EconPapers    
Economics at your fingertips  
 

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing

Hisham Ali (), William J. Buchanan (), Jawad Ahmad, Marwan Abubakar, Muhammad Shahbaz Khan and Isam Wadhaj
Additional contact information
Hisham Ali: Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UK
William J. Buchanan: Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Jawad Ahmad: Cybersecurity Center, Prince Mohammad Bin Fahd University, Al Khobar 31952, Saudi Arabia
Marwan Abubakar: Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Muhammad Shahbaz Khan: Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Isam Wadhaj: Blockpass ID Lab, Edinburgh Napier University, Edinburgh EH10 5DT, UK

Future Internet, 2025, vol. 17, issue 7, 1-33

Abstract: We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric , the architecture supports fine-grained access control and immutability through smart contract-enforced trust policies. The system combines Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with temporal, spatial, and controlled revelation constraints to grant data owners precise control over shared intelligence. To ensure scalable decentralized storage, encrypted CTI is distributed via the IPFS , with blockchain-anchored references ensuring verifiability and traceability. Using STIX for structuring and TAXII for exchange, the framework complies with the GDPR requirements, embedding revocation and the right to be forgotten through certificate authorities. The experimental validation demonstrates that TrustShare achieves low-latency retrieval, efficient encryption performance, and robust scalability in containerized deployments. By unifying decentralized technologies with cryptographic enforcement and regulatory compliance, TrustShare sets a foundation for the next generation of sovereign and trustworthy threat intelligence collaboration.

Keywords: distributed ledger technology; cyber threat intelligence; encryption; GDPR (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/17/7/289/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/7/289/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:7:p:289-:d:1689542

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-06-28
Handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:289-:d:1689542