Blockchain-Based Data Security Model for Distributed Information Systems

Authors

  • Kenji Sato Department of Computer Science, Iowa State University
  • Elena Rossi School of Computing and Informatics, University of Louisiana at Lafayette
  • Arjun Mazumdar Department of Software Engineering, Rochester Institute of Technology

Keywords:

Blockchain, Distributed Information Systems, Data Security, Decentralized Governance, Socio-Technical Infrastructure, System Robustness

Abstract

The rapid decentralization of enterprise computing environments has necessitated a fundamental re-evaluation of data security architectures within distributed information systems. Traditional centralized security models, characterized by perimeter-based defenses and singular points of administrative control, are increasingly inadequate for mitigating the risks associated with multi-stakeholder data sharing, edge computing, and large-scale internet-of-things deployments. This research proposes an interdisciplinary, blockchain-based data security model designed to address the inherent vulnerabilities of distributed systems. By leveraging the immutability of distributed ledgers, cryptographic transparency, and decentralized consensus mechanisms, the proposed model provides a framework for data integrity, fine-grained access control, and comprehensive auditability. This paper explores the system-level trade-offs between computational overhead and security robustness, while simultaneously examining the socio-technical implications of decentralized governance. Furthermore, the study investigates the infrastructural requirements for deploying blockchain-based security at scale, addressing critical concerns such as energy sustainability, regulatory compliance, and the structural fairness of consensus protocols. Through a detailed analysis of architectural patterns—including permissioned versus permissionless frameworks—this research offers a strategic roadmap for the integration of blockchain technology into existing information infrastructures. The conclusion highlights the necessity of a holistic approach that balances technical innovation with policy-driven governance to ensure the long-term resilience and trustworthiness of distributed data ecosystems.

References

1.Amoroso, E. G. (2022). Cybersecurity: Patterns and practices for a new age of digital infrastructure. Wiley.

2.Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., ... & Wuille, P. (2014). Enabling blockchain innovations with pegged sidechains. Blockstream.

3.Benet, J. (2014). IPFS - Content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561.

4.Buterin, V. (2014). A next-generation smart contract and decentralized application platform. Ethereum White Paper.

5.Casey, M. J., & Vigna, P. (2018). The Truth Machine: The Blockchain and the Future of Everything. St. Martin's Press.

6.Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292-2303.

7.Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), 71.

8.De Filippi, P., & Hassan, S. (2016). Blockchain technology as a regulatory technology: From code is law to law is code. First Monday, 21(12).

9.Garay, J., Kiayias, A., & Leonardos, N. (2015). The bitcoin backbone protocol: Analysis and applications. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 281-310.

10.Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016). On the scalability and security of bitcoin and ethereum. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 3-16.

11.Haber, S., & Stornetta, W. S. (1991). How to time-stamp a digital document. Journal of Cryptology, 3(2), 99-111.

12.Karame, G., & Androulaki, E. (2016). Bitcoin and Blockchain Security. Artech House.

13.Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2017). Ouroboros: A provably secure proof-of-stake blockchain protocol. Annual International Cryptology Conference, 357-388.

14.Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. 2016 IEEE Symposium on Security and Privacy (SP), 839-858.

15.Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3), 382-401.

16.Lin, I. C., & Liao, T. C. (2017). A survey of blockchain security issues and challenges. IJ Network Security, 19(5), 653-659.

17.Lu, Y. (2019). The blockchain: State-of-the-art and future trends. International Journal of Computer and Information Engineering, 13(1), 1-10.

18.Mearian, L. (2018). What is blockchain? The complete guide. Computerworld.

19.Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review.

20.Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.

21.Pilkington, M. (2016). Blockchain technology: Principles and applications. Research Handbook on Digital Transformations.

22.Reyna, A., Martín, C., Chen, J., Soler, E., & Guzmán, M. (2018). On learning and blockchain: A new approach for a safe and secure IoT. Journal of Network and Computer Applications, 121, 62-75.

23.Swan, M. (2015). Blockchain: Blueprint for a New Economy. O'Reilly Media.

24.Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday, 2(9).

25.Tapscott, D., & Tapscott, A. (2016). Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Portfolio.

26.Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123.

27.Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper.

28.Wüst, K., & Gervais, A. (2018). Do you need a blockchain? 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), 45-54.

29.Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. (2018). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal, 6(2), 1495-1505.

30.Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. 2017 IEEE International Congress on Big Data, 557-564.

Downloads

Published

2026-03-10

How to Cite

Kenji Sato, Elena Rossi, & Arjun Mazumdar. (2026). Blockchain-Based Data Security Model for Distributed Information Systems. International Journal of Computer Science and Information Systems, 1(1). Retrieved from https://isipress.org/index.php/IJCSIS/article/view/74