CFP last date
20 January 2025
Reseach Article

Blockchain-based Cybersecurity Solutions for Secure Financial Transactions in Digital Banking Systems

by Shamsad Binte Ehsan, Md. Najmus Saquib, Ayan Majumder Kakon
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 59
Year of Publication: 2025
Authors: Shamsad Binte Ehsan, Md. Najmus Saquib, Ayan Majumder Kakon
10.5120/ijca2024924247

Shamsad Binte Ehsan, Md. Najmus Saquib, Ayan Majumder Kakon . Blockchain-based Cybersecurity Solutions for Secure Financial Transactions in Digital Banking Systems. International Journal of Computer Applications. 186, 59 ( Jan 2025), 6-15. DOI=10.5120/ijca2024924247

@article{ 10.5120/ijca2024924247,
author = { Shamsad Binte Ehsan, Md. Najmus Saquib, Ayan Majumder Kakon },
title = { Blockchain-based Cybersecurity Solutions for Secure Financial Transactions in Digital Banking Systems },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2025 },
volume = { 186 },
number = { 59 },
month = { Jan },
year = { 2025 },
issn = { 0975-8887 },
pages = { 6-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number59/blockchain-based-cybersecurity-solutions-for-secure-financial-transactions-in-digital-banking-systems/ },
doi = { 10.5120/ijca2024924247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-01-03T00:30:36.807336+05:30
%A Shamsad Binte Ehsan
%A Md. Najmus Saquib
%A Ayan Majumder Kakon
%T Blockchain-based Cybersecurity Solutions for Secure Financial Transactions in Digital Banking Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 59
%P 6-15
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper investigates the use of blockchain technology to enhance cybersecurity for financial transactions within digital banking systems. As digital banking continues to expand, the need for robust security measures against threats like fraud, data breaches, and unauthorized access becomes increasingly critical. Blockchain's decentralized structure, cryptographic protocols, and consensus mechanisms offer a potential solution by providing a tamper-resistant, transparent ledger that eliminates single points of failure. This study evaluates how blockchain can improve transaction security and privacy, utilizing qualitative case studies from financial institutions alongside quantitative analyses of blockchain’s performance and security features. The findings suggest that blockchain significantly enhances security, particularly in fraud prevention and transaction transparency, compared to traditional systems. However, issues like scalability, system integration, and regulatory challenges remain. The research highlights blockchain’s potential for revolutionizing digital banking security and concludes with recommendations for its implementation, including the need for further integration with emerging technologies like artificial intelligence and quantum computing to overcome current limitations.

References
  1. Ogudebe, O. I. (2022). Challenges of digital privacy in banking organizations. Walden University.
  2. Cele, N. N., & Kwenda, S. (2024). Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review. Journal of Financial Crime.
  3. Adeyoju, F. I. P. (2019). Cybercrime and cybersecurity: FinTech’s greatest challenges. Available at SSRN 3486277.
  4. Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666.
  5. Darem, A. A., Alhashmi, A. A., Alkhaldi, T. M., Alashjaee, A. M., Alanazi, S. M., & Ebad, S. A. (2023). Cyber threats classifications and countermeasures in banking and financial sector. IEEE Access, 11, 125138-125158.
  6. Wewege, L., Lee, J., & Thomsett, M. C. (2020). Disruptions and digital banking trends. Journal of Applied Finance and Banking, 10(6), 15-56.
  7. Austin-Olowo, L. B. A., Anike, O. I., & Ailemen, I. O. (2023). Cybersecurity issues affecting online banking and transactions in Nigeria. International Journal of Arts, Languages and Business Studies, 9, 25-35.
  8. Dawodu, S. O., Omotosho, A., Akindote, O. J., Adegbite, A. O., & Ewuga, S. K. (2023). Cybersecurity risk assessment in banking: methodologies and best practices. Computer Science & IT Research Journal, 4(3), 220-243.
  9. Maharjan, R., & Chatterjee, J. M. (2019). Framework for minimizing cyber security issues in banking sector of Nepal. LBEF Research Journal of Science, Technology and Management, 1(1), 82-98.
  10. Johri, A., & Kumar, S. (2023). Exploring customer awareness towards their cyber security in the Kingdom of Saudi Arabia: A study in the era of banking digital transformation. Human Behavior and Emerging Technologies, 2023(1), 2103442.
  11. Bashir, I. (2017). Mastering blockchain. Packt Publishing Ltd.
  12. Gupta, S., Sinha, S., & Bhushan, B. (2020, April). Emergence of blockchain technology: Fundamentals, working and its various implementations. In Proceedings of the international conference on innovative computing & communications (ICICC).
  13. Laurence, T. (2019). Introduction to blockchain technology. Van Haren.
  14. Gad, A. G., Mosa, D. T., Abualigah, L., & Abohany, A. A. (2022). Emerging trends in blockchain technology and applications: A review and outlook. Journal of King Saud University-Computer and Information Sciences, 34(9), 6719-6742.
  15. Lewis, A. (2018). The basics of bitcoins and blockchains: an introduction to cryptocurrencies and the technology that powers them. Mango Media Inc..
  16. Risius, M., & Spohrer, K. (2017). A blockchain research framework: What we (don’t) know, where we go from here, and how we will get there. Business & information systems engineering, 59, 385-409.
  17. Upadhyay, N. (2020). Demystifying blockchain: A critical analysis of challenges, applications and opportunities. International Journal of Information Management, 54, 102120.
  18. Thomas, J. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3), 1-23.
  19. Emigh, A. (2006). The crimeware landscape: Malware, phishing, identity theft and beyond. Journal of Digital Forensic Practice, 1(3), 245-260.
  20. Rains, T. (2020). Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks. Packt Publishing Ltd.
  21. Kettani, H., & Wainwright, P. (2019, March). On the top threats to cyber systems. In 2019 IEEE 2nd international conference on information and computer technologies (ICICT) (pp. 175-179). IEEE.
  22. Cristea, L. M. (2020). Current security threats in the national and international context. Journal of accounting and management information systems, 19(2), 351-378.
  23. Bhadouria, A. S. (2022). Study of: Impact of Malicious Attacks and Data Breach on the Growth and Performance of the Company and Few of the World’s Biggest Data Breaches. Int. J. Sci. Res. Publ.\
  24. Kaur, K. A Study of Cyber Security and Cyber Threats.
  25. Thakur, M. (2024). Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE), 4(1), 1-20.
  26. Omotunde, H., & Ahmed, M. (2023). A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CyberSecurity, 2023, 115-133.
  27. Network, B. B. D. T. Multi-Factor Authentication (MFA) on a Blockchain-based Decentralised Trust Network With Customizable Challenges.
  28. Mohammad, N. Enhancing Security and Privacy in Multi-Cloud Environments: A Comprehensive Study on Encryption Techniques and Access Control Mechanisms. International Journal of Computer Engineering and Technology (IJCET), 12, 51-63.
  29. Osita, G. C., Chisom, C. D., Okoronkwo, M. C., Esther, U. N., & Vanessa, N. C. (2022). Application of Emerging Technologies in Mitigation of e-Commerce Security Challenges. CCU J. Sci, 2, 2734-3766.
  30. Tran, T. M. A. (2020). Mobile Payment Security: A case study of Digital Wallet MOMO.
  31. Yang, Y. S., Lee, S. H., Chen, W. C., Yang, C. S., Huang, Y. M., & Hou, T. W. (2021). TTAS: Trusted token authentication service of securing SCADA network in energy management system for industrial Internet of Things. Sensors, 21(8), 2685.
  32. Ali, G., Mijwil, M. M., Buruga, B. A., & Abotaleb, M. (2024). A Comprehensive review on cybersecurity issues and their mitigation measures in FinTech.
  33. Sancho Larraz, J., García Moros, J., & Alesanco Iglesias, Á. (2021). Desing and evaluation of novel authentication, authorization and border protection mechanisms for modern information security architectures (Doctoral dissertation, Zaragoza University).
  34. Hassan, W., Chou, T. S., Li, X., Appiah-Kubi, P., & Tamer, O. (2019). Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks. Int J Inf & Commun Technol ISSN, 2252(8776), 8776.
  35. Hassan, W., Chou, T. S., Li, X., Appiah-Kubi, P., & Tamer, O. (2019). Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks. Int J Inf & Commun Technol ISSN, 2252(8776), 8776.
  36. Mukherjee, A. (2020). Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats. Packt Publishing Ltd.
  37. Steel, C., & Nagappan, R. (2006). Core security patterns: best practices and strategies for J2EE", web services, and identity management. Pearson Education India.
  38. Pilkington, M. (2016). Blockchain technology: principles and applications. In Research handbook on digital transformations (pp. 225-253). Edward Elgar Publishing.
  39. Javaid, M., Haleem, A., Singh, R. P., Suman, R., & Khan, S. (2022). A review of Blockchain Technology applications for financial services. BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2(3), 100073.
  40. Bello, H. O., Idemudia, C., & Iyelolu, T. V. (2024). Integrating machine learning and blockchain: Conceptual frameworks for real-time fraud detection and prevention. World Journal of Advanced Research and Reviews, 23(1), 056-068.
  41. Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Blockchain technology: benefits, challenges, applications, and integration of blockchain technology with cloud computing. Future Internet, 14(11), 341.
  42. Singh, S., & Singh, N. (2016, December). Blockchain: Future of financial and cyber security. In 2016 2nd international conference on contemporary computing and informatics (IC3I) (pp. 463-467). IEEE.
  43. Farayola, O. A. (2024). Revolutionizing banking security: integrating artificial intelligence, blockchain, and business intelligence for enhanced cybersecurity. Finance & Accounting Research Journal, 6(4), 501-514.
Index Terms

Computer Science
Information Sciences

Keywords

Blockchain cybersecurity digital banking financial transactions fraud prevention transparency cryptography