Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology

Sohel Rana (1) , Rizal Mohd Nor (1) , Mohammad Enayet Hossain (1) , Md Amiruzzaman (2)
(1) International Islamic University Malaysia, Malaysia,
(2) West Chester University, United States

Abstract

The increasing adoption of cryptocurrency has underscored the critical need for robust security measures to protect digital assets stored in cryptocurrency wallets. Traditional security approaches have often proven inadequate in addressing the rapidly evolving threats in the digital landscape. In response, cloud-based security solutions have emerged as a promising method to enhance wallet protection, leveraging scalability, flexibility, and advanced security features. This study investigates the security challenges faced by cryptocurrency wallets and explores the potential of cloud-based solutions, focusing on multi-factor authentication, encryption protocols, real-time monitoring, and secure backup and recovery. The research assesses the effectiveness of these solutions in mitigating risks such as unauthorized access, data breaches, and digital asset theft. Findings reveal that cloud-based security solutions significantly improve protection by offering scalable, adaptable frameworks. However, challenges remain, including privacy concerns, regulatory compliance, and the cost of implementation. The research introduces a cost-efficient approach that integrates cloud-based technologies to optimize the total cost of ownership while maintaining robust security. This study also discusses the regulatory and privacy implications of cloud security in cryptocurrency ecosystems. In conclusion, this research provides novel insights into the integration of cloud-based security solutions, offering a comprehensive framework for safeguarding digital assets in cryptocurrency wallets. It contributes to the growing body of knowledge on the feasibility and impact of cloud technologies in enhancing the security of cryptocurrency systems.

Full text article

Generated from XML file

References

S. Houy, P. Schmid, and A. Bartel, “Security aspects of cryptocurrency wallets—a systematic literature review,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–31, 2023.

S. Geetha, R. Naveenkumaran, K. Selvaraju, C. Kishore, and A. N. Rathish, “Blockchain based mechanism for cloud security,” in 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS). IEEE, 2023, pp. 1287–1295.

V. T. Truong, L. Le, and D. Niyato, “Blockchain meets metaverse and digital asset management: A comprehensive survey,” Ieee Access, vol. 11, pp. 26 258–26 288, 2023.

R. Indumathi, P. Mathivanan, D. Mohanapriya, and M. Sangeetha, “Quantum ai, cybersecurity, and their impact on bitcoin, cryptocurrency, and blockchain-based financial systems,” in Quantum AI and its Applications in Blockchain Technology. IGI Global Scientific Publishing, 2025, pp. 75–110.

S. Singh, A. S. Hosen, and B. Yoon, “Blockchain security attacks, challenges, and solutions for the future distributed iot network,” Ieee Access, vol. 9, pp. 13 938–13 959, 2021.

S. Houy, P. Schmid, and A. Bartel, “Security aspects of cryptocurrency wallets—a systematic literature review,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–31, 2023.

A. Nuche, O. Sy, and J. C. Rodriguez, “Optimizing efficiency through sustainable strategies: The role of management and monitoring in achieving goals,” APTISI Transactions on Management, vol. 8, no. 2, pp. 167–174, 2024.

I. Eyal, “On cryptocurrency wallet design,” in 3rd International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2021). Schloss-Dagstuhl-Leibniz Zentrum f¨ur Informatik, 2022.

A. A. Mohammed, A. M. S. Rahma, and H. B. Abdul Wahab, “Transformative innovations in digital currency and e-wallet systems: A comprehensive exploration of security, scalability, and adoption,” in AIP Conference Proceedings, vol. 3207, no. 1. AIP Publishing, 2024.

Kaspersky.com, “What is Cryptocurrency and How Does it Work?” https://www.kaspersky.com/resource-center/definitions/what-is-cryptocurrency, 2024, online; accessed 15 December 2024.

T. Fareed, “A systemic review of payment technologies with a special focus on digital wallets,” Financial Technologies and DeFi: A Revisit to the Digital Finance Revolution, pp. 89–97, 2023.

V. Raja et al., “Exploring challenges and solutions in cloud computing: A review of data security and privacy concerns,” Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 4, no. 1, pp. 121–144, 2024.

D. S. S. Wuisan, R. A. Sunardjo, Q. Aini, N. A. Yusuf, and U. Rahardja, “Integrating artificial intelligence in human resource management: A smartpls approach for entrepreneurial success,” Aptisi Transactions on Technopreneurship (ATT), vol. 5, no. 3, pp. 334–345, 2023.

J. Prakash, “Cryptocurrency a digital wallet: Pro’s and con’s,” Int. J. Multidiscip. Educ. Res, vol. 11, no. 9, pp. 65–68, 2022.

K. Mavrou, S. Symeonidou, and M. Tsakiri, “Once inclusive always inclusive (?): experiences of cypriot teachers and parents of children with disabilities on the use of technology and collaboration before and during the covid-19 pandemic,” International Journal of Inclusive Education, pp. 1–17, 2024.

A. T. Olutimehin, “The synergistic role of machine learning, deep learning, and reinforcement learning in strengthening cyber security measures for crypto currency platforms,” Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms (February 11, 2025), 2025.

I. Mavrou, “The Evolution of Crypto Wallets: Exploring The History and Future of Secure Storage,” https://www.techopedia.com/the-evolution-of-crypto-wallets-exploring-the-history-and-future-of-secure-storage, 2023, online; accessed 15 December 2024.

I. Maria et al., “Unlocking success: Human resource management for startupreneur,” Startupreneur Business Digital (SABDA Journal), vol. 3, no. 1, pp. 89–97, 2024.

Crypto Fundamentals, MEXC Creators, “The History and Evolution of Crypto Wallets,” https://blog.mexc.com/the-history-and-evolution-of-crypto-wallets-creator-obed/, 2024, online; accessed 15 December 2024.

S. Houy, P. Schmid, and A. Bartel, “Security aspects of cryptocurrency wallets—a systematic literature review,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–31, 2023.

I. Homoliak and M. Pereˇs´ıni, “Sok: Cryptocurrency wallets–a security review and classification based on authentication factors,” in 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2024, pp. 1–8.

Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi, “Kemendikbudristek pastikan keamanan data pendidikan indonesia,” 2023, accessed: 2025-06-30. [Online]. Available: https://www.kemendikdasmen.go.id/berita/4932-kemendikbudristek-pastikan-keamanan-data-pendidikan-indonesia

N. M. Shivale, P. Mahalle, G. M. Bhandari, S. Patil, U. Gaikwad, S. Thaware, S. Tamboli, S. Pawale, and V. D. Sonawane, “Detailed review on enabling secure and seamless crypto wallet: A blockchain solution,” Cureus Journals, vol. 2, no. 1, 2025.

J. Limdrian, M. N. M. Thorif, R. Fredyan, and M. A. Ibrahim, “Exploring security in cryptocurrency: Challenges, solutions, and implications–a systematic literature review,” in 2024 International Conference on ICT for Smart Society (ICISS). IEEE, 2024, pp. 1–9.

P. Weichbroth, K. Wereszko, H. Anacka, and J. Kowal, “Security of cryptocurrencies: A view on the state-of-the-art research and current developments,” Sensors, vol. 23, no. 6, p. 3155, 2023.

H. M. Varghese, D. A. Nagoree, N. Jayapandian et al., “Cryptocurrency security and privacy issues: A research perspective,” in 2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2021, pp. 902–907.

N. A. VA and D. Bindhu, “The swoc factors influencing cryptocurrency wallets: A comprehensive study of their strengths, weaknesses, opportunities, and challenges,” HR Connect, vol. 1, no. 6, pp. 39–46, 2024.

T. Navamani, “A review on cryptocurrencies security,” Journal of Applied Security Research, vol. 18, no. 1, pp. 49–69, 2023.

O. H¨am¨al¨ainen, “Analyzing usability issues in self-custody cryptocurrency wallets with jakob nielsen’s 10 usability heuristics,” Aalto University School of Business, 2023.

S. Bhujel and Y. Rahulamathavan, “A survey: Security, transparency, and scalability issues of nft’s and its marketplaces,” Sensors, vol. 22, no. 22, p. 8833, 2022.

J. Velani and D. S. Patel, “A review: Fraud prospects in cryptocurrency investment,” International Journal of Innovative Science and Modern Engineering, vol. 11, no. 6, pp. 1–4, 2023.

A. Vaidya, “Emerging technologies and cyber security,” India Banking and Finance Report, vol. 145, 2023.

S. I. Al-Hawary, J. R. N. Alvarez, A. Ali, A. K. Tripathi, U. Rahardja, I. H. Al-Kharsan, R. M. Romero-Parra, H. A. Marhoon, V. John, and W. Hussian, “Multiobjective optimization of a hybrid electricity generation system based on waste energy of internal combustion engine and solar system for sustainable environment,” Chemosphere, vol. 336, p. 139269, 2023.

P. Golait, D. S. Tomar, R. Pateriya, and Y. K. Sharma, “Blockchain security and challenges: A review,” in 2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA). IEEE, 2023, pp. 140–145.

R. Raheja, P. C. Pathak, and S. A. Ansar, “Major security risks and its alleviating techniques: Blockchain web application perspectives,” in 2024 7th International Conference on Contemporary Computing and Informatics (IC3I), vol. 7. IEEE, 2024, pp. 572–577.

V. Rattanawiboonsom and N. Khan, “Blockchain technology in mobile payments: A systematic review of security enhancements in mobile commerce.” International Journal of Interactive Mobile Technologies, vol. 18, no. 21, 2024.

A. A. Almamoori and W. S. Bhaya, “Survey on cryptocurrency security attacks and detection mechanisms,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 6, pp. 3638–3646, 2023.

Z. Liu and X. Li, “Sok: Security analysis of blockchain-based cryptocurrency,” arXiv preprint arXiv:2503.22156, 2025.

V. P. Dangcalan, J. D. V. Barbadillo, G. E. Bueno, C. S. Santiago Jr, and Z. J. R. Centeno, “Decentralized finance (defi) wallets: A review of its efficiency, usability,” in Innovations in Information and Decision Sciences: Proceedings of the 12th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2024), vol. 422. Springer Nature, 2025, p. 237.

Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi, “Kajian budaya politik dan keamanan siber mahasiswa indonesia,” 2023, accessed: 2025-06-30. [Online]. Available: https://www.kemendikdasmen.go.id/berita/3836-kajian-budaya-politik-dan-keamanan-siber-mahasiswa-indonesia

M. Buhler, “Enhancing multi-signature cryptocurrency wallets with risk-based authentication,” PRISM Repository, 2025.

S. Lestari, S. Watini, and D. E. Rose, “Impact of self-efficacy and work discipline on employee performance in sociopreneur initiatives,” Aptisi Transactions on Technopreneurship (ATT), vol. 6, no. 2, pp. 270–284, 2024.

S. Prabanand and M. Thanabal, “Advanced financial security system using smart contract in private ethereum consortium blockchain with hybrid optimization strategy,” Scientific Reports, vol. 15, no. 1, p. 6764, 2025.

K. K. Singamaneni, A. K. Budati, S. Islam, R. Kolandaisamy, and G. Muhammad, “A novel hybrid quantum-crypto standard to enhance security and resilience in 6g enabled iot networks,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2025.

V. Walunj, V. Rajaraman, J. Dutta, and A. Sharma, “Integrating crypto-based payment systems for data marketplaces: Enhancing efficiency, security, and user autonomy,” in International Conference on Information Systems Security. Springer, 2025, pp. 443–452.

M. M. Shabir, K. Zhang, B. Reulet, and G. Gagnon, “Qaas: hybrid cryptocurrency wallet-as-a-service based on quantum rng,” Cluster Computing, vol. 28, no. 3, p. 180, 2025.

D. E. Rose, J. Van Der Merwe, and J. Jones, “Digital marketing strategy in enhancing brand awareness and profitability of e-commerce companies,” APTISI Transactions on Management, vol. 8, no. 2, pp. 160–166, 2024.

J. Rosa-Bilbao, J. Boubeta-Puig, J. Lagares-Gal´an, and M. Vella, “Leveraging complex event processing for monitoring and automatically detecting anomalies in ethereum-based blockchain networks,” Computer Standards & Interfaces, vol. 91, p. 103882, 2025.

V. V. Krasinsky, A. N. Norkina, P. Y. Leonov, and V. M. Sushkov, “Cryptocurrency monitoring tools in financial investigations,” in Biologically Inspired Cognitive Architectures Meeting. Springer, 2024, pp. 200–205.

V. Salunkhe and S. Rajkumar, “Protection of electronic health records (ehrs) on the ethereum blockchain: Identifying and preventing active threats to smart contracts.” KSII Transactions on Internet & Information Systems, vol. 19, no. 1, 2025.

T. S. Goh, D. Jonas, B. Tjahjono, V. Agarwal, and M. Abbas, “Impact of ai on air quality monitoring systems: A structural equation modeling approach using utaut,” Sundara Advanced Research on Artificial Intelligence, vol. 1, no. 1, pp. 9–19, 2025.

Authors

Sohel Rana
Rizal Mohd Nor
[email protected] (Primary Contact)
Mohammad Enayet Hossain
Md Amiruzzaman
Rana, S., Nor, R. M., Hossain, M. E., & Amiruzzaman, M. (2025). Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology. Aptisi Transactions on Technopreneurship (ATT), 7(2), 481–491. https://doi.org/10.34306/att.v7i2.483

Article Details

Most read articles by the same author(s)