scholarly journals Distributed Architecture for Secure, Attack-Resilient Crypto Currency Transactions for the Classified Temporal and Text Data

In the digital world, the crypto currency has to do with the use of tokens based on the distributed ledger technology in a secure manner. Crypto currency can be a resource on a block chain network or can be seen as a tool to perform the transactions ensuring the privacy and security. Data may be available in temporal or text format. This paper describes about the distributed architecture for secure and attack-resilient bit coin-based crypto currency transactions for classified temporal and text data. The temporal data may be voice, sound or graphical information basing on the time series. If the data available is temporal this work describes about how it can be classified into a processed form. In this context, this paper describes the process of converting temporal data into text data. Further, the paper describes about the process of ensuring the security. This paper describes about the methodologies of cryptography-based hashing, attack-resilient nonce generation and verifiable encryption techniques for the construction of resilient transactions against stealthy data-integrity attack.

2021 ◽  
Vol 11 (4) ◽  
pp. 3807-3822
Author(s):  
Shabna Salam ◽  
K. Praveen Kumar

Block chain is a distributed ledger that offers secure and immutable storage. E–governance allows exchange of information between government and citizens or organizations through latest information and communication technologies. The E governance services facilitate efficient and fast access of services; on the other hand it raises potential risks of breaching into privacy and Security. Blockchain based e-governance system offers secure and transparent services without intermediary. This paper investigates the scope and challenges of adopting blockchain technology as a platform for E-Governance.


2021 ◽  
Author(s):  
Geetha R ◽  
T. Padmavathy ◽  
G.Umarani Srika

Abstract In a decentralized network every user makes use of personal identity details at different places for various services and these details are shared with third-parties without their consent and stored at an unknown location. Organizations like government, banks and social platforms are considered to be the weakest point in the current identity management system as they are vulnerable which leads to compromising billions of user identity data. Block chain based User Identity Management is a solution which provides a decentralized environment that manages the user identity data and their related Know-Your-Customer (KYC) documents in a distributed ledger. All the transactions of the network are stored in the block which is a type of a data structure and these blocks are validated using the powerful consensus algorithms and linked to form a block chain. Smart contracts will act as an interface between the client and the block chain network. User’s information cannot be provided to any third party vendors without the explicit consent of the user. This paper proposes a framework for User Identity Management using Block chain technology in a decentralized Network. The proposed framework ensures a high level privacy and security for the personal identity details and the documents. In addition to that the performance analysis of the framework is presented in terms of Transaction, Mining Resource and Difficulty Variation.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 83 ◽  
Author(s):  
Md Haseeb ◽  
K Raja Sekhar ◽  
Y V. Spandana ◽  
M Syam

Block chain is a trust which can be best understood by the state machine replication, It is decentralized distributed ledger which is along all peers in the network connected through nodes over Internet. Every Node in the chain have equal stake and also the main factor is every node which have greater CPU cycles has a chance to operate node by spending those CPU cycles and also show Proof Of Work. Hence when the block chain is used in Business Models it loses its Private transactions and Confidential Contracts.  


Data in the cloud is leading to the more interest for cyber attackers. These days’ attackers are concentrating more on Health care data. Through data mining performed on health care data Industries are making Business out of it. These changes are affecting the treatment process for many people so careful data processing is required. Breaking these data security leads to many consequences for health care organizations. After braking security computation of private data can be performed. By data storing and running of computation on a sensitive data can be possible by decentralization through peer to peer network. Instead of using the centralized architecture by decentralization the attacks can be reduced. Different security algorithms have been considered. For decentralization we are using block chain technology. Privacy, security and integrity can be achieved by this block chain technology. Many solutions have been discussed to assure the privacy and security for Health care organizations somehow failed to address this problem. Many cryptographic functions can be used for attaining privacy of data. Pseudonymity is the main concept we can use to preserve the health care means preserving data by disclosing true identity legally.


2020 ◽  
Vol 12 (05-SPECIAL ISSUE) ◽  
pp. 1426-1431
Author(s):  
Monika R ◽  
Mukka Priyanka ◽  
Aishwarya R
Keyword(s):  

Recently, there has been a continuous occurrence of a security incident on a crypto currency exchange. This background is not related to the current social situation. This is because the social interest in crypto currency provides an attacker with a chance to attack. In this paper, we have started to investigate the relationship between crypto currency and security incidents of block chain. This paper focuses on analysis of crypto currency event of block chain. In this paper, we analyzed the amount of Google data retrieval around specific keywords during a specific period. And we analysis the relevance of this keyword to specific keywords related to security. For example, we analyzed the decrypted bitch coin or etherium, the nice money exchange, nicehash, coincheck, BTCglobal, BITGRAIL, Blackwallet. We are focused on the relationship between the time of the security incident and the public awareness of the related crypto currency exchange. According to the results of the study, it can be assumed that a security incident occurred at a certain point in each exchange. Through this study, we were able to confirm public interest in crypto currency miners. I was able to confirm the degree of interest by time. Cryptographic digger was mainly focused on BitMiner, CGMiner, MultiMiner, and BFGMiner. Most of the public interest in these mining equipment is peaking in December 2017. We also looked at public interest in cryptic bit coin and etherium, mainly in December 2017. The results of this paper can be used to analyze the point of time of the attack on the crypto currency exchange. Crypto currency exchange attacks will continue to occur in the future. If so, when is this attack going to take place? At that point, we need to know at what point the exchange will have public interest. At that point, we should also look at the exchange for vulnerabilities.


Author(s):  
Prof. Sushma Laxman Wakchaure ◽  
Shinde Bipin Balu ◽  
Bhabad Vasant M. ◽  
Dnyandev S. Musale ◽  
Supriya S. Burhade

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. You have probably heard of Blockchain in the past few years, mostly in the context of crypto currency. However, Blockchain has grown to have several different applications. The significant part about Blockchain is that it is never under the complete control of a single entity due to being entirely consensus-driven. It can never change the data you store in the Blockchain used widely in sharing medical data in the healthcare industry. Due to the security that Blockchain provides, this data can be shared among parties seamlessly. Another application of Blockchain is in maintaining the integrity of payment systems. Blockchain-based payment systems are immune to external attacks and theft. Blockchain can also be used in tracking the status of products in a supply chain in real-time.


2018 ◽  
Vol 7 (04) ◽  
pp. 23823-23826 ◽  
Author(s):  
Divya M ◽  
Nagaveni B. Biradar

IOTA is a revolutionary new, next generation public distributed ledger that utilizes a novel invention, called a “Tangle”, at its core. The Tangle is a new data structure based on a Directed Acyclic Graph (DAG). As such it has no Blocks, no Chain and also no Miners. Because of this radical new architecture, things in IOTA work quite differently compared to other Blockchains.


Voting is the principal incident in any democratic country. Generally voting is done using ballots system, but this technique is ancient and can be easily sabotaged. There is a necessity to bring in new technologies to ensure effective implementation of digital voting systems. The security of digital voting is a significant aspect for implementation and must meet the requirements to be appropriate for trust worthiness. Block chain technology provides reliable electronic voting system that can be secured by adding more decision so that the possible attacks can be avoided. Block chain technology based on crypto currency implements diffused database architecture with transaction records secured by transactions.


Author(s):  
Frederik Temmermans ◽  
Deepayan Bhowmik ◽  
Fernando Pereira ◽  
Touradj Ebrahimi ◽  
Peter Schelkens

Sign in / Sign up

Export Citation Format

Share Document