Skip to main content

Imminent Threat with Authentication Methods for AI Data Using Blockchain Security

  • Chapter
  • First Online:
Blockchain Security in Cloud Computing

Abstract

Since the announcement of Satoshi Nakamoto’s Bitcoin policy document in 2008, blockchain has become one of the most widely discussed techniques for implementing safety storage and processing through decentralized, approved, peer-to-peer networks. This study described peer-reviewed literature, which uses cryptocurrency for cybersecurity purposes and offers a comprehensive overview of the most commonly used application areas of blockchains. This main forward-looking study further illuminates the possible directions for science, education, and practice on blockchain and cyberprotection, such as IoT blockchain security, as well as the need for data analysis of blockchain safe data. Analyses of this data increase the value of the latest machine learning (ML) technologies. There is a logical quantity of data required by ML for correct decisions. Data reliability and sharing in ML are very critical for improving the accuracy of performance. The combination of these two technologies will yield extremely accurate results (ML and BT). In this paper, we present a detailed review of ML adoption to make mobile platforms based on BT more resilient against attacks. Examples of such support systems as support vector machines (SVM) and bagging and deep learning (DL) algorithms can be used to evaluate attacks on a blockchain network, including convolutional neural network (CNN) and long short-term memory (LSTM). Actually, various traditional ML techniques are available. Furthermore, we include the use of both technologies in a variety of smart applications, including UAV, Smart Grid (SG), healthcare, and smart towns and cities. Future technological issues and concerns are also debated. Finally, we discuss the study model with a thesis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 29 June 2017)

  2. N. Bozic, P. Guy, S. Stefano, A tutorial on blockchain and applications to secure network control-planes. SCNS IEEE 2016. [CrossRef]

    Google Scholar 

  3. D. Bradbury, The problem with bitcoin. Comput Fraud Secur. 11, 5–8 (2013) [CrossRef]

    Article  Google Scholar 

  4. G. Paul, P. Sarkar, S. Mukherjee, Towards a more democratic mining in bitcoins. In Proceedings of the International Conference on Information Systems Security, Hyderabad, India, 16–20 December 2014; Springer International Publishing: Cham, Switzerland, 2014

    Google Scholar 

  5. T. Bamert, C. Decker, R. Wattenhofer, S. Welten, BlueWallet: the secure BitcoinWallet, in Security and Trust Management, ed. by S. Mauw, C. Jensen, (Springer International Publishing, Cham, Switzerland, 2014), pp. 65–80

    Google Scholar 

  6. E. Anceaume, T. Lajoie-Mazenc, R. Ludinard, B. Sericola. Safety analysis of Bitcoin improvement proposals. In Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 31 October–2 November 2016

    Google Scholar 

  7. R. Upadhyaya, A. Jain, Cyber ethics and cybercrime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 29–30 April 2016

    Google Scholar 

  8. S. Haber, W.S. Stornetta, How to time-stamp a digital document. In Proceedings of the Conference on the Theory and Application of Cryptography, Sydney, NSW, Australia, 8–11 January 1990; Springer: Berlin/Heidelberg, Germany, 1990

    Google Scholar 

  9. I. Eyal, G.S. Emin, Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg, Germany, 2014

    Google Scholar 

  10. K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic Mapping Studies in Software Engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy, 26–27 June 2008

    Google Scholar 

  11. C. Mann, D. Loebenberger, Two-factor authentication for the Bitcoin protocol. In International Workshop on Security and Trust Management; Springer International Publishing: Cham, Switzerland, 2015

    Google Scholar 

  12. Y. Yuan, F.-Y. Wang, Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016

    Google Scholar 

  13. E.K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, B. Ford, École Polytechnique Fédérale de Lausanne (EPFL). Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016

    Google Scholar 

  14. M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg, Germany, 2014

    Google Scholar 

  15. M. Bastiaan, Preventing the 51%-attack: A stochastic analysis of two phase proof of work in bitcoin. Available online. http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf (accessed on 29 June 2017

  16. M.H.U. Rehman, E. Ahmed, I. Yaqoob, I.A.T. Hashem, M. Imran, S. Ahmad, Big data analytics in industrial IoT using a concentric computing model. IEEE Commun. Mag. 56(2), 37–43 (2018)

    Article  Google Scholar 

  17. P.K. Sharma, J.H. Ryu, K.Y. Park, J.H. Park, J.H. Park, Li-Fi based on security cloud framework for future IT environment. HCIS 8(1), 1–13 (2018)

    Google Scholar 

  18. W. Yu, F. Liang, X. He, W.G. Hatcher, C. Lu, J. Lin, X. Yang, A survey on the edge computing for the internet of things. IEEE Access 6, 6900–6919 (2018)

    Article  Google Scholar 

  19. M. Chiang, S. Ha, C.-L.I.F. Risso, T. Zhang, Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55(4), 18–20 (2017)

    Article  Google Scholar 

  20. O. Novo, Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  21. K. Kalkan, S. Zeadally, Securing internet of things with software defined networking. IEEE Commun. Mag. 56(9), 186–192 (2018)

    Article  Google Scholar 

  22. B.B. Zarpelão, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Article  Google Scholar 

  23. I. Butun, B. Kantarci, M. Erol-Kantarci, Anomaly detection and privacy preservation in cloud-centric internet of things. In Proc. IEEE International Conference on Communication Workshop (ICCW), Jun 2015, pp. 2610-2615

    Google Scholar 

  24. S.R. Kumar, N. Gayathri, Trust based data transmission mechanism in manet using solsr. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore., S. R., & Gayathri, N. (2016, December). Trust based data transmission mechanism in MANET using sOLSR. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore

    Google Scholar 

  25. S.R. Kumar, N. Gayathri, B. Balusamy, Enhancing network lifetime through power-aware routing in MANET. Int. J. Internet Technol. Secur. Trans. 9(1–2), 96–111 (2019)

    Article  Google Scholar 

  26. HIMSS Blockchain Work Group. (2017, Oct. 23). Part 1: Navigating the blockchain landscape—Opportunities in digital health. [Online]. Available: http://www.himss.org/news/part-1-navigatingblockchain-landscape-opportunities-digital-health

  27. D. Houlding, H. Flannery. (2018, Feb. 1). Part 2: Healthcare blockchain—A path to success in 2018. [Online]. Available: http://www.himss.org/news/part-2-healthcare-blockchain-path-success-2018

  28. R. Rahim, R. Patan, R. Manikandan, S.R. Kumar, Introduction to blockchain and big data, in Blockchain, Big Data and Machine Learning, (CRC Press, 2020), pp. 1–23

    Google Scholar 

  29. HIMSS 2018 conference session. (2018, Mar. 6). Blockchain reset: Seeing through the hype and starting down the path. [Online]. Available: http://www.himssconference.org/session/blockchainreset-seeing-through-hype-and-starting-down-path

  30. R. Chandran, S.R. Kumar, N. Gayathri, Designing a locating scams for mobile transaction with the aid of operational activity analysis in cloud. Wirel. Pers. Commun., 117, 1–14 (2020)

    Google Scholar 

  31. The Linux Foundation. (2017). About Hyperledger. [Online]. Available: https://www.hyperledger.org/about Ethereum Foundation. (2018). Ethereum: Blockchain app platform. [Online]. Available: https://www.ethereum.org/

  32. A. Azaria, A. Ekblaw, T. Vieira, A. Lippman. (2016, Aug. 22–24). MedRec: using blockchain for medical data access and permission management, presented at the Int. Conf. Open and Big Data, Vienna, Austria. [Online]. Available: http://ieeexplore.ieee.org/document/7573685/

  33. A.K. Show, A. Kumar, A. Singhal, N. Gayathri, K. Vengatesan, Future blockchain technology for autonomous applications/autonomous vehicle, in Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles, (IGI Global), United States of America pp. 165–177

    Google Scholar 

  34. N. Kumar, N. Gayathri, M. A. Rahman, B. Balamurugan (eds.), Blockchain, Big Data and Machine Learning: Trends and Applications, United States of America (CRC Press, 2020)

    Google Scholar 

  35. C. McFarlane, M. Beer, J. Brown, N. Prendergast. (2017, May). Patientory: a healthcare peer-to-peer EMR storage network v1.1. [Online]. Available: https://patientory.com/patientory_whitepaper.pd.

  36. S.K. Sharma, R.K. Modanval, N. Gayathri, S.R. Kumar, C. Ramesh, Impact of application of big data on cryptocurrency. Cryptocurrencies and Blockchain Technology Applications, Scrivener Publishing LLC, Beverly, Massachusetts. 181–195 (2020)

    Google Scholar 

  37. A. Pandey, A. Kumar, A. Singha, N. Gayathri, S.R. Kumar, 4 Blockchain Databases 2. Blockchain, Big Data and Machine Learning: Trends and Applications, 97 (2020)

    Google Scholar 

  38. R. Chandran, S.R. Kumar, N. Gayathri, Genetic algorithm-based tabu search for optimal energy-aware allocation of data center resources. Soft. Comput. 24(21), 16705–16718 (2020). https://doi.org/10.1007/s00500-020-05240-9

    Article  Google Scholar 

  39. L. Dong, W. Jinwu, Block chain technology principle, application field and challenge [J]. Telecomm. Sci. 32(12), 19–25 (2016)

    Google Scholar 

  40. Y. Yong, W. Feiyue, Development status and Prospect of block chain technology [J]. Acta Automat. Sin. 42(4), 481–494 (2016)

    Google Scholar 

  41. G. Nagasubramanian, R.K. Sakthivel, R. Patan, A.H. Gandomi, M. Sankayya, B. Balusamy, Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Comput. & Applic. 32(3), 639–647 (2020)

    Article  Google Scholar 

  42. C. Gao, T. Liang, L.I. Huixing, et al., Development and Application of open automated demand response [J]. Power Syst. Technol. 93(3), 12–12 (2013)

    Google Scholar 

  43. R.K. Sakthivel, G. Nagasubramanian, F. Al-Turjman, M. Sankayya, Core-level cybersecurity assurance using cloud-based adaptive machine learning techniques for manufacturing industry. Trans. Emerg. Telecommun. Technol., e3947 (2020)

    Google Scholar 

  44. W. Beibei, S. Yujun, L. Yang, Application of uncertain demand response modeling in power integral incentive decision [J]. Automat. Electr. Power Syst. 2015(10). R.M. Parizi, On the gamification of human-centric traceability tasks in software testing and coding. In: 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), Towson, MD, 2016, pp. 193–200

    Google Scholar 

  45. A. Back, et al., Enabling blockchain innovations with pegged sidechains [Online]. Available: http://www.blockstream.com/sidechains.pdf, 2014

  46. P. Robinson, Requirements for Ethereum Private Sidechains, arXiv Prepr. arXiv1806.09834, 2018

    Google Scholar 

  47. Q. Zhang, R.M. Parizi, K.K.R. Choo, A pentagon of considerations towards more secure Blockchains. IEEE Blockchain Tech. Briefs. pp. 1–30 (2018)

    Google Scholar 

  48. Bitcoin-abe, https://github.com/bitcoin-abe/bitcoin-abe

  49. T.T.A. Dinh, J. Wang, G. Chen, R. Liu, B.C. Ooi, K.-L. Tan, BLOCKBENCH: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM International Conference on Management of Data, 2017, p. 10851100

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijaya Krishna Sonthi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sonthi, V.K., Nagarajan, S., Murali Krishna M, M.V.B., Giridhar, K., Lalitha, V.L., Mohan, V.M. (2022). Imminent Threat with Authentication Methods for AI Data Using Blockchain Security. In: Baalamurugan, K., Kumar, S.R., Kumar, A., Kumar, V., Padmanaban, S. (eds) Blockchain Security in Cloud Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-70501-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-70501-5_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-70500-8

  • Online ISBN: 978-3-030-70501-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics