Skip to main content

Modeling Reliable Intelligent Blockchain with Architectural Pattern

  • Conference paper
  • First Online:
  • 1599 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1073))

Abstract

The emerging of blockchain technology has been associated with the revolution of World Wide Web that going to transform from Web 2.0 into Web 3.0. The blockchain network reduces the dependency of centralized and turning into decentralized network in the Web 3.0 era. In the decentralized network, the threat of data breaching can be eliminated where none of party has the authority to control over user digital badges in education. In this case, all the data will be distributed over the whole network. Furthermore, the weak vulnerability of Internet of Things (IoT) toward Advanced Persistent Threat (APT) has stimulated the development of blockchain technology as a solution. Blockchain technology has released a computer program as smart contract with the generation of token to authorize the flow of user into IoT network for strengthen the security and privacy of IoT network. Last but not least, the challenge to develop an effective blockchain network is the most challenging task since it requires deep understanding of blockchain technology.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)

    Article  Google Scholar 

  2. MetaMask Explained (2017). https://cryptocurrencyfacts.com/metamask-explained. Accessed 28 May 2019

  3. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org

  4. Siegel, C.: Understanding the DAO attack (2016). https://www.coindesk.com/understanding-dao-hack-journalists. Accessed 28 May 2019

  5. Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, USA, 21–22 May 2015. https://doi.org/10.1109/spw.2015.27

  6. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, 14 May 2017, pp. 468–477 (2017). https://doi.org/10.1109/ccgrid.2017.8

  7. Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. The Computing Research Repository (CoRR), abs/1606.06530 (2016)

    Google Scholar 

  8. Weber, I., Gramoli, V., Staples, M., Ponomarev, A., Holz, R., Tran, A., Rimba, P.: On availability for blockchain-based systems. In: Proceedings of 2017 IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), Hong Kong, China, 26–29 September 2017, pp. 64–73 (2017). https://doi.org/10.1109/srds.2017.15

  9. Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Financial Cryptography Workshops, pp. 494–509, ArXiv e-prints. Springer, Cham, March 2017. https://doi.org/10.1007/978-3-319-70278-0_31

  10. Web 3.0 will be powered by blockchain technology stack (2019). https://hackernoon.com/web-3–0-will-be-powered-by-blockchain-technology-stack-626ce3f828c7. Accessed 28 May 2019

  11. Blockchain as a BaaS (2019). https://azure.microsoft.com/en-us/solutions/blockchain. Accessed 28 May 2019

  12. Different between client server and Peer to Peer network (2019). https://www.techrepublic.com/article/understanding-the-differences-between-client-server-and-peer-to-peer-networks. Accessed 28 May 2019

  13. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. 13 (2017). https://doi.org/10.1016/j.future.2017.08.020

  14. Tee, W.J., Murugesan, R.K.: A theoretical framework to build trust and prevent fake news in social media using blockchain. In: Proceedings of 3rd International Conference of Reliable Information and Communication Technology 2018 (IRICT 2018). Advances in Intelligent Systems and Computing (AISC), vol. 843, pp. 955–962 (2019). https://doi.org/10.1007/978-3-319-99007-1_88

  15. Mikroyannidis, A., Domingue, J., Bachler, M., Quick, K.: Smart blockchain badges for data science education. In: Proceedings of IEEE Frontiers in Education Conference (FIE 2018), San Jose, USA, 3–6 October 2018, pp. 1–5 (2018). https://doi.org/10.1109/fie.2018.8659012

  16. Borrás-Gené, O.: Use of digital badges for training in digital skills with higher education. In: Proceedings of 2018 International Symposium on Computers in Education (SIIE 2018), Jerez, Spain, pp. 19–21, September 2018. https://doi.org/10.1109/siie.2018.8586734

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nur Azyyati Ahmad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ho, SB., Ahmad, N.A., Chai, I., Tan, CH., Chean, SL. (2020). Modeling Reliable Intelligent Blockchain with Architectural Pattern. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_105

Download citation

Publish with us

Policies and ethics