A Holistic View on Blockchain and Its Issues

Author(s):  
Mohd Azeem Faizi Noor ◽  
Saba Khanum ◽  
Taushif Anwar ◽  
Manzoor Ansari

Blockchain, the technology behind most popular cryptocurrency Bitcoin and Ethereum, has attracted wide attention recently. It is the most emerging technology that has changed the financial and non-financial transaction system. It is omnipresent. Currently, this technology is enforcing banks, industries, and countries to adopt it in their financial, industrial, and government section. Earlier, it solved the centralize and double-spending problems successfully. In this chapter, the authors present a study of blockchain security issues and its challenges as well. They divided the whole chapter into two parts. The primer part covers a holistic overview of blockchain followed by the later section that argues about basic operations, 51% attack, scalability issue, Fork, Sharding, Lightening, etc. Finally, they mention an intro about its adaptation (financial or non-financial) in our 24/7 life and collaboration with fields like IoT.

Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Software Defined Networking (SDN) is a modern emerging technology in networking. SDN desires to furnish with composite and exclusive networking sources, it needs to decouple of carrier plane and the control plane, and also provides centralized control. The benefits of network programmability, dynamic computing, cost effective, high bandwidth, of SDN applications are discussed, but security has become an important concern. While centralized controller controlling multiple devices, this change in traditional network will be the main impact on network security. In this paper, we discuss about security issues and challenges in SDN architecture planes.


2021 ◽  
Vol 21 (3) ◽  
pp. 50-72
Author(s):  
K. Swapna Sudha ◽  
N. Jeyanthi

Abstract Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions.It also presents the details of existing access control and device authentication schemes with their pros and cons.


2018 ◽  
pp. 27-53
Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Author(s):  
Norafni Farlina Rahim ◽  
Mohammed Hariri Bakri ◽  
Siti Norbaya Yahaya

FinTech, or financial technology, is an emerging technology in financial transaction. It is disruptive technology which is changing the banking behavior for stakeholders. The thriving emergence of FinTech not only affects the conventional finance industry but also Islamic finance industry, as Islamic finance sector is also embracing FinTech as part of financial revolution. Thus, the Islamic FinTech emerges as faith-based FinTech. This is because Islamic FinTech claimed to comply with Shariah principle in their mechanism and smart contract. There is limited discussion on smart contract and Islamic FinTech and its Shariah principles. Hence, the Shariah principle in smart contract of Islamic FinTech need to be addressed. This chapter tries to delve into the smart contract concept in Islamic FinTech and Shariah principles in the mechanism. The review found that smart contract is currently in the early stage and so is Islamic FinTech. The scholars agreed that FinTech is a Maslahah (interest) to mankind's benefit. However, the smart contract is still in discussion and review.


Author(s):  
Michael Rygaard Hansen ◽  
Torben Ole Andersen

Mechatronics engineering is an emerging technology. New applications where a mechatronic approach is needed are added continuously. The demands to the education of engineers in this field are also increasing. Basically the challenge is to increase the content of the curriculum within usual study time. This paper presents a complete curriculum at Aalborg University based on problem-oriented and project-based learning from day one. This teaching approach has proven to be very well suited for mechatronics engineering as it provides the required holistic view of the multidisciplinary design process in a natural way. The trend and application of mechatronics engineering and research are illustrated followed up by a discussion on how problem-oriented and project-based learning are implemented in Aalborg with a number of project examples.


2019 ◽  
Vol 16 (10) ◽  
pp. 4304-4308
Author(s):  
Kailash Kumar

Blockchain technology is one of the most emerging technology nowadays in the field of cryptography. In order to get full advantage of Blockchain technology, we must come up with solutions of problems associated with it in general and security and privacy issues in particular. A new dimension of electronic transactions has come up in the form of Bitcoin cryptocurrency. It is now considered as alternative choice of making payment by many financial institutions because of its decentralized nature and free from any need of trusted third party. Like any other technology, the Bitcoin cryptocurrency also has their security and privacy issues. This paper deals with various protection and security issues of the Bitcoin. The limitations and proposed solution are also presented in the paper.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 269 ◽  
Author(s):  
Radhika Rani Chintala ◽  
Narasinga Rao M R ◽  
Somu Venkateswarlu

Human Sensor Network (HSN) is an emerging technology that allows to remotely monitor, gather and maintain the information of patient’s health parameters using bio-sensors. The bio-sensors are either implantable or wearable or may be stitched on the clothes of a patient.The collected health information is processed and maintained in a database server. The information from the database can be accessed by the users such as doctors, health servants, government, insurance agencies and by the patient or his relatives. Since, the information collected is related to thepatient’s private health record, it is required to be safely stored and protected from an unauthorized access. Thus, Security and Privacy are the key issues in HSNs.In this paper, the infrastructure-based and adhoc-based communication architecture of HSN and challenges and measures of security and privacy issues have been reviewed.  


1992 ◽  
Vol 37 (6) ◽  
pp. 553-554
Author(s):  
Cathie Atkinson ◽  
Barbara L. Andersen

Sign in / Sign up

Export Citation Format

Share Document