IRO Journals

Journal of Ubiquitous Computing and Communication Technologies

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2

Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3

Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2

A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3

Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4

Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2

DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1

Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3

Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4

Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4

LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]
Volume-2 | Issue-3

Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3

Home / Archives / Volume-4 / Issue-4 / Article-3

Volume - 4 | Issue - 4 | december 2022

Blockchain Network Based Hyperledger Fabric Techniques – A Survey
S. Ayyasamy   78  41
Pages: 245-255
Cite this article
Ayyasamy, S. (2022). Blockchain Network Based Hyperledger Fabric Techniques – A Survey. Journal of Ubiquitous Computing and Communication Technologies, 4(4), 245-255. doi:10.36548/jucct.2022.4.003
Published
03 January, 2023
Abstract

Blockchain is described as a cacheable, immutable that makes tracking transactions and assets in a corporate network easier. Hyperledger is a free software initiative that was designed to aid in the development of distributed ledgers based on blockchain technology. Hyperledger has several frameworks, including Hyperledger Fabric, Hyperledger Burrow, Hyperledger Indy, Hyperledger Sawtooth, and Hyperledger Grid. There are also other Hyperledger-based technologies used in blockchain. This research paper investigates the many applications and strategies employed by the Hyperledger Fabric blockchain network. There will also be a discussion regarding Hyperledger frameworks, future improvements, and overall applications used.

Keywords

Network security fabric technology hyperledger networks transaction management cryptographic

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

Subscription Payment Details

townscript (INR / USD): click here

Subscription Fee

Annual Subscription 15,000 INR / 200 USD
Subscription form: click here