Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

Research Article

Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End

Download201 downloads
  • @INPROCEEDINGS{10.4108/eai.24-3-2022.2318925,
        author={Mohd Azeem Faizi Noor and Khurram  Mustafa},
        title={Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End},
        proceedings={Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India},
        publisher={EAI},
        proceedings_a={ICIDSSD},
        year={2023},
        month={5},
        keywords={endpoint security blockchain protocols remote browser isolation trusted execution  environment},
        doi={10.4108/eai.24-3-2022.2318925}
    }
    
  • Mohd Azeem Faizi Noor
    Khurram Mustafa
    Year: 2023
    Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End
    ICIDSSD
    EAI
    DOI: 10.4108/eai.24-3-2022.2318925
Mohd Azeem Faizi Noor1,*, Khurram Mustafa1
  • 1: Jamia Millia Islamia
*Contact email: basilhanafi@gmail.com

Abstract

Blockchain is a distributed, immutable ledger that is used to record transactions, track assets, and build trust. Prominent among the several desirable assurances is enhanced security. It appears to be secure in the sense that no one can change data without the knowledge of other participants. Despite the fact that Blockchain can provide a tamper-proof record of transactions, it is not immune to ever-increasing attacks. Endpoint insecurity risks jeopardize users' privacy, sensitive data, and system resources. Sensitive information leads to the disclosure of the private key, which may lead to losses including crypto-currency from the user's wallet. Previous experiences reveal and enable us to witness many typical attacks. In such cases, the invaders injected malicious codes and gained access to the user's email, after which they used the user's sensitive data for their nefarious purposes. They have been continuously benefited by the malicious codes. As a result, we review vulnerabilities, hacking and the risks associated with it. Some simplistic measures and security enhancement environments are identified. Thus, we highlight a few highly simplistic necessary protocols, recommendations, and technology as a solution to avoid endpoint exploitation at the user's end.