Keywords

1 Introduction

Blockchain technology, as a distributed ledger of physical and financial resources, allows for trusted payments among unauthenticated network participants. Different blockchain networks, such as Ethereum and Hyperledger Fabric, have emerged through public and private availability outside traditional digital currencies and electronic token systems since the launch of the first Bitcoin blockchain. Multiple industries trying to adapt the core principles to existing processes have recognized the importance of a trustless, decentralized ledger which really carries traditional non-repudiation. For several business fields, such as finance, logistics, the pharmaceutical industry, smart contracts, and perhaps, most notably, cybersecurity, the specific properties of blockchain technology make its use an attractive concept in the context of this paper. The drastic shifts in production and distribution, including globalization and outsourcing, are the result of the higher degree of sophistication. As a consequence, various parts of global supply chains are operated by independent companies. By using local information such as cost structures, profit margins, and estimates, each organization in the supply chain establishes operational and strategic targets to optimize its very own profit. While advances in information technology allow businesses to gather, store, and exchange information, because of competing incentives, companies may be reluctant to do so. Trying to align rewards increases the profits of companies and sustains any use of information technology. The motivation concerns with a large risk imbalance, such as capability risk, need to be fixed. The effect of resource risk is more serious for a decentralized supply chain than for a vertically integrated supply chain because of the imbalance. We recommend a blockchain-based approach to resolve the double-marginalization issue in order to solve these problems [1].

2 Prioritize Vulnerabilities: From Identification

Discounting the value of incident prevention is standard. The sheer amount of vulnerabilities in their own organizations can be underestimated by executives. Additional risks that may emerge from acquisitions of many other companies may not be considered. These individuals could get some sobering facts, especially in light of market enforcement regulations, such as with the General Data Protection Regulation (GDPR). Personally curated data can also easily become outdated. It could take 3–5 full working days to complete the development of a database to rank vulnerabilities as shown in Fig. 1. New bugs are likely to appear by the time your spreadsheet is completed and may be ignored. Other factor to consider is indeed a lack of knowledge. Sometimes, business leaders feel that they are quick to fix when bugs are identified. As such, instead of seasoned data scientists, workers who lack updates and patch skills and training may obtain the assignments. When they are discovered, these novice workers are also not prepared to repair bugs [2].

Fig. 1
figure 1

An armed intruder insecurity rating approach is intended to offer a simple impression of containment

Despite these conditions, several companies are presented with a long list of vulnerabilities that are not properly addressed. Organizations need to adopt a risk management program to further strengthen their defense capabilities [3, 4].

2.1 Identifying Flaws

Focusing on improving the most important vulnerabilities based on property value and cyberwarfare

Fixing after a manageable mitigation phase

The most risk-elevating vulnerabilities

The Popular Vulnerability Point System annotates each CVE identification using the CVSS. Based on an average, this economy standard is being used internationally to rate the seriousness and risk with CVE. A quantitative radiological rating is generated by the CVSS depending on multiple factors, along with the following:

  1. 1.

    Form of assault

  2. 2.

    Degree of access required

  3. 3.

    Sophistication levels [5]

3 Vulnerabilities and the Management of Remediation

Where a third-party remediation manager uses the “work increase” of hourly staff, the employees may use customer-provided or purchased vulnerability scanning from a supplier. The remedial service provider then communicates with the scanners used by ticketing or table customers. It is not likely that this strategy would yield results, as scanners might not be able to detect “not-yet-known” vulnerabilities that are not designed to defend against hacker thought and motives [6].

Companies must view vulnerability management as a multistage process, not a single process.

3.1 Scanning Efforts

A successful programmer, focused on a sheer number of existing and emerging vulnerabilities, will focus the institution’s attention on the most high-risk vulnerabilities continuously.

One significant issue in remediating vulnerability is that corporations typically need not invest time and money on manufacturing [7].

Attackers could only initiate attacks on the infrastructure in a bitcoin system if an attacker controls 51% or more of the nodes. Because most nodes are run by genuine network nodes, attacks can be conducted very differently, and the block information in the blockchain is therefore credible.

Participants in the Bitcoin system pledge their privacy. By purchasing the longest working load-proof chain, participants can willfully leave or reenter the Bitcoin scheme to access transaction details while leaving the system [8].

4 Attack Model

4.1 Semi-Honest Model

Half-honest respondents in this model are also known as passive attackers. A semi-honest partner shall not withdraw from the deal nor interferes with the outcome of the protocol, in full compliance with the implementation of the contract during intra-computation. He or she is able to maintain.

Some intermediate outcomes in implementing the agreement attempt, through these intermediate outcomes, to evaluate and extract input data from other participants [9].

4.2 Malicious Model

Malicious assailants are also active model attackers. A malicious attacker can not obey the procedure of the protocol, interrupt the protocol operations, and concur with intermediate results or amend the contract with other parties as shown in Fig. 2.

Fig. 2
figure 2

Models for malicious attack

5 Encryption of Authentication and Connection

CSE is focused on the intimacy of the user. If two people have much more mutual friends in society, there is a more intimate contact for both users. Thus, we measure intimacy by measuring two follow-up users. However, in the social network world, to prevent other users from miscellaneously entering user information to identify social circles, a user on two sides may confirm their identification before the communication process. In this sense, a user would have to know the personal information of other users. Consequently, we must authenticate the user’s identity in case a malicious user gets the user connection inappropriate and infer the user’s wishes and desires until a client receives details from other user relationship. Encryption of authentication is shown in Fig. 3 [10].

Fig. 3
figure 3

Encryption of authentication

5.1 Hashing Blockchain

Since this is the first block in a sequence , it does not contain the pointer. At the same time, there is potential for a final block to exist in the blockchain database with no pointer.

Blockchain infrastructure can be useful for companies and businesses.

Reducing the cost of storing data can also be achieved by keeping data secure from cyber criminals and corrupt intentions [11].

History of Data: Inside a blockchain structure , you can check the history of any transaction at any time. A centralized database is more like a snapshot of information at a single point in time.

Data is maintained and controlled by the blockchain. Data is difficult to tamper with. Verification of records takes time since it happens in each individual network rather than in a compound mechanism (Fig. 3). That means we compromise output speed but instead have high protection and validity [12].

Blockchain systems fall into three groups.

5.2 Blockchain Technology Architecture: Public

A public blockchain design ensures data and access is open to anyone who is willing to participate (e.g., Bitcoin, Ethereum, and Litecoin blockchain systems) [13, 14].

5.3 Blockchain Architecture

In private device architecture, the user is only approved by a certain entity or has been given permission by a particular user.

5.4 Consortium Architecture

The blockchain can involve several organizations. In a consortium, procedures are regulated by the preliminary allocated users (Table 1).

Table 1 A detailed comparison among these three blockchain systems

Each block stores a combination of digital currencies and many records. For instance, the block keeps records of the transferor, recipients, and amount of money in Bitcoin blockchain.

The same way, a hash is a unique identifier (long record consisting of some digits and letters). The algorithm generates each block hash (SHA-256). This then allows simpler recognition of each block in a blockchain structure. If a block is mined, a hash is automatically formed, while any changes made in a block result in updating the hash. Hashes help evaluate any changes made to a block [15].

This is the final element of the preceding block hash. This provides protection and helps to deter security breaches. In this way, 45 and 46 are related. The very first block is unique because all other blocks originate from this block of origin.

Any corrupt attempts will guarantee that the blocks are going to pass. Many of the next blocks contain inaccurate data and do not guarantee the stability of the entire blockchain package.

On the other hand, with the help of computer processors, it may be possible to modify all the blocks at once. There is a solution called concrete proof that addresses this concern. This makes it possible for a customer to accelerate the pace of the construction of new buildings and apartments. It takes about 10 minutes to produce proof of work that is needed to mine new coins in the BTC blockchain. Miners perform this role of computation. Miners get to retain transaction fees as a bonus of mining [16, 17].

A copy of the entire blockchain network is received by each new user (node) joining the Ethereum network. This dataset has been sent to increase node inside the blockchain system after each block is created. Then, each node tests the information and finds that it is valid. If all goes well, each block is connected to the local blockchain.

A unanimous choice is reached by all the nodes in the blockchain system. When using the blockchain system, participation at all levels of the system is guaranteed due to the fact that people willingly abide by its laws.

Blockchain could solve the data protection issues on AI networks in modern computing world (e.g., IoT). AI and its implementations have become significant instruments for monitoring and processing [18, 19].

In order to ensure sufficient analytics in resolving security issues, the gathered data must be accounted for. Artificial intelligence (AI) is efficient and can be used in distributed computing if data entered into it is not manipulated or truthful.

Third-party blockchain, with contradicting input, can be used in different areas of cyberspace. Therefore, blockchain may have a great impact to decentralized systems.

Ensure authenticity, accuracy, and credibility of details. If information has credibility and is accurate, AI can do better. The possible course of study for this is to study the blockchain.

Businesses should ensure data security under B2B and M2M style setting.

5.5 Blockchain Development of Networks

When an individual, or a few, decide to embrace a blockchain technology, a network is built. This can be perceived as high-tech culture within these enterprises.

To give a clearer picture, let’s use diamonds as an example. There are risks and difficulties involved with processing and selling the diamonds. Consumers would like to be sure they are acquiring diamonds from reputable and responsible businesses. Government agencies need the taxes to be collected and controlled. That framework of the blockchain will eradicate these potential risks.

In this network, the parties concerned include:

  1. (a)

    Diamond manufacturers

  2. (b)

    Institutions of the government

  3. (c)

    Transporters with gems

  4. (d)

    The sellers of diamonds

The same entities are assembled by blockchain solutions into a peer-to-peer network, which help to remove all the risks that had been listed and help to create a transparent system. All will be able to obtain the decentralized data of an immutable ledger and to track the flow of diamond from production to the final customer. In the public blockchain, all operations such as diamond mining, refining, and delivery are organized in sequence.

Under these blockchain networks, everybody has a complete copy (called peers). Also, there is ordering service to outline stuff that happened at the same time. Both those involved in the process have an oversight of the transactions (Fig. 4). There is a member management system (MMS) for multiple users, which allows access to unique users within the network.

Fig. 4
figure 4

Hyperledger composer

All transactions go through the general ledger during this phase (e.g., data with diamond photos, place of extraction, color, serial number, place where it was cut, purified, sold, etc.). This knowledge is reliable and true [20].

5.6 Key Characteristics of Blockchain Architecture

The blockchain architecture has many benefits for businesses. There are some attributes here.

Blockchain transactions are encrypted and checked because of their complex mathematical computations.

Immutability is permanent because records made cannot be altered or erased.

Provenance means that transactions can be trusted because they can be monitored online for a long time.

The entire various places are accessible by each member of the decentralized system. The consensus algorithm promotes network security.

Each user in the blockchain system is a generated address, not really a user identity. This will protect the privacy of users in a shared blockchain system.

Transparency cannot be manipulated by human. It is unlikely to happen because it takes too much computing power to rewrite the entire blockchain network.

Depending on how it is accessed and how the access permissions are issued, blockchain can be categorized into public, permissioned, and consortium blockchain [21, 22] (Fig. 5).

Fig. 5
figure 5

Distributed domain feature of blockchain

5.7 Key Features of a Blockchain Network

5.7.1 Public Blockchain

A public blockchain is a blockchain that anyone can access (often, anonymously). There are no limits on who can enter and, whether the transactions are mathematically legitimate, what transaction they can publish. Even though participants can secretly join the network (revealing only).

Any transaction they make is accessible to all (the public), which can be carefully analyzed in order to identify the users. The most popular example of decentralized blockchains is Bitcoin [3].

In such a network, there is usually an opportunity for participants to adopt an intensive consensus protocol for a computing resource (e.g., validate a block using proof of work).

5.7.2 Permissioned Blockchain

A permissioned blockchain is one in which the company’s contact is limited to users who have access rights given by the owner of the network. Non-anonymous validation of blocks or contact with the blockchain is not allowed on such a network. To control access to such a network, a certificate authority (CA) is usually used. A platform running its network as an approved network by blockchain would decide who can be validators and what rights are provided to the users. One of the most famous examples of a permissioned blockchain system is Hyperledger Fabric [23,24,–[25].

5.7.3 Consortium Blockchain

It is conceivable that the consortium blockchain (centralized) will be maintained by a single (originating) entity and offers predefined access rights to interacting parties. Usually, such a network suits government or regulatory bodies that have legal competence over other members.

In several cases, machine learning systems are used and have received great success, as shown below.

These types of patterns can be discovered by reviewing vast databases, such as stored medical records or credit history information. Machine learning techniques are used in places where we cannot get good results with conventional (deterministic) algorithms.

Several subjects require adaptable growth, for example, controlling manufacturing processes as per customer demand and adapting to readers’ varied reading interests:

  1. (i)

    In numerical data, supervised algorithms use statistical models in order to correctly identify the result. Regression and decision trees are the most commonly used algorithms in artificial intelligence.

  2. (ii)

    ML does not contain label data. Here, the data points are grouped according to their statistical proximity or distance. K stands for algorithms for clustering and association rules. Supervised ML is a form of semi-supervised learning.

  3. (iii)

    This project requires integrating both supervised and unsupervised machine learning. Unsupervised learning is implemented after which the most likely decisions are expected. It affects the data that lead [26,27,–[28].

The model is then used as training data when constructing a new model.

Considering that more than half of the recorded cybersecurity blockchain applications were dealing with IoT devices, opportunities to optimize IoT security are obvious. There is a connection between IoT, military, and healthcare in Singapore (Fig. 6). The announcements of security breaches and attacks on IoT will create the market for approaches to IoT security threats.

Fig. 6
figure 6

Chart of themes of primary studies

Blockchain could solve the data protection issues on AI networks in modern computing world (e.g., IoT). Artificial intelligence (AI) and its applications are used in order to apply the security technique. The problem with big data is that if an AI’s data is manipulated or misused by malicious third party, misleading analysis is the outcome. Blockchain can be used in different areas of cyberspace. Thanks to its decentralized and immutable features, blockchain guarantees data consistency, reliability, and honesty as well as reduces possibility of financial exploitation. If information has credibility and is accurate, AI can do better. Some blockchain research could include the implementation of AI data security in B2B (business-to-business) and M2M (machine-to-machine) environments [29, 30].

There are also questions about the validation and tamper resistance of main chains. We expect a distributed multi-blockchain infrastructure in the foreseeable future (Fig. 7).

Fig. 7
figure 7

Distribution status for the latest technology

This research sheds light on possibilities for research in cybersecurity other than IoT to be conducted. With the rising amount of users in the network using HTTPS encryption, cryptography needs to be safe and sound to ensure continued secure communications. Prospective research goal 1 in blockchain applications is to investigate the “Internet of Things” protection using Blockchain. Such data is unknown and hard to calculate for the purpose of this article. Future studies will include an in-depth evaluation of wireless network security, power consumption, and latency [31,32,33,–[34].

IoT (Internet of Things) networks and data packets would need to be monitored and handled in order to enhance processes.

You can seek ways to overcome by exploring ideas and solutions using Ethereum and smart contracts. Researchers will want to explore how disruptive cybertechnology can be used in combination with blockchains.

Conclusion leads that, in the future, researchers could concentrate on developing decentralized applications and frameworks to protect the blockchain. However, decentralized cryptocurrencies such as Bitcoin have longer and more reliable blockchain (than decentralized cryptocurrencies such as Bitcoin) (e.g., ransomware and terrorism financing).

It is noted that permissionless blockchain systems typically take minutes to reach consensus, such as Bitcoin and Ethereum. For applications that are latency-sensitive including the Internet of Battlefield Things (IoBT), latency sensitivity may not be sufficient. Therefore, in combination with hardware-based approaches that have minimum latency, a future development objective is to design blockchain-based solutions [35].

Data has a significant role in training an ML model. We can use historical data of patients to predict how someone will respond with any new disease or medication. However, patients are hesitant to reveal their test results because of privacy concerns. Researches have worked to fix these issues. The researchers have developed a service called eDiag in order to collect user information and store them in a safe and supervised process. The previous study used quantitative reasoning methods that were not appropriate for online diagnosis. It was discovered that they achieved 94% accuracy without compromising data privacy. Likewise, the study examined the privacy issues as a question of learning privacy and model privacy, respectively (Tables 1 and 2).

Table 2 Objectives of the survey on data privacy

6 Existing Solutions Using Blockchain Technology

The blockchain (BC) is a stable, fault-tolerant, open, verifiable, and auditable mesh network. Decentralized, P2P, open, confidence, and eternal are the commonly used keywords to explain BC benefits. These characteristics make a BC more trustworthy than an untrusted one.

Model for central client-server. The smart contract is a BC programming protocol that ensures that a scheduled operation is carried out. The blockchain, therefore, guarantees data integrity and authenticity, making it an effective solution for the protection of IoT devices against information theft.

Efforts to provide protection. Several supply chain, access control, application security, and IoT BC-based solutions have been suggested. However, the latest solutions do not comply with the time delay either, and cannot be extended to resource-restricted IoT devices [36, 37].

Some research, for example, focused only on the improvement of an IoT device’s time response rather than its confidentiality and support. By breaking their BC architecture into three levels, i.e., IoT, fog, and cloud, they provided data integrity for cyber-physical systems (CPS) [38].

Using the Trustful Space-Time Protocol (TSTP) , which is centered on confirmation, the IoT devices in the very same environment regain relationships with each other (PoT). Proof of luck (PoL) was used during the fog level to create responsibility to fix IoT information that generates a cryptographic digest for a data audit. SHA-256 was used to hash the data generated from the first level and saved temporarily. The data was permanently stored at the third level of the cloud, which is a public ledger, after acknowledgment and agreement had been achieved. Other than data integrity, key management utilizing time synchronization and node position was also provided by the report. HECOPS was used via multilateration to estimate the node’s position, and clock synchronization was provided by TSTP. The paper suggested the use of several consensus points, such as PoT and PoL, but did not discuss any question of user privacy. The idea of securing data obtained from the drone using public BC was provided in another paper that provided data integrity. There were four modules presented by DroneChain; drones, management system, cloud server, and BC network. The control system managed the drone, and the software was encrypted and processed on a decentralized BC using a cloud server. The resulting system was trustworthy or accountable, provided immediate integrity of information, and had a resilient infrastructure. The study used PoW, however, which was not the best alternative for a real-time IoT application such as drones. In comparison, data provenance nor user/data protection was not provided by the network [39,40,41].

7 DeepChain Suggested a Value-Driven Reward System Based on BC to Solve Security Problems

For the model training process, DeepChain ensures data protection and auditability. Using the threshold Paillier method that offers an additive homomorphic property, confidentiality is used. Utilizing CNN algorithms and the MNIST dataset, DeepChain showed that even more parties were interested in the process.

The lower the preparation accuracy, the more collaborative training. To practice, ML classifiers require databases. Due to many privacy issues, such as data leakage, data integrity, and possession, these datasets are obtained from various entities that are typically unwilling to share their data. Users do not know how and when it is possible to use their knowledge [42] (Fig. 8).

Fig. 8
figure 8

Architectural diagram for data source with AI model

8 Challenges to ML and BC

We assume that in providing maximum security and privacy for IoT networks, a single technology or tool, such as BC or ML, will not suffice. The research group is therefore in desperate need of time to investigate the provision of IoT security and privacy with the merger of BC and ML, which has the following challenges:

Storage: ML algorithms work better with bigger datasets, as described in Sect. 4.

The growth of data on BC platforms, however, will degrade its performance.

To find a compromise, which would be perfect for IoT applications, open a research issue.

Latency challenges: An IoT network will produce a large amount of latency, depending on the scenario.

The volumes of information are more beneficial for deep learning. The overall speed of the ML system will accelerate. Both ML and BC have difficulty in terms of usability since both are computationally intensive.

Costs of response. Many machine learning algorithms use more power. It is normal in major IoT networks to anticipate increasing costs for wire access, routers, and switches. Similarly, when more users enter in a device, efficiency slows. On average, in the Ethereum, BC transactions are conducted at a rate too slow for a cryptocurrency. IoT software is where billions of transactions occur every second.

Vulnerability: The combination of ML and BC will dramatically increase security. There are some legal dilemmas as well.

The rise in the number of threats, particularly. Malicious and potentially malicious code increases in complexity with every passing day.

Real-time IoT networks. While it is possible, the training stage of ML would take a long time. This form of defense is only feasible when an eligible safety is on offer.

Blockchain technology. Information immutability can also be assured, and its adjustments can be specified. Moreover, there is considerable issue with the data on the blockchain. Besides that, it is not difficult to confirm whether equipment or sensors are malfunctioning prior to the problem. The device has been tried. Besides the above issues, BC is vulnerable to the risk of privacy disclosure. Methods are applied online and are available for all readers without cost [43].

Using third-person pronouns. As the data shows, there are also several opportunities raised in BC. The quantity of storage required for ML is extremely high. This move theoretically improves the average output (latency) of conventional models [44, 45].

Processing speed: It is difficult to identify vast volumes of data, because ML and BC are comparatively more data-consuming.

Communication costs. Many ML algorithms need extra processing and communication with increasing quantity of data transmitted that will lead to an increase of money expenses.

Often, the BC. As the number of users and nodes increase, congestion becomes more serious. On average, 90%, an Ethereum BC handles just 12 transactions per second, which is not possible in a conventional payment system.

Networks, where millions of transactions are taking place every second of the day. The combination of MBD and BB may have a major impact on economic and financial decisions. There are a few issues surrounding privacy in the present period. There is a rise in frightening circumstances. Malicious software and malware problem is difficult to identify and avoid. These are very useful in real-time IoT networks [46, 47].Although it is possible for most to go through the preparation, it could take a long time. Detection of malicious traffic is only possible with qualified models on the blockchain technology. It is possible to guarantee data immutability and to be able to define its transformations. However, because of the incorrect data, this problem is occurring. Moreover, these early defects cannot be expected before anything happens suddenly.

The tests were completed and still have several things that are vulnerable to privacy evasion. The data is freely accessible for anyone to read it and analyze.

Getting private. BC is a solution to these problems but still restricted access in a way. There are abundant data available for ML to carry out its work [48, 49].

9 Conclusion

Blockchain and ML’s recent developments have made them route developments. With the foundation of numerous intelligent applications such as smart cities, UAV, SG, and data trading, the distributed ledger has the potential to operate. We have provided extensive details on BT and ML in this paper, along with their uses in smart applications, and proposed an architecture based on ML-BT. An ML-BT-based data analysis framework can be developed and implemented using this architecture. It provides a discussion and comparison of various current surveys. Then, we implemented the taxonomy of the ML-BT solution, concentrating on objective-oriented, layer-oriented, countermeasures, and smart application dimensions. In each dimension, a comparative study of available methodologies and methods is presented. Then, during ML adoption in BT-based systems, we have listed several research challenges faced that require solutions. We also stressed a range of research opportunities that could serve as a future, such as the availability of infrastructure, quantum resilience, and privacy concerns.