Secure SDLC Incorporating Blockchain For Enhanced
Secure SDLC Incorporating Blockchain For Enhanced
How to Cite:
Gajbhiye B, Jain S, Chhapola A (2024). Secure SDLC: Incorporating Blockchain for Enhanced
Security Scientific Journal of Metaverse and Blockchain Technology. 2(2), 97-110. DOI:
https://doi.org/10.36676/sjmbt.v2.i2.40
Abstract
In the rapidly evolving landscape of software development, security has emerged as a critical concern,
particularly as the frequency and sophistication of cyber threats continue to rise. The Software
Development Life Cycle (SDLC) traditionally emphasizes security at various stages; however, the
integration of cutting-edge technologies such as blockchain has the potential to revolutionize this
process. This research explores the incorporation of blockchain technology into the Secure SDLC to
enhance security measures throughout the software development process. Blockchain, characterized by
its decentralized, transparent, and immutable nature, offers a robust framework for mitigating risks
associated with software vulnerabilities, data breaches, and unauthorized access.
The study delves into how blockchain can be seamlessly integrated into each phase of the SDLC—
requirements analysis, design, implementation, testing, deployment, and maintenance. By embedding
blockchain protocols within these stages, the SDLC can achieve a higher level of security assurance.
For instance, during the requirements analysis and design phases, smart contracts can be utilized to
enforce security policies and validate the integrity of design documents. The implementation phase can
benefit from blockchain's version control capabilities, ensuring that code changes are tracked, verified,
and secure. During testing and deployment, blockchain can facilitate the creation of an immutable audit
trail, recording all test results, configurations, and deployments, thereby preventing tampering and
ensuring transparency.
This research also examines the potential challenges and limitations associated with blockchain
integration into the SDLC, including performance overheads, scalability issues, and the complexity of
blockchain technology itself. Furthermore, it investigates how blockchain can address common security
vulnerabilities such as insecure interfaces, insufficient monitoring, and weak access controls, by
providing a tamper-proof, decentralized infrastructure.
The findings of this study suggest that incorporating blockchain into the SDLC not only strengthens
security protocols but also fosters a culture of trust and accountability among development teams. The
immutable nature of blockchain ensures that all transactions and modifications are permanently
97
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
recorded, making it nearly impossible for malicious actors to alter or delete critical data without
detection. Additionally, the decentralized nature of blockchain reduces the risks associated with single
points of failure, thereby enhancing the overall resilience of software systems.
Keywords
Blockchain, Secure SDLC, software development, security, smart contracts, immutable, decentralized,
audit trail, vulnerabilities, data breaches, tamper-proof, transparency, version control, scalability,
accountability.
Introduction
1. The Growing Importance of Security in Software Development
In today’s digital era, software systems are integral to almost every aspect of modern life, from financial
transactions to healthcare and beyond. As reliance on
these systems grows, so does the potential impact of
security breaches. Cyber threats have become
increasingly sophisticated, targeting vulnerabilities
within software applications that can lead to
devastating consequences, including data breaches,
financial losses, and damage to a company’s
reputation. Given this context, integrating robust
security measures into the Software Development Life
Cycle (SDLC) is no longer optional—it is imperative.
98
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
Problem Statement
Aspect Description
Context The Software Development Life Cycle (SDLC) is the foundational framework
guiding software development processes. While security is a crucial aspect,
traditional SDLC methods often fall short in fully addressing security challenges
throughout the entire lifecycle. The growing sophistication of cyber threats has
highlighted the need for more robust security measures. Blockchain technology,
with its decentralized, immutable, and transparent nature, presents a promising
solution for enhancing security within the SDLC.
Current 1. Vulnerabilities in Traditional SDLC: Despite incorporating security
Challenges practices, traditional SDLC often leaves gaps that can be exploited by malicious
99
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
actors. These vulnerabilities can occur at various stages, such as inadequate threat
modeling during design, insufficient security testing during implementation, and
lack of continuous monitoring post-deployment.
2. Single Points of Failure: The centralized nature of traditional security
management in SDLC introduces single points of failure, making systems more
susceptible to targeted attacks.
3. Inconsistent Security Enforcement: Security policies and protocols may not
be consistently enforced across all stages of the SDLC, leading to potential
breaches. The lack of a unified, tamper-proof system for tracking changes and
enforcing security measures can result in unauthorized access and data tampering.
Proposed Integrating blockchain technology into the SDLC can address these challenges by
Solution leveraging its inherent properties to enhance security. Blockchain’s decentralized
and immutable ledger can ensure that all actions, transactions, and changes within
the SDLC are securely recorded and monitored. Smart contracts can automate the
enforcement of security policies, ensuring consistent and tamper-proof
application throughout the development process. By removing single points of
failure and providing a transparent, auditable trail of all activities, blockchain can
significantly improve the security posture of the SDLC.
Research 1. Identify Integration Points: Determine the stages within the SDLC where
Objectives blockchain integration can add the most value in terms of security.
2. Evaluate Security Enhancements: Assess how blockchain can enhance
security measures, reduce vulnerabilities, and prevent unauthorized access and
data tampering within the SDLC.
3. Address Implementation Challenges: Identify potential challenges and
limitations associated with incorporating blockchain into the SDLC and propose
solutions to overcome these barriers.
Expected The research aims to develop a framework for integrating blockchain into the
Outcomes SDLC that enhances security across all stages. This framework is expected to
reduce the occurrence of security breaches, ensure consistent enforcement of
security policies, and create a more resilient software development process. The
study will also provide insights into the practical implications of blockchain
integration in real-world software development scenarios, offering guidelines for
developers and organizations seeking to enhance their SDLC security.
Significance The integration of blockchain into the SDLC has the potential to transform the
way security is managed in software development. By addressing the limitations
of traditional security practices, this approach could lead to more secure, reliable,
and trustworthy software systems. The findings of this research will contribute to
the broader field of secure software development and provide a foundation for
future studies on the intersection of blockchain and the SDLC.
Problem The problem at hand is the inadequacy of traditional SDLC in fully addressing
Statement security challenges, leaving software systems vulnerable to cyber threats. The
Summary centralized nature of security management in traditional SDLC also creates single
points of failure, increasing the risk of targeted attacks. The proposed solution is
to integrate blockchain technology into the SDLC to enhance security across all
100
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
Significance
Enhancing Security Protocols: The primary significance of this study lies in its potential to
fundamentally enhance the security protocols within the SDLC. By incorporating blockchain’s
decentralized and immutable ledger, this research proposes a novel approach to safeguarding software
systems against unauthorized access, data tampering, and other security breaches. The immutable nature
of blockchain ensures that once data is recorded, it cannot be altered without detection, thereby
significantly reducing the risk of malicious activities within the software development process.
Addressing Vulnerabilities in Traditional SDLC: Traditional SDLC practices often leave security
vulnerabilities unaddressed due to inadequate threat modeling, lack of comprehensive testing, and
centralized management approaches. This research contributes to filling these gaps by demonstrating
how blockchain can be used to create an unalterable audit trail, ensuring that all changes, transactions,
and actions within the SDLC are permanently recorded and transparent. This reduces the risk of
vulnerabilities being exploited post-deployment, thereby enhancing the overall security posture of
software systems.
Promoting Trust and Accountability: Trust and accountability are crucial elements in software
development, particularly in collaborative environments where multiple stakeholders are involved.
Blockchain technology, with its transparent and decentralized nature, promotes a higher level of trust
among development teams and stakeholders. By ensuring that all actions within the SDLC are verifiable
and transparent, this study contributes to fostering a culture of accountability, where all participants are
held to the highest security standards.
Innovative Use of Emerging Technology: The study’s significance also extends to its innovative
application of blockchain technology beyond its traditional uses in finance and supply chain
management. By exploring its integration into the SDLC, this research opens new avenues for utilizing
blockchain in enhancing software security. This not only broadens the scope of blockchain’s
applicability but also encourages further exploration into how other emerging technologies can be
leveraged to address critical security challenges in software development.
Implications for Future Research and Industry Practices: The findings from this research have
the potential to influence both academic research and industry practices. For academia, it lays the
groundwork for future studies on the intersection of blockchain and software security, encouraging
more comprehensive explorations into this promising area. For the software development industry, the
practical implications of this study could lead to the adoption of more secure and resilient SDLC models,
ultimately resulting in the development of software systems that are better equipped to withstand the
sophisticated cyber threats of today and the future.
Survey
Compa Industry Current Use of Challenges Benefits Future Plans
ny Blockchain in Faced Observed
Name SDLC
101
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
102
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
Research Methodology
1. Research Design
This research adopts an exploratory design aimed at understanding how blockchain technology can be
integrated into the Software Development Life Cycle (SDLC) to enhance security. The study involves
a combination of qualitative and quantitative approaches to thoroughly examine the potential benefits,
challenges, and practical applications of blockchain within the SDLC framework. The research design
is structured into three key phases: literature review, model development, and empirical validation.
2. Literature Review
The first phase of the research involves an extensive review of existing literature on secure SDLC
practices and blockchain technology. This includes academic papers, industry reports, and case studies
that discuss the current challenges in SDLC security, as well as the capabilities of blockchain
technology in other domains. The literature review aims to:
• Identify gaps in the current secure SDLC practices.
• Explore existing blockchain applications in security.
• Understand the theoretical underpinnings and principles of blockchain that are relevant to the
SDLC.
The insights gained from the literature review will serve as a foundation for developing a blockchain-
enhanced SDLC model.
3. Model Development
Based on the findings from the literature review, the research progresses to the development of a
conceptual model for integrating blockchain into the SDLC. This model outlines how blockchain can
be incorporated into each stage of the SDLC, from requirements analysis to maintenance. Key
components of the model include:
• Blockchain Integration Points: Identification of specific stages within the SDLC where
blockchain can be effectively integrated to enhance security.
• Smart Contracts: Design of smart contracts that automate and enforce security policies across
the SDLC.
103
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
Key Findings
1. Enhanced Security Across the SDLC
The integration of blockchain technology into the Software Development Life Cycle (SDLC)
significantly enhances security at every stage. Blockchain's decentralized and immutable ledger ensures
that all actions, transactions, and modifications are securely recorded and cannot be tampered with,
reducing the likelihood of unauthorized access and data breaches. This feature provides a robust
mechanism for ensuring the integrity of code, design documents, and testing results, which are critical
to maintaining a secure software development process.
2. Smart Contracts for Automated Security Enforcement
Smart contracts, an essential component of blockchain, can be effectively utilized to automate and
enforce security policies throughout the SDLC. These self-executing contracts ensure that predefined
security conditions are met before any stage of the development process can proceed. This automation
reduces human error, enhances consistency in security enforcement, and ensures that security protocols
are uniformly applied across all stages of the SDLC.
3. Improved Transparency and Accountability
Blockchain's transparent nature fosters greater accountability among development teams. Since all
activities within the SDLC are recorded on an immutable ledger, it becomes easier to trace and audit
actions, identify the sources of potential security issues, and hold individuals accountable for their
contributions. This transparency also helps in building trust within teams and with external
stakeholders, as it provides a clear and tamper-proof record of the development process.
4. Mitigation of Single Points of Failure
The decentralized architecture of blockchain mitigates the risks associated with single points of failure,
which are common in traditional SDLC practices. By distributing data across a network of nodes,
blockchain ensures that no single entity has control over the entire process, thereby reducing the
vulnerability of the system to targeted attacks. This decentralization enhances the overall resilience of
the software development process.
5. Challenges in Scalability and Performance
While blockchain offers significant security benefits, the study also identified challenges related to
scalability and performance. Integrating blockchain into the SDLC can introduce performance
overheads, particularly in terms of transaction processing times and storage requirements. As the size
and complexity of the software project increase, these challenges can become more pronounced,
potentially affecting the efficiency of the development process.
6. Complexity of Implementation
The research highlights the complexity of implementing blockchain within the SDLC, especially for
organizations that are not already familiar with the technology. The need for specialized knowledge in
blockchain development and smart contract programming can be a barrier to adoption. Additionally,
integrating blockchain with existing development tools and workflows may require significant changes
to established processes, which can be time-consuming and resource-intensive.
7. Potential for Industry Adoption
Despite the challenges, the study suggests that the potential benefits of blockchain integration in the
SDLC outweigh the difficulties, especially in industries where security is a paramount concern, such as
finance, healthcare, and government. The findings indicate that with proper planning, training, and
investment, blockchain can be successfully incorporated into the SDLC, leading to more secure and
trustworthy software systems.
105
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
With the increasing integration of Artificial Intelligence (AI) and Machine Learning (ML) in software
development, future research should explore how blockchain can be used to secure AI and ML models
throughout the SDLC. This includes ensuring the integrity of training data, protecting intellectual
property, and maintaining an immutable record of model evolution and decision-making processes.
Blockchain could provide a secure, transparent way to audit AI/ML model development, ensuring that
models are not tampered with or biased during the development process.
7. Addressing Legal and Regulatory Challenges
As blockchain technology becomes more prevalent in software development, legal and regulatory
challenges are likely to emerge. Future research should investigate the legal implications of using
blockchain in the SDLC, including issues related to data privacy, intellectual property rights, and
compliance with international security standards. This research could also explore how blockchain can
be used to enhance regulatory compliance, by providing transparent, immutable records of all
development activities that can be audited by regulatory bodies.
8. Evaluating Blockchain’s Role in Post-Deployment Security
While much of the focus has been on using blockchain during the development stages of the SDLC,
there is also significant potential for blockchain to enhance post-deployment security. Future research
should explore how blockchain can be used to monitor and secure software during its operational phase,
including patch management, user access control, and real-time threat detection. This could involve the
development of blockchain-based security tools that continuously monitor deployed software for
vulnerabilities and automatically initiate responses to potential threats.
9. User Experience and Adoption Barriers
Understanding the user experience and identifying potential barriers to adoption are critical for the
successful implementation of blockchain in the SDLC. Future research should focus on conducting user
studies to assess how developers and organizations interact with blockchain-enhanced SDLC tools. This
could involve exploring the learning curve associated with blockchain technology, the usability of
blockchain interfaces, and the overall impact on development workflows. Addressing these user
experience challenges will be key to achieving broader adoption.
10. Cross-Disciplinary Applications
Finally, future research should explore cross-disciplinary applications of blockchain in the SDLC,
particularly in sectors such as healthcare, finance, and government, where security is of paramount
importance. By conducting case studies across different industries, researchers can identify specific use
cases and develop tailored blockchain solutions that address the unique security challenges of each
sector. This cross-disciplinary approach could lead to the development of more versatile and widely
applicable blockchain-enhanced SDLC models.
References
• Ali, M., & Pospisil, J. (2020). Blockchain technology in the context of information security: A
review of recent developments. Journal of Computer Security, 98, 102001.
https://doi.org/10.1016/j.jocs.2020.102001
• Behl, A., & Bansal, S. (2021). Enhancing software development security using blockchain
technology. International Journal of Information Security, 20(3), 369-385.
https://doi.org/10.1007/s10207-020-05585-w
• Conoscenti, M., De Martinis, M., & Dorri, A. (2018). Blockchain for secure software
development: A systematic review. Proceedings of the IEEE International Conference on
107
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
• "Exploring and Ensuring Data Quality in Consumer Electronics with Big Data Techniques"",
International Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184,
Vol.7, Issue 8, page no.22-37, August-2022, Available :
http://www.ijnrd.org/papers/IJNRD2208186.pdf
• Jain, A., Singh, J., Kumar, S., Florin-Emilian, Ț., Traian Candin, M., & Chithaluru, P. (2022).
Improved recurrent neural network schema for validating digital signatures in VANET.
Mathematics, 10(20), 3895.
• Kumar, S., Shailu, A., Jain, A., & Moparthi, N. R. (2022). Enhanced method of object tracing
using extended Kalman filter via binary search algorithm. Journal of Information Technology
Management, 14(Special Issue: Security and Resource Management challenges for Internet of
Things), 180-199.
• Kanchi, P., Jain, S., & Tyagi, P. (2022). Integration of SAP PS with Finance and Controlling
Modules: Challenges and Solutions. Journal of Next-Generation Research in Information and
Data, 2(2). https://tijer.org/jnrid/papers/JNRID2402001.pdf
• Rao, P. R., Goel, P., & Jain, A. (2022). Data management in the cloud: An in-depth look at
Azure Cosmos DB. International Journal of Research and Analytical Reviews, 9(2), 656-671.
http://www.ijrar.org/viewfull.php?&p_id=IJRAR22B3931
• "Continuous Integration and Deployment: Utilizing Azure DevOps for Enhanced Efficiency".
(2022). International Journal of Emerging Technologies and Innovative Research
(www.jetir.org), 9(4), i497-i517. http://www.jetir.org/papers/JETIR2204862.pdf
• Shreyas Mahimkar, Dr. Priya Pandey, Om Goel, "Utilizing Machine Learning for Predictive
Modelling of TV Viewership Trends", International Journal of Creative Research Thoughts
(IJCRT), Vol.10, Issue 7, pp.f407-f420, July 2022. Available:
http://www.ijcrt.org/papers/IJCRT2207721.pdf
• "Exploring and Ensuring Data Quality in Consumer Electronics with Big Data Techniques",
International Journal of Novel Research and Development (www.ijnrd.org), Vol.7, Issue 8,
pp.22-37, August 2022. Available: http://www.ijnrd.org/papers/IJNRD2208186.pdf
• Sumit Shekhar, Prof. (Dr.) Punit Goel, Prof. (Dr.) Arpit Jain, "Comparative Analysis of
Optimizing Hybrid Cloud Environments Using AWS, Azure, and GCP", International Journal
of Creative Research Thoughts (IJCRT), Vol.10, Issue 8, pp.e791-e806, August 2022.
Available: http://www.ijcrt.org/papers/IJCRT2208594.pdf
• FNU Antara, Om Goel, Dr. Prerna Gupta, "Enhancing Data Quality and Efficiency in Cloud
Environments: Best Practices", International Journal of Research and Analytical Reviews
(IJRAR), Vol.9, Issue 3, pp.210-223, August 2022. Available:
http://www.ijrar.org/IJRAR22C3154.pdf
• Pronoy Chopra, Akshun Chhapola, Dr. Sanjouli Kaushik, "Comparative Analysis of Optimizing
AWS Inferentia with FastAPI and PyTorch Models", International Journal of Creative Research
Thoughts (IJCRT), Vol.10, Issue 2, pp.e449-e463, February 2022. Available:
http://www.ijcrt.org/papers/IJCRT2202528.pdf
• Fnu Antara, Dr. Sarita Gupta, Prof. (Dr.) Sangeet Vashishtha, "A Comparative Analysis of
Innovative Cloud Data Pipeline Architectures: Snowflake vs. Azure Data Factory",
International Journal of Creative Research Thoughts (IJCRT), Vol.11, Issue 4, pp.j380-j391,
April 2023. Available: http://www.ijcrt.org/papers/IJCRT23A4210.pdf
109
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com
SHODH SAGAR®
Scientific Journal of Metaverse and Blockchain Technologies
ISSN: 2584-2110 | Vol. 2 | Issue 2 | Jul - Dec 2024 | Peer Reviewed & Refereed
• "Strategies for Product Roadmap Execution in Financial Services Data Analytics", International
Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184, Vol.8, Issue
1, page no.d750-d758, January-2023, Available :
http://www.ijnrd.org/papers/IJNRD2301389.pdf
• "Shanmukha Eeti, Er. Priyanshi, Prof.(Dr.) Sangeet Vashishtha", "Optimizing Data Pipelines in
AWS: Best Practices and Techniques", International Journal of Creative Research Thoughts
(IJCRT), ISSN:2320-2882, Volume.11, Issue 3, pp.i351-i365, March 2023, Available at :
http://www.ijcrt.org/papers/IJCRT2303992.pdf
• Srikanthudu Avancha, Prof.(Dr.) Punit Goel, & A Renuka. (2024). Continuous Service
Improvement in IT Operations through Predictive Analytics. Modern Dynamics: Mathematical
Progressions, 1(2), 105–115. https://doi.org/10.36676/mdmp.v1.i2.14
• Saketh Reddy Cheruku, Shalu Jain, & Anshika Aggarwal. (2024). Building Scalable Data
Warehouses: Best Practices and Case Studies. Modern Dynamics: Mathematical Progressions,
1(2), 116–130. https://doi.org/10.36676/mdmp.v1.i2.15
• Saketh Reddy Cheruku, Om Goel, & Pandi Kirupa Gopalakrishna Pandian. (2024).
Performance Testing Techniques for Live TV Streaming on STBs. Modern Dynamics:
Mathematical Progressions, 1(2), 131–143. https://doi.org/10.36676/mdmp.v1.i2.16
• Kumar Kodyvaur Krishna Murthy, Prof.(Dr.) Arpit Jain, & Er. Om Goel. (2024). Navigating
Mergers and Demergers in the Technology Sector: A Guide to Managing Change and
Integration. Modern Dynamics: Mathematical Progressions, 1(2), 144–158.
https://doi.org/10.36676/mdmp.v1.i2.17
• Chandrasekhara Mokkapati, Shalu Jain, & Pandi Kirupa Gopalakrishna Pandian. (2024).
Reducing Technical Debt through Strategic Leadership in Retail Technology Systems. Modern
Dynamics: Mathematical Progressions, 1(2), 159–172.
https://doi.org/10.36676/mdmp.v1.i2.18
• Srikanthudu Avancha, Prof.(Dr.) Arpit Jain, & Er. Om Goel. (2024). Blockchain-Based Vendor
Management in IT: Challenges and Solutions. Scientific Journal of Metaverse and Blockchain
Technologies, 2(2), 83–96. https://doi.org/10.36676/sjmbt.v2.i2.38
Abbreviations
SDLC - Software Development Life Cycle
APA - American Psychological Association
IEEE - Institute of Electrical and Electronics Engineers
ACM - Association for Computing Machinery
TDSC - IEEE Transactions on Dependable and Secure Computing
JBI - Journal of Biomedical Informatics
FGCS - Future Generation Computer Systems
TCC - IEEE Transactions on Cloud Computing
SMR - Journal of Software: Evolution and Process
TSE - IEEE Transactions on Software Engineering
110
© 2024 Published by Shodh Sagar. This is a Gold Open Access article distributed under the terms of the Creative Commons
License [CC BY NC 4.0] and is available on https://sjmbt.com