Abstract
With the acceleration of informatization, the security of sensitive data in information systems has increasingly become the focus of global attention. Especially in the context of the widespread application of big data, cloud computing and other technologies, data leakage and privacy risks are becoming more and more serious. Traditional data protection methods can no longer effectively deal with complex network attacks and data leakage problems, and new technical means are urgently needed to improve data security. Blockchain technology shows strong data protection potential due to its characteristics of decentralization, non-tampering and traceability, and is gradually being applied to the protection of sensitive data in information systems. This paper analyzes the application of blockchain technology in data storage, transmission and access control, and discusses its effectiveness in improving data security. We selected the customer information system of a well-known financial institution as the research object, and used blockchain technology to encrypt, store and distribute management of sensitive data. The experimental results show that after the introduction of blockchain technology, the data leakage rate of the system has dropped by 78%, and at the same time, the response time of the system has increased by 22% compared with traditional data protection technology. In addition, the access control mechanism based on smart contracts significantly improves the transparency and traceability of data operations, effectively reducing unauthorized access. This article proves the effectiveness of blockchain technology in protecting sensitive data security in information systems through the analysis of practical cases.
References
Jin, Y., and Hu, S. Impact of blockchain technology on information disclosure of competition platforms. Procedia Computer Science, vol. 242, pp. 742–748, 2024.
Moosavi, N., Taherdoost, H., Mohamed, N., Madanchian, M., Farhaoui, Y., and Khan, I. U. Blockchain Technology, Structure, and Applications: A Survey. Procedia Computer Science, vol. 237, pp. 645–658, 2024.
Panigrahi, A., Pati, A., Dash, B., Sahoo, G., Singh, D., and Dash, M. ASBlock: An Agricultural based Supply Chain Management using Blockchain Technology. Procedia Computer Science, vol. 235, pp. 1943–1952, 2024.
Aljarrah, E. AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology. Intelligent Systems with Applications, vol. 24, pp. 200440, 2024.
Bamakan, S. M. H., and Far, S. B. Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies. Cyber Security and Applications, vol. 3, pp. 100064, 2025.
Boumaiza, A., and Maher, K. Leveraging blockchain technology to enhance transparency and efficiency in carbon trading markets. International Journal of Electrical Power & Energy Systems, vol. 162, pp. 110225, 2024.
Fang, C., Chi, M., Fan, S., and Choi, T.-M. Who should invest in blockchain technology under different pricing models in supply chains? European Journal of Operational Research, vol. 319(3), pp. 777–792, 2024.
Farah, M. B., Ahmed, Y., Mahmoud, H., Shah, S. A., Al-kadri, M. O., Taramonli, S., Bellekens, X., Abozariba, R., Idrissi, M., and Aneiba, A. A survey on blockchain technology in the maritime industry: Challenges and future perspectives. Future Generation Computer Systems, vol. 157, pp. 618–637, 2024.
Hajji, M. E., Es-saady, Y., Addi, M. A., and Antari, J. Optimization of agrifood supply chains using Hyperledger Fabric blockchain technology. Computers and Electronics in Agriculture, vol. 227, pp. 109503, 2024.
Jain, A. K., Gupta, N., and Gupta, B. B. A survey on scalable consensus algorithms for blockchain technology. Cyber Security and Applications, vol. 3, pp. 100065, 2025.
Khan, A. A., Dhabi, S., Yang, J., Alhakami, W., Bourouis, S., and Yee, P. L. B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Computers and Electrical Engineering, vol. 118, pp. 109343, 2024.
Kharche, A., Badholia, S., and Upadhyay, R. K. Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India. Blockchain: Research and Applications, vol. 5(2), pp. 100188, 2024.
Li, J., Liu, X., and Shao, X. Collaborative carbon emission reduction in power supply and demand entities based on blockchain technology. International Journal of Electrical Power & Energy Systems, vol. 157, pp. 109840, 2024.
Liu, X., Zhou, Z., Hu, M., and Zhong, F. How retailers can gain more profitability driven by digital technology: Live streaming promotion and blockchain technology traceability? Electronic Commerce Research and Applications, vol. 68, pp. 101445, 2024.
Mounnan, O., Boubchir, L., Manad, O., Mouatasim, A. E., and Daachi, B. DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology. Computer Standards & Interfaces, vol. 92, pp. 103929, 2025.
Puneeth, R. P., and Parthasarathy, G. A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology. Computers and Electrical Engineering, vol. 120, pp. 109676, 2024.
Ressi, D., Romanello, R., Piazza, C., and Rossi, S. AI-enhanced blockchain technology: A review of advancements and opportunities. Journal of Network and Computer Applications, vol. 225, pp. 103858, 2024.
Sun, Y., Liu, C., Li, J., and Liu, Y. FADSF: A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology. Computers, Materials and Continua, vol. 80(2), pp. 2351–2362, 2024.
Vijayakumar, G., Singh, K., and SK, K. Privacy preserving decentralized swap derivative with deep learning based oracles leveraging blockchain technology and cryptographic primitives. Computers and Electrical Engineering, vol. 119, pp. 109510, 2024.
Cao, H., Song, C., Chu, Y., Zhao, C., Deng, M., and Liu, G. Local sensitive discriminative broad learning system for hyperspectral image classification. Engineering Applications of Artificial Intelligence, vol. 123, pp. 106307, 2023.
Domínguez-Bravo, C.-A., Fernández, E., and Lüer-Villagra, A. Hub location with congestion and time-sensitive demand. European Journal of Operational Research, vol. 316(3), pp. 828–844, 2024.
Du, A., Jia, J., Chen, J., Guo, L., and Wang, X. Online two-timescale service placement for time-sensitive applications in MEC-assisted network: A TMAGRL approach. Computer Networks, vol. 244, pp. 110339, 2024.
Juez-Hernandez, R., Quijano-Sánchez, L., Liberatore, F., and Gómez, J. AGORA: An intelligent system for the anonymization, information extraction and automatic mapping of sensitive documents. Applied Soft Computing, vol. 145, pp. 110540, 2023.
Kesteren, E.-J. van. To democratize research with sensitive data, we should make synthetic data more accessible. Patterns, vol. 5(9), pp. 101049, 2024.
Ming, Y., Zhang, W., Liu, H., and Wang, C. Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage. Journal of Systems Architecture, vol. 143, pp. 102965, 2023.
Pei, J., Yan, P., Zhou, H., Wu, D., Chen, J., and Yi, R. A temperature-sensitive points selection method for machine tool based on rough set and multi-objective adaptive hybrid evolutionary algorithm. Advanced Engineering Informatics, vol. 62, pp. 102844, 2024.
Rahman, M., Paul, M. K., and Sattar, A. H. M. S. Efficient perturbation techniques for preserving privacy of multivariate sensitive data. Array, vol. 20, pp. 100324, 2023.
Wang, Q., Li, Y., and Li, L. System-centric energy efficient computation offloading and resource allocation in latency-sensitive MEC systems. Ad Hoc Networks, vol. 154, pp. 103373, 2024.
Wen, J., and Deng, L. Certificateless integrity auditing scheme for sensitive information protection in cloud storage. Journal of Systems Architecture, vol. 156, pp. 103267, 2024.
Wu, Z., Zhang, D., Li, Y., Li, C., and Han, X. PRSD: Efficient protocol for privacy-preserving retrieval of sensitive data based on labeled PSI. Computer Networks, vol. 251, pp. 110649, 2024.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
