METHODS OF ENSURING CYBERSECURITY IN HIGHLY LOADED COMPUTER SYSTEMS USING SMART CONTRACTS
DOI:
https://doi.org/10.28925/2663-4023.2025.28.780Keywords:
cybersecurity, high-load computer systems, blockchain, smart contracts, access control, cryptography, data protection, distributed computingAbstract
The development of high-load computing systems in modern information environments represents a critical aspect of technological progress, necessitating the creation of innovative approaches to cybersecurity. The increasing intensity of data exchange, the complexity of computational processes, and the growing number of interacting nodes pose significant challenges to traditional information security methods. Classical centralized security models are gradually losing their effectiveness due to the high risk of data processing center compromise, the vulnerability to denial-of-service (DDoS) attacks, unauthorized access, and system exploits. These risks emphasize the necessity of implementing decentralized security mechanisms that can withstand emerging cyber threats and ensure the reliability of high-load computing infrastructures.
This article presents a conceptual approach to enhancing the cybersecurity of high-load computing systems through the integration of blockchain technology and smart contracts. A comprehensive analysis of current threats and risks inherent in such systems has been conducted, along with an investigation into the efficiency of smart contracts in user authentication, access control, data verification, and attack prevention. Particular attention is given to the advantages of decentralized security solutions, including the elimination of single points of failure, the enhancement of transparency in security processes, and the automation of control mechanisms. The study also evaluates the resilience of blockchain-based security frameworks in mitigating both internal and external cyber threats.
The proposed architectural model leverages smart contracts for managing access to computing resources, verifying transaction integrity, and minimizing the impact of external threats. The analysis of recent research in blockchain technologies and their application in high-load environments provides insights into the feasibility and advantages of such an approach. By utilizing smart contracts, it becomes possible to automate security procedures, reduce reliance on centralized authentication servers, and ensure that system interactions remain tamper-proof and resistant to adversarial attacks.
The research findings indicate that integrating smart contracts into high-load computing systems enhances cybersecurity by automating data verification processes, eliminating intermediaries in transactions, and strengthening resilience against attacks. Furthermore, the study outlines promising directions for future research, including the optimization of smart contract execution mechanisms to reduce computational overhead and the integration of blockchain-based solutions into hybrid security models that combine decentralized and centralized approaches. This approach offers a strategic pathway for developing robust, scalable, and resilient cybersecurity frameworks tailored to the needs of high-performance computing infrastructures.
Downloads
References
Avada Media. (2023). Smart Contract Development for DeFi Projects. https://avada-media.ua/services/razrabotka-smart-kontraktov-dlya-defi-proyektov/
Binance Academy. (2022). What Is a Smart Contract Security Audit? https://academy.binance.com
/uk/articles/what-is-a-smart-contract-security-audit
Bright Sky. (2023). Online Security. https://us.bright-sky.org/en/online-safety-guide
datami. (2024). Smartphone Security and Cybersecurity. https://datami.ee/ua/blog/bezpeka-i-kiberbezpeka-smartfoniv/
H-X Technologies. (2022). Contracts in the Digital Age - Smart Contracts. https://www.h-x.technology/ua/
blog-ua/deals-in-the-digital-age-ua
H-X Technologies. (2024). Smart Account Security. https://h-x.technology/uk/articles/smart-account-security
H-X Technologies. (2025). Best Smart Contract Analysis Tools 2025. https://www.h-x.technology/ua/blog-ua/the-best-smart-contract-analysis-tools-2025-ua
López Vivar, A., Sandoval Orozco, A. L., & García Villalba, L. J. (2024). A security framework for Ethereum smart contracts. arXiv preprint arXiv:2402.03555. https://arxiv.org/abs/2402.03555
Mavridou, A., & Laszka, A. (2017). Designing secure Ethereum smart contracts: A finite state machine based approach. arXiv preprint arXiv:1711.09327. https://arxiv.org/abs/1711.09327
Smart Power. (2023). How to Protect Your Accounts from Hacking? https://www.smartpower.com.ua/
/07/07/yak-zahystyty-svoyi-akaunty-vid-zlamu/
WhiteBIT. (2024). Smart Contracts in Blockchain: What They Are and How They Work. https://blog.whitebit.com/uk/about-smart-contracts/
Wikipedia. (2024). Smart Contract. https://en.wikipedia.org/wiki/Smart_contract
Vashchenok, D. O., & Galchynskyi, L. Yu. (2023). Improving Smart Contract Security in the Ethereum Network. Educational and Scientific Physico-Technical Institute. https://ela.kpi.ua/handle/123456789/
Nadozirnyi, O. V. (2023). Algorithms and Systems for Protecting Smart Contracts Based on Blockchain Technologies. West Ukrainian National University. https://dspace.wunu.edu.ua/handle/316497/46437
Tverdokhlib, A. O., & Korotin, D. S. (2022). Efficiency of Computer Systems Operation Using Blockchain and Database Technologies. Tavria Scientific Bulletin. Series: Technical Sciences, (6). https://journals.ksauniv.ks.ua/index.php/tech/article/view/308/284
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Арсеній Твердохліб

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.