EFFICIENT SECURITY AND PRIVACY MECHANISM FOR BLOCK CHAIN APPLICATION
PDF

Keywords

Block Chain
Challenges
Privacy
Security
cryptographic techniques

How to Cite

EFFICIENT SECURITY AND PRIVACY MECHANISM FOR BLOCK CHAIN APPLICATION. (2019). Journal of Information Technology and Digital World, 1(2), 58-67. https://doi.org/10.36548/jitdw.2019.2.001

Abstract

The block chain has become one of the predominant term in the applications like financial, automobile, health care, risk management, and internet of things due to its reliability and more beneficial services. It executes every transaction by establishing trust in the open environment. The deployment of the block chain technology in the various applications remains as the recent research topic as the privacy and the security of the bock chain are undecided and unconvinced, so the paper tries to develop an efficient security and privacy mechanism for the block chain applications. The proposed method puts forth the biometric recognition in the block chain technology to improve the security and the privacy mechanism for the block chain application.

PDF

References

Joshi, Archana Prashanth, Meng Han, and Yan Wang. "A survey on security and privacy issues of blockchain technology." Mathematical Foundations of Computing 1, no. 2 (2018): 121-147.

Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392-1393). IEEE.

Yli-Huumo, Jesse, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. "Where is current research on blockchain technology?—a systematic review." PloS one 11, no. 10 (2016): e0163477.

Halpin, Harry, and Marta Piekarska. "Introduction to Security and Privacy on the Blockchain." In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 1-3. IEEE, 2017.

Lin, Iuon-Chang, and Tzu-Chun Liao. "A Survey of Blockchain Security Issues and Challenges." IJ Network Security 19, no. 5 (2017): 653-659.

Suma, V. "SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 45-54.

Bhalaji, N. (2019). QOS AND DEFENSE ENHANCEMENT USING BLOCK CHAIN FOR FLY WIRELESS NETWORKS. Journal of trends in Computer Science and Smart technology (TCSST), 1(01), 1-13.

Jacob, I. J. (2019). CAPSULE NETWORK BASED BIOMETRIC RECOGNITION SYSTEM. Journal of Artificial Intelligence, 1(02), 83-94.

Sivaganesan, D. (2019). BLOCK CHAIN ENABLED INTERNET OF THINGS. Journal of Information Technology, 1(01), 1-8.

Praveena, A., and S. Smys. "Prevention of inference attacks for private information in social networking sites." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-7. IEEE, 2017.

Karthiban, K., and S. Smys. "Privacy preserving approaches in cloud computing." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462-467. IEEE, 2018.

Anguraj, Dinesh Kumar, and S. Smys. "Trust-based intrusion detection and clustering approach for wireless body area networks." Wireless Personal Communications 104, no. 1 (2019): 1-20.

[n. d.]. Ethereum Project. https://www.ethereum.org. ([n. d.]).

Kalodner, Harry, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. "Arbitrum: Scalable, private smart contracts." In 27th {USENIX} Security Symposium ({USENIX} Security 18), pp. 1353-1370. 2018.

Jason Teutsch and Christian Reitwießner. 2017. TrueBit: A scalable verification solution for blockchains. (2017)