Transforming Businesses With Bitcoin Mining and Blockchain Applications - Advances in Finance, Accounting, and Economics
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 14)

H-INDEX

2
(FIVE YEARS 2)

Published By IGI Global

9781799801863, 9781799801887

Author(s):  
M. K. Manoj ◽  
Somayaji Siva Rama Krishnan

Blockchain technology is a distributed framework for sharing data that is validated through cryptographic functions. The nodes of the network come to a consensus regarding addition of data to the blockchain. Every blockchain operation requires a processing fee. This fee makes storing of large data on the blockchain infeasible. An indirect alternative for this challenge could be use of IPFS, which is a decentralized peer-peer network that facilitates storage of file. This is accomplished by storing the hash of the IPFS as data on the blockchain.


Author(s):  
Jayanti Mehra ◽  
Ramjeevan Singh Thakur

Weblog analysis takes raw data from access logs and performs study on this data for extracting statistical information. This info incorporates a variety of data for the website activity such as average no. of hits, total no. of user visits, failed and successful cached hits, average time of view, average path length over a website; analytical information such as page was not found errors and server errors; server information, which includes exit and entry pages, single access pages, and top visited pages; requester information like which type of search engines is used, keywords and top referring sites, and so on. In general, the website administrator uses this kind of knowledge to make the system act better, helping in the manipulation process of site, then also forgiving marketing decisions support. Most of the advanced web mining systems practice this kind of information to take out more difficult or complex interpretations using data mining procedures like association rules, clustering, and classification.


Author(s):  
K. Dinesh Kumar ◽  
Venkata Rathnam T. ◽  
Venkata Ramana R. ◽  
M. Sudhakara ◽  
Ravi Kumar Poluru

Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create the communication among objects directly without human interaction. With the presence of internet of things technology in our daily comes smart thinking and various advantages. At the same time, secure systems have been a most important concern for the protection of information systems and networks. However, adopting traditional security management systems in the internet of things leads several issues due to the limited privacy and policies like privacy standards, protocol stacks, and authentication rules. Usually, IoT devices has limited network capacities, storage, and computing processors. So they are having more chances to attacks. Data security, privacy, and reliability are three main challenges in the IoT security domain. To address the solutions for the above issues, IoT technology has to provide advanced privacy and policies in this large incoming data source. Blockchain is one of the trending technologies in the privacy management to provide the security. So this chapter is focused on the blockchain technologies which can be able to solve several IoT security issues. This review mainly focused on the state-of-the-art IoT security issues and vulnerabilities by existing review works in the IoT security domains. The taxonomy is presented about security issues in the view of communication, architecture, and applications. Also presented are the challenges of IoT security management systems. The main aim of this chapter is to describe the importance of blockchain technology in IoT security systems. Finally, it highlights the future directions of blockchain technology roles in IoT systems, which can be helpful for further improvements.


Author(s):  
Vartika Koolwal ◽  
Sunil Kumar ◽  
Krishna Kumar Mohbey

Blockchain is the new “buzz” word that has attracted the attention of industries and businesses. It is an innovative technology that provides information exchange in an efficient and transparent manner. It has a wide range of application varying from cryptocurrency, healthcare, risk management, education, financial services, internet of things (IoT), border security to public services. However, security issues and threats of this novel technology is also an important topic. In this chapter, the authors provide a comprehensive study of applications, challenges, and issues and how to combat them in the blockchain. Major areas of concern are security, scalability, cryptocurrency's malicious attacks, etc.


Author(s):  
Rajit Nair ◽  
Amit Bhagat

Blockchain is one of the fastest growing and most important technologies in the world. Most of the people think that blockchain is all about cryptocurrency or bitcoin, but it is beyond that. It is a technology that creates immutable and distributable data records that are shared between peers in network database systems and records digital events in such a way that it cannot be altered or recognized until it reaches the recipient. In recent times, many of the industries are using blockchain as a tool to innovate their functionality. Some of the well-known industries are banking sector, real estate, healthcare, internet of things, insurance, and many more. Out of these industries, healthcare is one of the industries that is adopting blockchain very rapidly. This chapter will discuss the blockchain and how it has transformed the healthcare industry.


Author(s):  
Anup Bihari Gaurav ◽  
Pushpendra Kumar ◽  
Vinod Kumar ◽  
Ramjeevan Singh Thakur

The global popularity of digital cryptocurrencies and research in a decentralized system have led to the foundation of blockchain, which is fundamentally a public digital ledger to share information in a trustworthy and secure way. The concept and applications of blockchain have now spread from cryptocurrencies to various other domains, including business process management, smart contracts, IoT, and so on. Cryptocurrency is a mechanism designed to work for the online secure payments system using cryptography. Cryptography maintains confidentiality, integrity, and authentication. Cryptocurrency has come as a novel way of making payments that keep all the transactions secure and safe, which avoids any type of intermediaries such as a bank. This chapter will shed light on the concept of blockchain technology, security, and its applications in various domains.


Author(s):  
Vilas Baburao Khedekar ◽  
Shruti Sangmesh Hiremath ◽  
Prashant Madhav Sonawane ◽  
Dharmendra Singh Rajput

In today's world, we deal with various online services, where each person deals with various technologies. These technologies are made for people to make our access to the new world easily. There is a tremendous use of online applications, websites which require large storage. Large data is handled by the online systems. The collection of data in the whole world is about 20% in the last few years. The data is captured from the user, controlled by the systems, and operations are performed on data. It requires more system accuracy and protection to personal data. But the person does not know about the data, where and how it is used where it is stored or whether the data is handled by some organisations for their own use or data is been hacked by another person. This chapter explores protection of data using the decentralized privacy of blockchain.


Author(s):  
Chandrasekar Ravi ◽  
Praveensankar Manimaran

Since the advent of the web, the number of users who started using the internet for everyday purpose has increased tremendously. Most of the common purposes are to access their data whenever they want and wherever they want. So many companies have started providing these services to normal users. These companies store huge volume of data in the data centers. So protecting the integrity of the data is the main responsibility of these companies. Blockchain is one of the trending solutions that gives storage immutability to the users. This chapter starts with the working of blockchain and smart contracts and advantages and disadvantages of blockchain and smart contracts and then goes on to explain how blockchain can be integrated into the internet of things (IOT). This chapter ends with an architecture based on the proof-of-concept for access management, which is blockchain-based fully distributed architecture.


Author(s):  
Sathiyabhama B. ◽  
Rajeswari K. C. ◽  
Reenadevi R. ◽  
Arul Murugan R.

Technology is a boon to mankind in this fast-growing era. The advancement in technology is the predominant factor for the sophisticated way of living of the people. In spite of technology, revolution happens across the world, and mankind still suffers due to various health issues. Healthcare industries take immense measures to improve the quality of life. An enormous volume of digital data is being handled every day in the healthcare industry. There arises a need for the intervention of technology in the healthcare industry to be taken to a greater extent. The prime duty of any healthcare industry is to store and maintain those data in the form of electronic health records (EHR) in a secured manner.


Author(s):  
Chanti S. ◽  
Taushif Anwar ◽  
Chithralekha T. ◽  
V. Uma

The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.


Sign in / Sign up

Export Citation Format

Share Document