Review of Blockchain Technology on Data Security and Privacy: Recommendations for Advancing Tanzania's ICT Sector

Main Article Content

Lazaro Inon Kumbo
Deogratias Tasilo Mahuwi
Bernad Joseph Hayuma
Victor Simon Nkwera
Christopher Denis Ntyangiri
Martin Ludovick Mushi

Abstract

The rapid growth of the ICT sector has led to increased global data exchange and innovation opportunities. The increased use of technology has brought about concerns regarding data security and privacy which triggered a rising interest in blockchain technology as a potential solution to security challenges. This research endeavours to comprehensively examine the influence of blockchain on data security and privacy inside and outside Tanzanian, filling the gap that exists. The blended approach was used to analyse blockchain's effects while focusing on ethical considerations. The review emphasizes the benefits of blockchain in enhancing data security, trust, and transparency, along with its various applications. The research highlights blockchain technology's potential to offer robust data protection and improve transparency while identifying the challenges that must be addressed for successful implementation. The study investigates the role of blockchain in securing information systems in global and Tanzanian settings, focusing on sectors such as healthcare, banking, education, and land registration. The study emphasises the significant potential of blockchain technology to impact various industries in Tanzania profoundly. It offers valuable insights for professionals, policymakers, and researchers, highlighting the need to investigate how blockchain can be applied explicitly within different sectors. Additionally, it suggests practical strategies for seamlessly integrating this technology, considering the unique challenges the Tanzanian ICT sector encounters.

Article Details

How to Cite
[1]
L. I. Kumbo, D. T. Mahuwi, B. J. Hayuma, V. S. Nkwera, C. D. Ntyangiri, and M. L. Mushi, “Review of Blockchain Technology on Data Security and Privacy: Recommendations for Advancing Tanzania’s ICT Sector”, AJERD, vol. 7, no. 2, pp. 475–483, Oct. 2024.
Section
Articles

References

Wang, H. (2022). Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime. Journal of Global Information Management (JGIM), 30(7), 1-16. http://doi.org/10.4018/JGIM.295450.

Mwemezi, J., & Mandari, H. (2024). Big data analytics usage in the banking industry in Tanzania: does perceived risk play a moderating role on the technological factors, Journal of Electronic Business & Digital Economics, Emerald Group Publishing Limited, 3(3),318-340. doi: 10.1108/JEBDE-01-2024-0001.

Bertino, E. (2014). Data Security – Challenges and Research Opportunities. In Proceedings of the Conference Title, 9-13. http://dx.doi.org/10.1007/978-3-319-06811-4_2.

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Online, https://assets.pubpub.org/d8wct41f/31611263538139.pdf, Retrieved June 26, 2024.

Mohsin, A., Zaidan, A., Bahaa, B., Albahri, O. S., Albahri, A. S., Alsalem, M. A., & Mohammed, K. (2019). Blockchain-PSO-AES Techniques in Finger Vein Biometrics: A Novel Verification Secure Framework for Patient Authentication. Computer Standards & Interfaces, 66(1), 103-111. https://doi.org/10.1016/j.csi.2019.04.002.

Wang, H., Smagghe, G., & Meeus, I. (2018). The Single von Willebrand factor C-domain protein (SVC) coding gene is not involved in the hymenopteran upregulation after Israeli acute paralysis virus (IAPV) injection in the bumblebee Bombus terrestris. Developmental and comparative immunology, 81, 152–155. https://doi.org/10.1016/j.dci.2017.11.011.

Chen, L., Lee, W. K., Chang, C.-H., Choo, K.-K. R., & Zhang, N. (2019). Blockchain-based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95(1), 50-60. https://doi.org/10.1016/j.future.2019.01.018.

Cao, S., Zhang, G., Liu, P., Zhang, X., & Neri, F. (2019). Cloud-Assisted Secure eHealth Systems for Tamper-Proofing EHR via Blockchain. Information Sciences, 485. 427-440. https://doi.org/10.1016/j.ins.2019.02.038.

Islam, M. R., Rahman, M. M., Mahmud, M., Rahman, M. A., Mohamad, M. H. S., & Embong, A. H. (2021). A review on blockchain security issues and challenges. Proceedings of the 2021 IEEE 12th Control and System Graduate Research Colloquium (ICSGRC), 227-232. Shah Alam, Malaysia. http://dx.doi.org/10.1109/ICSGRC53186.2021.9515276.

Moosavi, N., & Taherdoost, H. (2023). Blockchain technology application in security: A systematic review. *Blockchains*, 1(2), 58-72. https://doi.org/10.3390/blockchains1020005.

Nkwabi, J. (2021). A Review of the Significance of Blockchain Technology in Tanzania. European Journal of Business and Management, 13(16), 1-5. https://doi.org/10.7176/EJBM/13-16-01.

Maagi, B. (2023). Applicability of blockchain technology in improving efficiency in supply chain operations in public procurement in Tanzania. International Journal of Research in Business and Social Science, 12(9), 91-98. https://doi.org/10.20525/ijrbs.v12i9.2995

Canellis, D. (2018). Tanzania: The government is researching blockchain tech, but it is doing so very slowly. Hard Fork The Next Web, https://thenextweb.com/news/tanzania-blockchain-research, Retrieved October 26, 2024.

Swan, M. (2015). Blockchain: Blueprint for a New Economy. O'Reilly Media, Inc. 124-152.

Saah, A. E. N., Yee, J.-J., & Choi, J.-H. (2023). Securing construction workers’ data security and privacy with blockchain technology. Applied Sciences, 13(24), 13339. https://doi.org/10.3390/app132413339.

Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352. https://doi.org/10.1504/IJWGS.2018.095647.

Yu, H. G. (2022). A survey on blockchain technology and its security. Blockchain: Research and Applications, 3(2),100067. https://doi.org/10.1016/j.bcra.2022.100067.

Elisa, N., Yang, L., Chao, F., & et al. (2023). A framework of blockchain-based secure and privacy-preserving e-government system. Wireless Networks, 29, 1005–1015. https://doi.org/10.1007/s11276-018-1883-0.

. Ferrag, M. A., & Shu, L. (2021). The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet of Things Journal, 8(24), 17236-17260. https://doi.org/10.1109/JIOT.2021.3078072.

Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2017). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. IEEE International Congress on Big Data, 557-564. https://doi.org/10.1109/BigDataCongress.2017.85.

Zhang, R., Xue, R., Liu, L. (2019). Security and Privacy on Blockchain. ACM Digital Library, 52(3), 1-34 https://doi.org/10.1145/3316481.

Yaqoob, I., Salah, K., Jayaraman, R., & Al-Hammadi, Y. (2022). Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications, 34, 11475–11490. https://doi.org/10.1007/s00521-020-05519-w.

Dwivedi, A.D., Srivastava, G., Dhar, S., & Singh, R. (2019). A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors, 19(2), 326. https://doi.org/10.3390/s19020326.

Choudhury, P., & Kumar, N. (2020). Blockchain-based secure communication for Internet of Things: A systematic review. Journal of Network and Computer Applications, 154, 102602.

Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., Khan, I., Hewage, C., & Platts, J. (2022). Cybersecurity, Data Privacy and Blockchain: a review. SN Computer Science Computer Science, 3,127. https://doi.org/10.1007/s42979-022-01020-4.

Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., & Rimba, P. (2017). A Taxonomy of Blockchain-Based Systems for Architecture Design. IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 243-252. https://doi.org/10.1109/ICSA.2017.33.

Reegu, F., Abas, H., Hakami, Z., Tiwari, S., Dziyauddin, R., Muda, I., Almashaqbeh, H., & Jain, R. (2022). Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records. Security and Communication Networks, 2022, 1-12. https://doi.org/10.1155/2022/1953723.

Balasubramanian, S., Sethi, J., Ajayan, S., & Paris, C. (2022). An enabling framework for Blockchain in Tourism. Information Technology & Tourism, 24, 165-179. https://doi.org/10.1007/s40558-022-00229-6.

Valeri, M., Baggio, R. (2020). A critical reflection on the adoption of blockchain in tourism. Information Technology & Tourism, 23, 121–132. https://doi.org/10.1007/s40558-020-00183-1.

Deckers, R., & Lago, P. (2022). Systematic literature review of domain-oriented specification techniques. Journal of Systems and Software, 192, 1-11. https://doi.org/10.1016/j.jss.2022.111415.

Hassan, N. H., Ismail, Z., & Maarop, N. (2015). Information security culture: A systematic literature review. Proceedings of the International Conference on Cybersecurity (ICOCI), Istanbul, Turkey, 11-13. https://api.semanticscholar.org/CorpusID:156010250.

Arbanas, K., & Hrustek, N. Ž. (2019). Key success factors of information systems security. Journal of Information and Organizational Sciences, 43(2), 131-144. https://doi.org/10.31341/jios.43.2.1.

Bolek, V., Látečková, A., Romanová, A., & Korcek, F. (2016). Factors affecting information security focused on SME and agricultural enterprises. Agris On-line Papers in Economics and Informatics, 8(4), 37-50. http://dx.doi.org/10.22004/ag.econ.253226.

Ridzuan, F., & Zainon, W. M. (2019). A Review of data cleansing methods for big data. The Fifth Information Systems International Conference, Procedia Computer Science, 161, 731-738. https://doi.org/10.1016/j.procs.2019.11.177.

Pagliery, J. (2016). Hackers are selling 117 million LinkedIn passwords. CNNMoney. Retrieved May 15, 2024, from fhttps://money.cnn.com/2016/05/19/technology/linkedin-hack/index.html.

Hill, M.,Swinhoe, D., & Leyden,J. (2024). The biggest data breaches of the 21st century. CSO United States., from https://www.csoonline.com/article/534628/the-biggest-data-breaches-of-the-21st-century.html, Retrieved October 26, 2024.

U.S. Government Accountability Office. (2020). Federal Response to Cybersecurity Incidents: Lessons Learned from the SolarWinds and Microsoft Exchange Attacks. GAO-22-104746, https://www.gao.gov/products/gao-22-104746, Retrieved June 10, 2024.

CISA. (2021). "Attack on Colonial Pipeline: What We’ve Learned and What We’ve Done Over the Past Two Years. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/news-events/news/attack-colonial-pipeline-whatweve-learned-what-weve-done-over-past-two-years, Retrieved May 10, 2024.

Kosba, A. E., Miller, A. K., Shi, E., Wen, Z. A., & Papamanthou, C. (2016). Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. IEEE Symposium on Security and Privacy (SP), San Jose, CA, 839-858. doi: 10.1109/SP.2016.55.

Zhou, L., Diro, A., Saini, A., Kaisar, S., & Hiep, P. C. (2024). Leveraging zero-knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities. Journal of Information Security and Applications, 80, 103678. https://doi.org/10.1016/j.jisa.2023.103678.

Mougayar, W. M. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. John Wiley & Sons, Inc.

Kombe, C., Sam, A., Ally, M., & Finne, A. (2019). Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania. Journal of Health Informatics in Developing Countries, 13(2), 1-19.

Kombe, M., Manyilizu, D., & Mvuma, P. (2017). Design of Land Administration and Title Registration Model Based on Blockchain Technology. Journal of Information Engineering and Applications, 7 (1), 8-15.

Ulrich-Diener, F., Dvouletý, O., & Špaček, M. (2023). The future of banking: What are the actual barriers to bank digitalisation?. Business Research Quarterly, 26(3), 234-244. https://doi.org/10.1177/23409444231211597.

Jelodar, M. (2016). Prioritisation of the Factors Affecting Bank Efficiency Using Combined Data Envelopment Analysis and Analytical Hierarchy Process Methods. Journal of Optimization, 1-7. https://doi.org/10.1155/2016/5259817.