Cyber Chain – Merging Blockchain with Cyber Security

Authors

  • Sayali Madane
  • Vaishnavi Kamble
  • Girish Chavan Student

DOI:

https://doi.org/10.22399/ijasrar.42

Keywords:

Cyber chain, blockchain, cyber security

Abstract

The new digital economy is plagued by profound flaws because it relies on centralised systems
with a single control point that are attractive and easy targets for cyber attackers. This study
examines how Blockchain Technology can remedy these inherent security vulnerabilities.
Blockchain is powerful due to three central properties: decentralisation, data dispersed among
numerous computers, cryptographic linking applying maths codes to protect data, and
immutability, data records that cannot be altered.This paper discusses how BT develops Self-Sovereign Identity SSI systems, providing
individuals with complete control of their digital IDs and preventing mass identity theft. It
further discusses its applications in securing IoT devices and verifying the integrity and
authenticity of essential information. Key findings distilled from existing literature affirm the
technology's potential but outline principal stumbling blocks, such as the problem of scalability,
system velocity and legal disputes with data privacy legislation, such as the right to be
forgotten. The research concludes that concentrated development on standardised enterprise
solutions will render blockchain a critical, new layer of contemporary cyber security protection.

Author Biographies

Sayali Madane

Final Year Student of Bachelors of Bussiness Administration in Computer Application at MIT Arts, Commerce and Science College Alandi - (D), Pune, India.

Vaishnavi Kamble

Final Year Student of Bachelors of Business Administration in Computer Application at MIT Arts, Commerce and Science College Alandi - (D), Pune, India.

References

1. U.S. House Committee on Financial Services. (2025, September 22). Oversight and

Investigations Subcommittee Evaluates Growing Threat of Financial Fraud to American

Consumers. Retrieved from

https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=410882

2. PurpleSec. (2025, September 22). Common Types of Network Security Vulnerabilities.

Retrieved from https://purplesec.us/learn/common-network-vulnerabilities/

3. Wisconsin Bank & Trust. (2025, September 22). Identity Theft in the Digital Age: How to

Protect Your Dat

4. a Privacy from Fraudsters. Retrieved from

https://www.wisconsinbankandtrust.com/resources/blog-post/identity-theft-digital-age

how-protect-your-data-privacy-fraudsters

5. Freeman Law. (2025, September 22). Blockchain Technology Explained: What is

Blockchain and How Does It Work? Retrieved from https://freemanlaw.com/blockchain

technology-explained-what-is-blockchain-and-how-does-it-work-2/

6. Oxford Academic. (2025, September 22). Governance and Societal Impact of

Blockchain-Based Self-Sovereign Identities. Policy and Society. Retrieved from

https://academic.oup.com/policyandsociety/article/41/3/402/6607711

6

7. LA Blockchain Summit. (2025, September 22). Blockchain vs. Traditional Databases:

Key Differences. Retrieved from https://lablockchainsummit.com/blockchain-key

concepts/traditional-database-vs-blockchain

8. Rapid Innovation. (2025, September 22). Blockchain vs. Traditional Databases: Ultimate

Enterprise Guide 2024. Retrieved from https://www.rapidinnovation.io/post/enterprise

blockchain-vs-traditional-databases-comprehensive-comparison

9. PixelPlex. (2025, September 22). Blockchain Database vs Traditional Database:

Choosing the Best For Your Project. Retrieved from https://pixelplex.io/blog/blockchain

database-vs-traditional-database/

10. Okta. (2025, September 22). Decentralized Identity: The Future of Digital Identity

Management. Retrieved from https://www.okta.com/blog/identity-security/what-is

decentralized-identity/

11. The King’s Mark. (2025, September 22). Decentralization, Immutability, Transparency,

Security. Retrieved from https://kingmarked.com/docs/decentralization-immutability

transparency-security/

12. GeeksforGeeks. (2025, September 22). Role of Blockchain in Cybersecurity. Retrieved

from https://www.geeksforgeeks.org/computer-networks/role-of-blockchain-in

cybersecurity/

13. Web Asha Technologies. (2025, September 22). How Blockchain is Solving Modern

Cybersecurity Challenges. Retrieved from https://www.webasha.com/blog/how

blockchain-is-solving-modern-cybersecurity-challenges

14. Spydra. (2025, September 22). Decoding Blockchain Immutability: What Keeps Networks

Unchangeable? Retrieved from https://www.spydra.app/blog/decoding-blockchain

immutability-what-keeps-networks-unchangeable

15. MojoAuth. (2025, September 22). Securing the Future: Blockchain-Based Audit Trails in

IAM, Passwordless, Threat, and Breach Contexts. Retrieved from

https://mojoauth.com/ciam-101/blockchain-audit-trails-iam-passwordless-threat-breach

16. IBM. (2025, September 22). What Is Blockchain Security? Retrieved from

https://www.ibm.com/think/topics/blockchain-security

17. Amazon Web Services (AWS). (2025, September 22). What Is Blockchain? Retrieved

from https://aws.amazon.com/what-is/blockchain/

18. Dock Labs. (2025, September 22). Self-Sovereign Identity: The Ultimate Guide 2025.

Retrieved from https://www.dock.io/post/self-sovereign-identity

19. Integritee Network. (2025, September 22). Blockchain and Cybersecurity: Can

Decentralization Solve the Biggest Security Challenges? Medium. Retrieved from

https://medium.com/integritee/blockchain-and-cybersecurity-can-decentralization-solve

the-biggest-security-challenges-b93f72cf9394

20. MyShyft. (2025, September 22). Blockchain Audit Trails: Revolutionizing Enterprise

Scheduling Technology. Retrieved from https://www.myshyft.com/blog/blockchain-for

audit-trails/

21. IBM. (2025, September 22). Blockchain for Supply Chain. Retrieved from

https://www.ibm.com/solutions/blockchain-supply-chain

22. Deloitte. (2025, September 22). Using Blockchain to Drive Supply Chain Transparency

and Innovation.

Downloads

Published

2025-11-09

How to Cite

Madane, S., Kamble, V., & Chavan, G. (2025). Cyber Chain – Merging Blockchain with Cyber Security. International Journal of Applied Sciences and Radiation Research , 2(1). https://doi.org/10.22399/ijasrar.42

Issue

Section

Articles