Protection Method of Network Data Privacy Security Issues Based on Blockchain Technology

Author(s):  
Huikui Zhou ◽  
Mudan Gu
Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


Author(s):  
Carl S. Guynes ◽  
Yu Andy Wu ◽  
John Windsor

E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks.


2020 ◽  
Vol 8 (6) ◽  
pp. 5260-5264

Mobile payments today have become the most preferred method of transaction for an increasing number of customers. To provide robust security mechanism for mobile payment in public network is challenging task for device manufacturing companies and network service companies. Most of the mobile payment apps make payment easy and fast, but users have to face new security challenges. Because users have to do payment transaction in an open network this makes users sensitive data put at risk, where advisories launch attack and theft of user’s identity information. Resent payment apps like Google-pay and phone-pay successfully address the security issues, but these apps might suffer from internal attacks, because data is centralized where apps should accept permission from bank server to do the transaction. In the proposed system we introduce a protected transaction pattern using blockchain technology which overcomes the limitation from the existing system. Our money transformed in the form of cryptocurrencies and it stored in the separate wallet. The particular wallet is installed in the mobile devices. Payment or transaction through two consumers lacking any prior permission. The proposed System uses decentralized data server to preserve data privacy from adversaries. While transaction we directly transfer through the blockchain wallet without any interference from the Bank. The proposed system proven to be secure and efficient for online payment transaction. It secured from cyber attackers or intruders hence data can be stored in separate blocks and its difficult to find out exact data. This overcomes the negative aspect of usual mobile payments.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


2018 ◽  
Author(s):  
Mian Zhang ◽  
Yuhong Ji

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology that maintains the Bitcoin transaction ledger. Blockchain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare. Blockchain technology has the potential of securely, privately, and comprehensively manage patient health records. In this work, we discuss the latest status of blockchain technology and how it could solve the current issues in healthcare systems. We evaluate the blockchain technology from the multiple perspectives around healthcare data, including privacy, security, control, and storage. We review the current projects and researches of blockchain in the domain of healthcare records and provide the insight into the design and construction of next generations of blockchain-based healthcare systems.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3512-3518

The current paper is focused on its security issues with its prospective applications for educational applications and explored how blockchain Technology can be used to solve some education problems.Blockchain Technology can be integrated into multiple areas like cryptocurrencies,smart contract ,Bank,Blockcahin with video games,finance,judiciary , commerce and IOT.Blockchain Technology has already changed peoples lifestyle in many areas due to its great influence. In this paper the Three types of Blockchain engineering 1.0,2.0,3.0 with its protocol stack layer working ,its advantages and applications are checked .Along with different platforms on which Blokchain is running with its features is highlighted and evolution phases in Blockchain .This paper aim is to test amenities of security,related to the Blockchain and need of innovation of Blockchain.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Ayvarovna Gamidullaeva ◽  
Yulia Vertakova ◽  
Svetlana Panasenko

The chapter introduces the perspectives on the use of avatar-based management techniques for designing new tools to improve blockchain as technology for cyber security issues. The purpose of this chapter was to develop an avatar-based closed model with strong empirical grounding that provides a uniform platform to address issues in different areas of digital economy and creating new tools to improve blockchain technology using the intelligent visualization techniques. The authors show the essence, dignity, current state, and development prospects of avatar-based management using blockchain technology for improving implementation of economic solutions in the digital economy of Russia.


Sign in / Sign up

Export Citation Format

Share Document