The Role of Data Leakage Prevention System in CBDC
Main Article Content
Abstract
A centralized database-based Central Bank Digital Currency (CBDC) system’s vulnerability to cyberattacks and data leakage is a major concern. Any data leak can lead to large financial losses, irreversible reputational harm, and a decline in user confidence. To protect user information, the Reserve Bank of India has underlined the significance of a strong Data Leakage Prevention (DLP) system. While current incidents have demonstrated that the measures were insufficient to meet the standards, DLP may not be enough to defend CBDCs on its own. Incorporating Zero-Knowledge Proofs (ZKPs) and differential privacy tools into DLP solutions can improve their robustness and effectiveness. There is no one-size-fits-all solution for preventing data leakage, different solutions may be more effective in different scenarios. It’s always a good idea to assess an organization’s or system’s specific needs and requirements before deciding on the best solution. It is also important to remember that there is no such thing as absolute security, and the possibility of zero-day attacks is always there. It is essential to continuously monitor and enhance security measures to stay ahead of new threats. To preserve their Central Bank Digital Currency systems and data, financial institutions and central banks must continue to be proactive and vigilant.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Sankar T R, ‘Central Bank Digital Currency – Is This the Future of Money’ (Reserve Bank of India, 22 July 2021) <https://www.rbi.org.in/Scripts/BS_SpeechesView.aspx?Id=1111> accessed 24 February 2023.
Atlantic Council, ‘Central Bank Digital Currency Tracker’ (December 2022) <https://www.atlanticcouncil.org/cbdctracker/> accessed 23 February 2023.
Rao K S, ‘CBDC in India the pros and the cons’ The Hindu businessline (22 April 2022) <https://www.thehindubusinessline.com/opinion/cbdc-in-india-the-pros-and-the-cons/article65344881.ece> accessed 13 February 2023.
Livemint, ‘Digital Rupee: Understanding the risks of using digital currency’ (13 January 2023) <https://www.livemint.com/money/personal-finance/digital-rupee-understanding-the-risks-of-using-digital-currency-11673593976915.html> accessed 13 February 2023.
Dhanjika P, ‘Data Breach in Blockchain Technology’ (Amlegals, 29 December 2021) <https://amlegals.com/data-breach-in-blockchain-technology/#> accessed 12 February 2023.
Costa E, ‘The Benefits and Vulnerabilities of Blockchain Security’ (CENGN, 19 October 2021) <https://www.cengn.ca/information-centre/innovation/the-benefits-and-vulnerabilities-of-blockchain-security/> accessed 25 January 2023.
Shah M, ‘5 blockchain security issues and how to prevent them’ (Fast Company, 16 February 2022) <https://www.fastcompany.com/90722111/5-blockchain-security-issues-and-how-to-prevent-them#:~:text=The %20vulnerability%20of%20blockchain%20endpoints,to%20steal%20the%20user's%20key.> accessed 10 February 2023.
Narayan K, ‘Digital currency: Cyber security, frauds concerns’ The Indian Express (9 December 2021) <https://indianexpress.com/article/business/economy/digital-currency-cyber-security-frauds-concerns/> accessed 12 February 2023.
Guidelines on Information Security, Electronic Banking, Technology risk management and cyber frauds, 2011, DBS.CO.ITC.BC.No.6/31.02.008/2010-11 30.
Banescu S, Borodach B, and Lannquist A, ‘4 key cybersecurity threats to new central bank digital currencies’ (World Economic Forum, 20 November 2021) <https://www.weforum.org/agenda/2021/11/4-key-threats-central-bank-digital-currencies/> accessed 20 February 2023.
Fanti G and others, ‘Missing Key: The challenge of cybersecurity and central bank digital currency’ (Atlantic Council, 15 June 2022) <https://www.atlanticcouncil.org/in-depth-research-reports/report/missing-key/> accessed 15 February 2023.
Ozili P K, ‘Central bank digital currency in India: the case for a digital rupee’ (SSRN, 22 November 2022) <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4238138> accessed 14 February 2023.
VarIndia, ‘How is CBDC safe from vulnerability and cyber security attacks?’ (24 February 2022) <https://varindia.com/news/how-is-cbdc-safe-from-vulnerability-and-cyber-security-attacks-2> accessed 16 March 2023.
Cisco, ‘What Is Data Loss Prevention (DLP)?’ (22 July 2020) <https://www.cisco.com/c/en_in/products/ security/email-security-appliance/data-loss-prevention-dlp.html> accessed 23 February 2023.
Mcmillan R, ‘The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster’ WIRED (3 March 2014) <https://www.wired.com/2014/03/bitcoin-exchange/> accessed 11 March 2023.
Baldwin C, ‘Bitcoin worth $72 million stolen from Bitfinex exchange in Hong Kong’ (Reuters, 3 August 2016) <https://www.reuters.com/article/us-bitfinex-hacked-hongkong-idUSKCN10E0KP> accessed 11 March 2023.
Cheng E, ‘Japanese cryptocurrency exchange loses more than $500 million to hackers’ CNBC (26 January 2018) <https://www.cnbc.com/2018/01/26/japanese-cryptocurrency-exchange-loses-more-than-500-million-to-hackers.html> accessed 11 March 2023.
Kharpal A, ‘Hackers steal over $40 million worth of bitcoin from one of the world’s largest cryptocurrency exchanges’ CNBC (7 May 2019) <https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html> accessed 11 March 2023.
Browne R, ‘$570 million worth of Binance’s BNB token stolen in another major crypto hack’ CNBS (7 October 2022) <https://www.cnbc.com/2022/10/07/more-than-100-million-worth-of-binances-bnb-token-stolen-in-another-major-crypto-hack.html> accessed 11 March 2023.
Zhao W, ‘Bitpoint Exchange Hacked for $32 Million in Cryptocurrency’ (CoinDesk, 12 July 2019) <https://www.coindesk.com/markets/2019/07/12/bitpoint-exchange-hacked-for-32-million-in-cryptocurrency/> accessed 11 March 2023.
Raza A, ‘The Binance KYC Data Breach: The Hacker Confirms the Attack’ CryptoPotato (29 March 2021) <https://cryptopotato.com/the-binance-kyc-data-breach-the-hacker-confirms-the-attack/> accessed 11 March 2023.
Reuters Staff, ‘Australia's NAB says 13,000 customers' personal data breached’ (Reuters, 26 July 2019)
<https://www.reuters.com/article/us-nab-cyber-idUKKCN1UL16P> accessed 13 January 2023.
Goh B and Shen S, ‘RPT-China's proposed digital currency more about policing than progress’ (Reuters, 4 November 2019) <https://www.reuters.com/article/china-markets-digital-currency-idUSL3N27H2 AG> accessed 13 March 2023.
Soderberg G and others, ‘Behind the Scenes of Central Bank Digital Currency: Emerging Trends, Insights, and Policy Lessons’ (IMF eLibrary, 9 February 2022) <https://www.elibrary.imf.org/view/journals/063/2022 /004/article-A001-en.xml> accessed 13 March 2023. [CrossRef]
Alameda T, ‘Zero Knowledge Proof: how to maintain privacy in a data-based world’ (BBVA, 23 June 2020) <https://www.bbva.com/en/zero-knowledge-proof-how-to-maintain-privacy-in-a-data-based-world/> accessed 13 March 2023.
Sinha A, ‘What are Zero-Knowledge Techniques and Zero-Knowledge Proofs (ZKPs)’ (Medium, 2 April 2022) <https://medium.com/blockchain-biz/what-are-zero-knowledge-techniques-and-zero-knowledge-proofs-zkps-9e0c236c829e> accessed 16 March 2023.
Fathima S, ‘Using Differential Privacy to Build Secure Models: Tools, Methods, Best Practices’ (Neptune, 27 January 2023) <https://neptune.ai/blog/using-differential-privacy-to-build-secure-models-tools-methods-best-practices> accessed 16 March 2023.