Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems – A Comparative Study | SpringerLink
Skip to main content

Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems – A Comparative Study

  • Conference paper
  • First Online:
Transfer, Diffusion and Adoption of Next-Generation Digital Technologies (TDIT 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 697))

Included in the following conference series:

  • 1051 Accesses

Abstract

The current research aims to extend the existing literature on the differentiation of Blockchain Technology (BCT) from Distributed Ledger Technology (DLT) and traditional database management systems (DBMS) on grounds of providing additional security to user applications. Through a qualitative hierarchy methodology, it identifies prominent factors contributing to the same. 31 working professionals across a range of industry types were subjected to a semi-structured interview and the interview transcripts were analysed through NVivo and Rstudio. The findings suggested that the use of BCT in various daily use applications will drastically enhance security over traditional DBMS on grounds of traceability, immutability, transparency, accountability and non-hackability of data. The implementation of BCT over DLT in applications pointed towards enhancement of security too, but considering the areas only when the technical novelty of BCT is needed over the already robust DLT. While some industries would benefit straightaway, some need to strategically set their requirements on grounds of application security and think mindfully before implementing BCT considering the enhanced technical novelty of the same for visibly reaping its benefits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 12583
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 15729
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 15729
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Ahsan, Z.B., Gupta, A., Kar, A.K.: The effect of countries’ independent regulation on cryptocurrency markets. J. Glob. Inf. Manag. (JGIM) 31(1), 1–32 (2023)

    Article  Google Scholar 

  • Asante, M., Epiphaniou, G., Maple, C., Al-Khateeb, H., Bottarelli, M., Ghafoor, K.Z.: Distributed ledger technologies in supply chain security management: a comprehensive survey. IEEE Trans. Eng. Manage. 70(2), 713–739 (2021)

    Article  Google Scholar 

  • Balapour, A., Nikkhah, H.R., Sabherwal, R.: Mobile application security: role of perceived privacy as the predictor of security perceptions. Int. J. Inf. Manag. 52, 102063 (2020)

    Article  Google Scholar 

  • Batta, A., Gandhi, M., Kar, A.K., Loganayagam, N., Ilavarasan, V.: Diffusion of blockchain in logistics and transportation industry: an analysis through the synthesis of academic and trade literature. J. Sci. Technol. Policy Manag. 12(3), 378–398 (2021)

    Article  Google Scholar 

  • Bodkhe, U., et al.: Blockchain for industry 4.0: a comprehensive review. IEEE Access 8, 79764–79800 (2020)

    Article  Google Scholar 

  • Braun, V., Clarke, V.: Thematic Analysis. American Psychological Association (2012)

    Book  Google Scholar 

  • Chuen, L.K.: Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data (No. 147850). Academic (2015)

    Google Scholar 

  • Grover, P., Kar, A.K., Janssen, M.: Diffusion of blockchain technology: insights from academic literature and social media analytics. J. Enterp. Inf. Manag. 32(5), 735–757 (2019)

    Article  Google Scholar 

  • Harris, M.A., Brookshire, R., Chin, A.G.: Identifying factors influencing consumers’ intent to install mobile applications. Int. J. Inf. Manag. 36(3), 441–450 (2016)

    Article  Google Scholar 

  • Hong, W., Thong, J.Y.: Internet privacy concerns: an integrated conceptualization and four empirical studies. Mis Q. 275–298 (2013)

    Google Scholar 

  • Johnston, A.C., Warkentin, M.: Fear appeals and information security behaviors: an empirical study. MIS Q. 549–566 (2010)

    Google Scholar 

  • Joo, M., Kim, S.H., Ghose, A., Wilbur, K.C.: Designing distributed ledger technologies, like blockchain, for advertising markets. Int. J. Res. Mark. 40(1), 12–21 (2023)

    Article  Google Scholar 

  • Kamble, S.S., Gunasekaran, A., Sharma, R.: Modeling the blockchain enabled traceability in agriculture supply chain. Int. J. Inf. Manag. 52, 101967 (2020)

    Article  Google Scholar 

  • Kar, A.K., Navin, L.: Diffusion of blockchain in insurance industry: an analysis through the review of academic and trade literature. Telematics Inform. 58, 101532 (2021)

    Article  Google Scholar 

  • Kar, A.K., Varsha, P.S.: Unravelling the techno-functional building blocks of Metaverse ecosystems–a review and research agenda. Int. J. Inf. Manag. Data Insights, 100176 (2023)

    Google Scholar 

  • Keith, M.J., Babb, J.S., Lowry, P.B., Furner, C.P., Abdullat, A.: The role of mobile-computing self-efficacy in consumer information disclosure. Inf. Syst. J. 25(6), 637–667 (2015)

    Article  Google Scholar 

  • Khanuja, H.K., Adane, D.S.: Database security threats and challenges in database forensic: a survey. In: Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), pp. 170–175 (2011). http://www.ipcsit.com/vol20/33-ICAIT2011-A4072.pdf

  • Kim, D.J., Steinfield, C., Lai, Y.J.: Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decis. Support. Syst. 44(4), 1000–1015 (2008)

    Article  Google Scholar 

  • Malik, N., Tripathi, S.N., Kar, A.K., Gupta, S.: Impact of artificial intelligence on employees working in industry 4.0 led organizations. Int. J. Man-Power 43(2), 334–354 (2021)

    Google Scholar 

  • Medeiros, I., Beatriz, M., Neves, N., Correia, M.: SEPTIC: detecting injection attacks and vulnerabilities inside the DBMS. IEEE Trans. Reliab. 68(3), 1168–1188 (2019)

    Article  Google Scholar 

  • Morkunas, V.J., Paschen, J., Boon, E.: How blockchain technologies impact your business model. Bus. Horiz. 62(3), 295–306 (2019)

    Article  Google Scholar 

  • Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. (2008)

    Google Scholar 

  • Pavlou, P.A., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Q. 105–136 (2007)

    Google Scholar 

  • Posey, C., Roberts, T.L., Lowry, P.B., Hightower, R.T.: Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Inf. Manag. 51(5), 551–567 (2014)

    Article  Google Scholar 

  • Prakash, R., Anoop, V.S., Asharaf, S.: Blockchain technology for cybersecurity: a text mining literature analysis. Int. J. Inf. Manag. Data Insights 2(2), 100112 (2022)

    Google Scholar 

  • Shropshire, J.D., Warkentin, M., Johnston, A.C.: Impact of negative message framing on security adoption. J. Comput. Inf. Syst. 51(1), 41–51 (2010)

    Google Scholar 

  • Wamba, S.F., Queiroz, M.M.: Blockchain in the operations and supply chain management: benefits, challenges and future research opportunities. Int. J. Inf. Manage. 52, 102064 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhadeep Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mandal, S., Kar, A.K., Gupta, S. (2024). Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems – A Comparative Study. In: Sharma, S.K., Dwivedi, Y.K., Metri, B., Lal, B., Elbanna, A. (eds) Transfer, Diffusion and Adoption of Next-Generation Digital Technologies. TDIT 2023. IFIP Advances in Information and Communication Technology, vol 697. Springer, Cham. https://doi.org/10.1007/978-3-031-50188-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-50188-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-50187-6

  • Online ISBN: 978-3-031-50188-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics