Advertisement

Modeling Reliable Intelligent Blockchain with Architectural Pattern

  • Sin-Ban Ho
  • Nur Azyyati AhmadEmail author
  • Ian Chai
  • Chuie-Hong Tan
  • Swee-Ling Chean
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

The emerging of blockchain technology has been associated with the revolution of World Wide Web that going to transform from Web 2.0 into Web 3.0. The blockchain network reduces the dependency of centralized and turning into decentralized network in the Web 3.0 era. In the decentralized network, the threat of data breaching can be eliminated where none of party has the authority to control over user digital badges in education. In this case, all the data will be distributed over the whole network. Furthermore, the weak vulnerability of Internet of Things (IoT) toward Advanced Persistent Threat (APT) has stimulated the development of blockchain technology as a solution. Blockchain technology has released a computer program as smart contract with the generation of token to authorize the flow of user into IoT network for strengthen the security and privacy of IoT network. Last but not least, the challenge to develop an effective blockchain network is the most challenging task since it requires deep understanding of blockchain technology.

Keywords

Blockchain Component and connector Architectural pattern 

References

  1. 1.
    Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)CrossRefGoogle Scholar
  2. 2.
    MetaMask Explained (2017). https://cryptocurrencyfacts.com/metamask-explained. Accessed 28 May 2019
  3. 3.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org
  4. 4.
    Siegel, C.: Understanding the DAO attack (2016). https://www.coindesk.com/understanding-dao-hack-journalists. Accessed 28 May 2019
  5. 5.
    Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, USA, 21–22 May 2015.  https://doi.org/10.1109/spw.2015.27
  6. 6.
    Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, 14 May 2017, pp. 468–477 (2017).  https://doi.org/10.1109/ccgrid.2017.8
  7. 7.
    Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. The Computing Research Repository (CoRR), abs/1606.06530 (2016)Google Scholar
  8. 8.
    Weber, I., Gramoli, V., Staples, M., Ponomarev, A., Holz, R., Tran, A., Rimba, P.: On availability for blockchain-based systems. In: Proceedings of 2017 IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), Hong Kong, China, 26–29 September 2017, pp. 64–73 (2017).  https://doi.org/10.1109/srds.2017.15
  9. 9.
    Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Financial Cryptography Workshops, pp. 494–509, ArXiv e-prints. Springer, Cham, March 2017.  https://doi.org/10.1007/978-3-319-70278-0_31
  10. 10.
    Web 3.0 will be powered by blockchain technology stack (2019). https://hackernoon.com/web-3–0-will-be-powered-by-blockchain-technology-stack-626ce3f828c7. Accessed 28 May 2019
  11. 11.
    Blockchain as a BaaS (2019). https://azure.microsoft.com/en-us/solutions/blockchain. Accessed 28 May 2019
  12. 12.
    Different between client server and Peer to Peer network (2019). https://www.techrepublic.com/article/understanding-the-differences-between-client-server-and-peer-to-peer-networks. Accessed 28 May 2019
  13. 13.
    Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. 13 (2017).  https://doi.org/10.1016/j.future.2017.08.020
  14. 14.
    Tee, W.J., Murugesan, R.K.: A theoretical framework to build trust and prevent fake news in social media using blockchain. In: Proceedings of 3rd International Conference of Reliable Information and Communication Technology 2018 (IRICT 2018). Advances in Intelligent Systems and Computing (AISC), vol. 843, pp. 955–962 (2019).  https://doi.org/10.1007/978-3-319-99007-1_88
  15. 15.
    Mikroyannidis, A., Domingue, J., Bachler, M., Quick, K.: Smart blockchain badges for data science education. In: Proceedings of IEEE Frontiers in Education Conference (FIE 2018), San Jose, USA, 3–6 October 2018, pp. 1–5 (2018).  https://doi.org/10.1109/fie.2018.8659012
  16. 16.
    Borrás-Gené, O.: Use of digital badges for training in digital skills with higher education. In: Proceedings of 2018 International Symposium on Computers in Education (SIIE 2018), Jerez, Spain, pp. 19–21, September 2018.  https://doi.org/10.1109/siie.2018.8586734

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sin-Ban Ho
    • 1
  • Nur Azyyati Ahmad
    • 1
    Email author
  • Ian Chai
    • 1
  • Chuie-Hong Tan
    • 2
  • Swee-Ling Chean
    • 3
  1. 1.Faculty of Computing and InformaticsMultimedia UniversityCyberjayaMalaysia
  2. 2.Faculty of ManagementMultimedia UniversityCyberjayaMalaysia
  3. 3.Lee Kong Chian Faculty Engineering and ScienceUniversiti Tunku Abdul RahmanKajangMalaysia

Personalised recommendations