Research Article
Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End
@INPROCEEDINGS{10.4108/eai.24-3-2022.2318925, author={Mohd Azeem Faizi Noor and Khurram Mustafa}, title={Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End}, proceedings={Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India}, publisher={EAI}, proceedings_a={ICIDSSD}, year={2023}, month={5}, keywords={endpoint security blockchain protocols remote browser isolation trusted execution environment}, doi={10.4108/eai.24-3-2022.2318925} }
- Mohd Azeem Faizi Noor
Khurram Mustafa
Year: 2023
Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End
ICIDSSD
EAI
DOI: 10.4108/eai.24-3-2022.2318925
Abstract
Blockchain is a distributed, immutable ledger that is used to record transactions, track assets, and build trust. Prominent among the several desirable assurances is enhanced security. It appears to be secure in the sense that no one can change data without the knowledge of other participants. Despite the fact that Blockchain can provide a tamper-proof record of transactions, it is not immune to ever-increasing attacks. Endpoint insecurity risks jeopardize users' privacy, sensitive data, and system resources. Sensitive information leads to the disclosure of the private key, which may lead to losses including crypto-currency from the user's wallet. Previous experiences reveal and enable us to witness many typical attacks. In such cases, the invaders injected malicious codes and gained access to the user's email, after which they used the user's sensitive data for their nefarious purposes. They have been continuously benefited by the malicious codes. As a result, we review vulnerabilities, hacking and the risks associated with it. Some simplistic measures and security enhancement environments are identified. Thus, we highlight a few highly simplistic necessary protocols, recommendations, and technology as a solution to avoid endpoint exploitation at the user's end.