Skip to main content

The Utilization of Blockchain for Enhancing Big Data Security and Veracity

  • Chapter
  • First Online:
Combating Security Challenges in the Age of Big Data

Abstract

Blockchain as one of technological hype in digital economy besides the Internet-of-Things (IoT) and Big Data Analytic, fills the need of a secured peer-to-peer connection with the concept of distributed database. However, it does not eliminate the centralized database on massive data storage which it is the core of Big Data. Blockchain is more suitable for information log, a kind of application that requires dynamic and updated information with hierarchical hash security features to support a distributed database system. The Blockchain features are prospective to enhance the security of Big Data from attacks to its CIA Triad, namely Confidentiality, Integrity, and Availability. As information has become a crucial and critical to business, meanwhile managing a huge-volume data is also challenging in terms of its security and veracity, therefore Blockchain technology can be considered as a prospective solution. Based on our study, we found that Blockchain can enhance the security of Big Data by strengthening the security of the data storage, enhancing the data integrity using digital certificate and chaining the block using hash of previous block, and enhancing data availability using peer-to-peer transmission, distributed nodes, and consensus method. Blockchain can also enhance the performance of Big Data Analytic by providing a better data veracity from token-based validation to enhance the truth discovery, and ID decentralization to prove the identity of data source.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IBM (2017) Big data analytics. https://www.ibm.com/analytics/hadoop/big-data-analytics. Accessed 11 Feb 2019

  2. El-Seoud E-S, Abdelfattah M (2017) Big data and cloud computing: trends and challenges. iJIM 11(2):2017

    Google Scholar 

  3. Leskin P (2018) The 21 scariest data breaches of 2018. https://www.businessinsider.sg/data-hacks-breaches-biggest-of-2018-2018-12/?r=US&IR=T. Accessed 11 Feb 2019

  4. Puget JP (2015) Optimization is ready for big data: part 4, veracity. https://www.ibm.com/developerworks/community/blogs/jfp/entry/optimization_is_ready_for_big_data_part_4_veracity?lang=en. Accessed 11 Feb 2018

  5. Garrick H, Michels R (2017) Global Blockchain benchmarking study. University of Cambridge, Cambridge, p 20

    Google Scholar 

  6. Wibowo S, Ery PH (2018) Jangan Pakai Blockchain! https://inet.detik.com/cyberlife/d-4053073/jangan-pakai-blockchain. Accessed 11 Feb 2019

  7. Nikolai K (2018) From PoS to dBFT: a brief review of consensus protocols. https://cointelegraph.com/news/from-pos-to-dbft-a-brief-review-of-consensus-protocols/amp. Accessed 8 Dec 2018

  8. The Hyperledger Architecture Working Group (WG). Hyperledger Architecture, Volume 1: Introduction to Hyperledger Business Blockchain Design Philosophy and Consensus

    Google Scholar 

  9. Satriyo W, Ery PH (2018) Blockchain Implementation Assessment Framework, Case Study of IoT LPWA Licensing in Indonesia, 2018 International Conference on ICT for Smart Society. ISBN 978–1–5386-6589-3/18

    Google Scholar 

  10. Leavitt HJ (1964) Applied organization change in industry: structural, technical and human approaches. In: Cooper W, Leavitt HJ, Shelly MWI (eds) New perspectives in organization research. John Wiley, New York, pp 55–71

    Google Scholar 

  11. Es-Samaali H, Outchakoucht A, Leroy JP (2017) A Blockchain-based Access Control for Big data. Int J Comput Netw Commun Secur 5(7), July 2017, 137–147, E-ISSN 2308–9830 (Online)/ISSN 2410–0595 (Print)

    Google Scholar 

  12. Ayyub A, Mazhar AM (2018) Confidentiality in Blockchain. Int J Eng Sci Invent (IJESI), ISSN (Online): 2319–6734, ISSN (Print): 2319–6726. www.ijesi.org ||Volume 7 Issue 1|| January 2018 || PP 50–52

  13. Garg P (2018) Bettium: the betting platform will operate at intersection of big data and Blockchain. https://btcmanager.com/bettium-the-betting-platform-will-operate-at-intersection-of-big-data-and-blockchain/?q=/bettium-the-betting-platform-will-operate-at-intersection-of-big-data-and-blockchain/&. Accessed 12 Feb 2019

  14. Guest P (2019) How big data and Blockchain technology will change tourism forever. https://btcmanager.com/big-data-blockchain-tech-will-change-tourism-forever/?q=/big-data-blockchain-tech-will-change-tourism-forever/&. Accessed 12 Feb 2019

  15. Report.az (2017) Banks change SWIFT to blockchain system. https://report.az/en/finance/banks-change-swift-to-blockchain-system/. Accessed 12 Feb 2019

  16. Berti-Equille L, Borge-Holthoefer J (2015) Veracity of big data. https://hal.inria.fr/hal-01856326/document.

  17. Hara (2018). Blockchain for better decisions: a global & transparent Blockchain-based data exchange. Whitepaper. https://haratoken.io/doc/ HARA_Token_White_Paper_v20181206.pdf. Accessed 14 Feb 2019

  18. Kemenhub P (2018) Metode Implementasi Blockchain Dalam Aplikasi Siasati, Academic Study, Unpublished

    Google Scholar 

  19. Parisa K (2017) Protecting data privacy in the presence of data provenance, Dissertation, University of California Davis

    Google Scholar 

  20. Dey SC, Zinn D, Ludäscher B (2011) ProPub: towards a declarative approach for publishing customized, policy-aware provenance. 225–243. https://doi.org/10.1007/978-3-642-22351-8_13

    Google Scholar 

  21. W3C Community Group (2019) Decentralized Identifiers (DIDs) v0.11. https://w3c-ccg.github.io/did-spec/. Accessed 11 Feb 2019

  22. Chami A (2019) Digital ID – a report on the digital identity landscape & providers. Blockchain Learning Group, Inc.& Blockscale Solutions. https://blockchainlearninggroup.com. Accessed 11 Feb 2019

  23. Agarwal B, Ravikumar A, Saha S (2016) A novel approach to big data veracity using crowdsourcing techniques and Bayesian predictors. https://doi.org/10.1145/2998476.2998498. https://dl.acm.org/citation.cfm?id=2998498. Accessed 11 Feb 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satriyo Wibowo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wibowo, S., Sumari, A.D.W. (2020). The Utilization of Blockchain for Enhancing Big Data Security and Veracity. In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35642-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35641-5

  • Online ISBN: 978-3-030-35642-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics