IEEE, Dubai, UAE: 326-331. https://doi.org/10.1109/INNOVATIONS.2015.7381562 [Google Scholar]
- Guan Z, Zhao Y, Li D, and Liu J (2018). TBDCT: A framework of trusted big data collection and trade system based on blockchain and TSM. In the IEEE International Conference on Smart Cloud, IEEE, New York, USA: 77-83. https://doi.org/10.1109/SmartCloud.2018.00021 [Google Scholar]
- Jaiswal M (2020). Cryptocurrency an era of digital currency. International Journal of Creative Research Thoughts, 8(1): 60-70. [Google Scholar]
- Juma M, Alattar F, and Touqan B (2023). Securing big data integrity for industrial IoT in smart manufacturing based on the trusted consortium blockchain (TCB). IoT, 4(1): 27-55. https://doi.org/10.3390/iot4010002 [Google Scholar]
- Keshk M, Turnbull B, Moustafa N, Vatsalan D, and Choo KKR (2019). A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Transactions on Industrial Informatics, 16(8): 5110-5118. https://doi.org/10.1109/TII.2019.2957140 [Google Scholar]
- Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N, and Hassan MM (2021). A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system. IEEE Transactions on Intelligent Transportation Systems, 23(9): 16492-16503. https://doi.org/10.1109/TITS.2021.3098636 [Google Scholar]
- Laney D (2001). 3D data management: Controlling data volume, velocity, and variety, Application delivery strategies. META Group Inc., Stamford, USA. [Google Scholar]
- Las-Casas PH, Dias VS, Meira W, and Guedes D (2016). A big data architecture for security data and its application to phishing characterization. In the 2nd International Conference on Big Data Security on Cloud; IEEE International Conference on High Performance and Smart Computing; and IEEE International Conference on Intelligent Data and Security, IEEE, New York, USA: 36-41. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.44 [Google Scholar]
- Liu C, Cai Y, and Wang T (2016). Security evaluation of RC4 using big data analytics. In the 7th IEEE International Conference on Software Engineering and Service Science, IEEE, Beijing, China: 316-320. https://doi.org/10.1109/ICSESS.2016.7883075 [Google Scholar] PMid:27468472
- Liu L, Li J, Lv J, Wang J, Zhao S, and Lu Q (2024). Privacy-preserving and secure industrial big data analytics: A survey and the research framework. IEEE Internet of Things Journal, 11(11): 18976-18999. https://doi.org/10.1109/JIOT.2024.3353727 [Google Scholar]
- Makhdoom I, Zhou I, Abolhasan M, Lipman J, and Ni W (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers and Security, 88: 101653. https://doi.org/10.1016/j.cose.2019.101653 [Google Scholar]
- Miloslavskaya N (2017). Security intelligence centers for big data processing. In the 5th International Conference on Future Internet of Things and Cloud Workshops, IEEE, Prague, Czech Republic: 7-13. https://doi.org/10.1109/FiCloudW.2017.68 [Google Scholar]
- Naik N, Jenkins P, Savage N, and Katos V (2016). Big data security analysis approach using computational intelligence techniques in R for desktop users. In the IEEE Symposium Series on Computational Intelligence, IEEE, Athens, Greece: 1-8. https://doi.org/10.1109/SSCI.2016.7849907 [Google Scholar] PMid:27036598
- Peffers K, Tuunanen T, Rothenberger MA, and Chatterjee S (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3): 45-77. https://doi.org/10.2753/MIS0742-1222240302 [Google Scholar]
- Rahman MS, Chamikara MAP, Khalil I, and Bouras A (2022). Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city. Journal of Industrial Information Integration, 30: 100408. https://doi.org/10.1016/j.jii.2022.100408 [Google Scholar]
- Rawat DB, Doku R, and Garuba M (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6): 2055-2072. https://doi.org/10.1109/TSC.2019.2907247 [Google Scholar]
- Rittinghouse JW and Ransome JF (2017). Cloud computing: Implementation, management, and security. CRC Press, Boca Raton, USA. https://doi.org/10.1201/9781439806814 [Google Scholar]
- Soceanu A, Vasylenko M, Egner A, and Muntean T (2015). Managing the privacy and security of ehealth data. In the 20th International Conference on control systems and computer science, IEEE, Bucharest, Romania: 439-446. https://doi.org/10.1109/CSCS.2015.76 [Google Scholar]
- Tumasjan A (2024). The promise and prospects of blockchain-based decentralized business models. In: Glückler J and Panitz R (Eds.), Knowledge and digital technology: 203-224. Springer Nature, Cham, Switzerland. https://doi.org/10.1007/978-3-031-39101-9_11 [Google Scholar]
- Uchibeke UU, Schneider KA, Kassani SH, and Deters R (2018). Blockchain access control ecosystem for big data security. In the IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical and Social Computing; and IEEE Smart Data, IEEE, Halifax, Canada: 1373-1378. https://doi.org/10.1109/Cybermatics_2018.2018.00236 [Google Scholar]
- Xiao C, Wang L, Jie Z, and Chen T (2016). A multi-level intelligent selective encryption control model for multimedia big data security in sensing system with resource constraints. In the 3rd International Conference on Cyber Security and Cloud Computing, IEEE, Beijing, China: 148-153. https://doi.org/10.1109/CSCloud.2016.37 [Google Scholar]
- Yang B and Zhang T (2016). A scalable meta-model for big data security analyses. In the 2nd International Conference on Big Data Security on Cloud; IEEE International Conference on High Performance and Smart Computing; and IEEE International Conference on Intelligent Data and Security, IEEE, New York, USA: 55-60. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.71 [Google Scholar]
- Younis M, Lalouani W, Lasla N, Emokpae L, and Abdallah M (2021). Blockchain-enabled and data-driven smart healthcare solution for secure and privacy-preserving data access. IEEE Systems Journal, 16(3): 3746-3757. https://doi.org/10.1109/JSYST.2021.3092519 [Google Scholar]
- Zaki T, Uddin MS, Hasan MM, and Islam MN (2017). Security threats for big data: A study on Enron e-mail dataset. In the International Conference on Research and Innovation in Information Systems, IEEE, Langkawi, Malaysia: 1-6. https://doi.org/10.1109/ICRIIS.2017.8002481 [Google Scholar] PMid:27868424
- Zhang C, Xu Y, Hu Y, Wu J, Ren J, and Zhang Y (2021). A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Transactions on Cloud Computing, 10(4): 2252-2263. https://doi.org/10.1109/TCC.2021.3057771 [Google Scholar]
- Zhong C, Yen J, Liu P, and Erbacher RF (2016). Automate cybersecurity data triage by leveraging human analysts' cognitive process. In the 2nd International Conference on big data security on cloud; IEEE International Conference on high performance and smart computing; and IEEE International Conference on intelligent data and security, IEEE, New York, USA: 357-363. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.41 [Google Scholar] PMCid:PMC4725632
|