Blockchain Framework for Data Storage and Security

Author:

Azeez Syed Salman1,Sinha Vivaswat1,Singh Sachin1,Goel Aarti1

Affiliation:

1. Department of Information Technology, Netaji Subhas University of Technology, New Delhi, India

Abstract

In this age of sensitive information where knowledge is power, our data has become an invaluable resource. Easy and public access to information makes it vulnerable to adulteration. The ever-increasing cases of cyber-attacks are causing organizations to spend an exorbitant amount on security. General cloud storage systems are considered efficient for data storage and sharing, but it has multiple limitations such as data centralization, data leakage, and high maintenance cost. Data centralization makes it a hotspot for cyber-attacks, making it prone to data outflows and tampering. An effective alternative is a decentralized system. With advancements in information technology and cyber security, the need for authenticity and verification is highly sought after, making blockchain technology an extremely indispensable tool in the hands of many organizations and enterprises. It solves the problem of security by encrypting its data storing it as a “Hash” or encoded data so that only the user with the key can access the data. The finance sector is being overwhelmed by the ever increasing reliability of blockchain and the implementation of its framework and architecture. Blockchain is a distributed ledger system across a network of users. The blockchain technology, being decentralized, is proposed as a disseminated and diffused or distributed approach which is testified to decipher and decode the security requirements of the new digital era as well as serve as a platform and a jump pad for advancements in various other fields such as Internet of Things (IoT), data storage, biometric security, healthcare facilities, smart grids, and many more. This chapter begins with a basic outline of all you need to know about blockchain, an upcoming evolutionary technology that ameliorates the world of data decentralization and security. It further explains its use, features, areas of implementation, architecture, as well as its limitations that are detrimental to be cognizant of how the blockchain system works/is implemented. It then explores P2P networks and interplanetary file systems (IPFS) followed by its current use cases in the form of Filecoin. Next, the chapter explores the privacy and security aspects of the blockchain. It showcases some of the faults of blockchain ledgers like Sybil and discusses some techniques that are implemented to fix them. It discusses bitcoin, one of the most secure blockchain architecture to date, and describes private and public keys, peer to peer network, hash.  chained storage, digital signature, and consensus algorithms implemented by bitcoin to prevent any fraudulent transactions from taking place.

Publisher

BENTHAM SCIENCE PUBLISHERS

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3