
tency issues observed in the simulations indicate that
the system may face delays during peak operational
periods, which could affect its responsiveness and us-
ability in real-world scenarios. The trust model, while
effective in many cases, also requires refinement to
address sophisticated attacks that attempt to manipu-
late reputation scores or exploit vulnerabilities in the
penalty mechanisms.
Despite these limitations, the system represents a
robust framework for enhancing trust and security in
both private and public architectures. By combining
blockchain with trust modeling and penalty mecha-
nisms, the architecture provides a comprehensive so-
lution for managing and securing shared information.
However, addressing the identified shortcomings is
essential to ensure its effectiveness and scalability in
diverse operational environments.
8 CONCLUSION AND
PERSPECTIVES
This paper presents an emergent approach to address-
ing the growing challenges of cybersecurity by intro-
ducing a blockchain-based trust architecture for pub-
lic and private architectures. The study builds upon
the inherent strengths of blockchain, such as decen-
tralization and immutability, and combines them with
a trust model and penalty mechanisms to create a
multi-dimensional security solution. The proposed
system effectively addresses the needs of both private
and public architectures, ensuring trust and account-
ability among participants while maintaining data in-
tegrity and resilience.
The work highlights the pressing need for robust
cybersecurity solutions in the face of increasingly so-
phisticated threats. By leveraging blockchain and
trust modeling, the proposed architecture represents
a significant step forward in securing shared threat in-
formation. Extensive simulations and security evalu-
ations confirm its potential to enhance system relia-
bility and scalability.
In our future work, to continue advancing this field
and addressing the ever-evolving cybersecurity land-
scape, we will explore methods to improve the scal-
ability and performance of blockchain networks for
handling large volumes of threat information while
maintaining efficiency. Future work in these areas can
contribute to the ongoing improvement and effective-
ness of blockchain-based trust and reputation systems
for threat information sharing, ultimately strengthen-
ing cybersecurity defenses and reducing the impact of
cyberattacks on organizations and society as a whole.
REFERENCES
Badsha, S., Vakilinia, I., and Sengupta, S. (2020).
Blocynfo-share: Blockchain based cybersecurity in-
formation sharing with fine grained access control. In
10th Annual Computing and Communication Work-
shop and Conference (CCWC), Las Vegas, NV, USA.
[Specify Publisher Here].
Bandara, E., Liang, X., Foytik, P., and Shetty, S. (2021).
Blockchain and self-sovereign identity empowered
cyber threat information sharing platform. In Confer-
ence on [Specify Conference Name Here], Irvine, CA,
USA. [Specify Publisher Here].
Bennaceur, J., Zouaghi, W., Hammouda, I., and mabrouk,
A. (2020). Composite multi-dimensional trust-based
schemes for threat information sharing.
Bennaceur, J., Zouaghi, W., Hammouda, I., and Mabrouk,
A. (2025). Multi-dimensional trust model: Towards
multi-layered secure architecture for enhanced threat
information sharing. Journal of Systems Science and
Systems Engineering, pages 1–29.
Chowdhury, M. J. M., Ferdous, M. S., Hoque, M. A., and
W.Colman, A. (2016). Blockchain consensus algo-
rithms: A survey. Online.
Fathi, Z., Rafsanjani, A. J., and Habibi, F. (2020). Anon-
isac: Anonymity-preserving cyber threat information
sharing platform based on permissioned blockchain.
In 28th Iranian Conference on Electrical Engineering
(ICEE), Tabriz, Iran. [Specify Publisher Here].
Gil, S., Mikkelsen, P. H., Gomes, C., and Larsen, P. G.
(2024). Survey on open-source digital twin frame-
works–a case study approach. Software practice and
experience, 54(6):929–960.
Hou, F. and Jansen, S. (2023). A systematic literature re-
view on trust in the software ecosystem. Empirical
Software Engineering, 28(8).
Mohaisen, A., Al-Ibrahim, O., Kamhoua, C., Kwiat, K.,
and Njilla, L. (2017). Assessing quality of contri-
bution in information sharing for threat intelligence.
In IEEE Symposium on Privacy-Aware Computing
(PAC). IEEE.
Z., Y., K., Y., L., L., K., Z., and Leung (2018). Blockchain-
based decentralized trust management in vehicular
networks. Online.
Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017).
An overview of blockchain technology: Architecture,
consensus, and future trends. In IEEE International
Congress on Big Data (BigData Congress). IEEE.
Trust-Centric Blockchain Framework: A Three-Layered Architecture for Securing Open and Private Systems
1109