Abstract
Since the announcement of Satoshi Nakamoto’s Bitcoin policy document in 2008, blockchain has become one of the most widely discussed techniques for implementing safety storage and processing through decentralized, approved, peer-to-peer networks. This study described peer-reviewed literature, which uses cryptocurrency for cybersecurity purposes and offers a comprehensive overview of the most commonly used application areas of blockchains. This main forward-looking study further illuminates the possible directions for science, education, and practice on blockchain and cyberprotection, such as IoT blockchain security, as well as the need for data analysis of blockchain safe data. Analyses of this data increase the value of the latest machine learning (ML) technologies. There is a logical quantity of data required by ML for correct decisions. Data reliability and sharing in ML are very critical for improving the accuracy of performance. The combination of these two technologies will yield extremely accurate results (ML and BT). In this paper, we present a detailed review of ML adoption to make mobile platforms based on BT more resilient against attacks. Examples of such support systems as support vector machines (SVM) and bagging and deep learning (DL) algorithms can be used to evaluate attacks on a blockchain network, including convolutional neural network (CNN) and long short-term memory (LSTM). Actually, various traditional ML techniques are available. Furthermore, we include the use of both technologies in a variety of smart applications, including UAV, Smart Grid (SG), healthcare, and smart towns and cities. Future technological issues and concerns are also debated. Finally, we discuss the study model with a thesis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 29 June 2017)
N. Bozic, P. Guy, S. Stefano, A tutorial on blockchain and applications to secure network control-planes. SCNS IEEE 2016. [CrossRef]
D. Bradbury, The problem with bitcoin. Comput Fraud Secur. 11, 5–8 (2013) [CrossRef]
G. Paul, P. Sarkar, S. Mukherjee, Towards a more democratic mining in bitcoins. In Proceedings of the International Conference on Information Systems Security, Hyderabad, India, 16–20 December 2014; Springer International Publishing: Cham, Switzerland, 2014
T. Bamert, C. Decker, R. Wattenhofer, S. Welten, BlueWallet: the secure BitcoinWallet, in Security and Trust Management, ed. by S. Mauw, C. Jensen, (Springer International Publishing, Cham, Switzerland, 2014), pp. 65–80
E. Anceaume, T. Lajoie-Mazenc, R. Ludinard, B. Sericola. Safety analysis of Bitcoin improvement proposals. In Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 31 October–2 November 2016
R. Upadhyaya, A. Jain, Cyber ethics and cybercrime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 29–30 April 2016
S. Haber, W.S. Stornetta, How to time-stamp a digital document. In Proceedings of the Conference on the Theory and Application of Cryptography, Sydney, NSW, Australia, 8–11 January 1990; Springer: Berlin/Heidelberg, Germany, 1990
I. Eyal, G.S. Emin, Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg, Germany, 2014
K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic Mapping Studies in Software Engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy, 26–27 June 2008
C. Mann, D. Loebenberger, Two-factor authentication for the Bitcoin protocol. In International Workshop on Security and Trust Management; Springer International Publishing: Cham, Switzerland, 2015
Y. Yuan, F.-Y. Wang, Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016
E.K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, B. Ford, École Polytechnique Fédérale de Lausanne (EPFL). Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016
M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg, Germany, 2014
M. Bastiaan, Preventing the 51%-attack: A stochastic analysis of two phase proof of work in bitcoin. Available online. http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf (accessed on 29 June 2017
M.H.U. Rehman, E. Ahmed, I. Yaqoob, I.A.T. Hashem, M. Imran, S. Ahmad, Big data analytics in industrial IoT using a concentric computing model. IEEE Commun. Mag. 56(2), 37–43 (2018)
P.K. Sharma, J.H. Ryu, K.Y. Park, J.H. Park, J.H. Park, Li-Fi based on security cloud framework for future IT environment. HCIS 8(1), 1–13 (2018)
W. Yu, F. Liang, X. He, W.G. Hatcher, C. Lu, J. Lin, X. Yang, A survey on the edge computing for the internet of things. IEEE Access 6, 6900–6919 (2018)
M. Chiang, S. Ha, C.-L.I.F. Risso, T. Zhang, Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55(4), 18–20 (2017)
O. Novo, Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)
K. Kalkan, S. Zeadally, Securing internet of things with software defined networking. IEEE Commun. Mag. 56(9), 186–192 (2018)
B.B. Zarpelão, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)
I. Butun, B. Kantarci, M. Erol-Kantarci, Anomaly detection and privacy preservation in cloud-centric internet of things. In Proc. IEEE International Conference on Communication Workshop (ICCW), Jun 2015, pp. 2610-2615
S.R. Kumar, N. Gayathri, Trust based data transmission mechanism in manet using solsr. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore., S. R., & Gayathri, N. (2016, December). Trust based data transmission mechanism in MANET using sOLSR. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore
S.R. Kumar, N. Gayathri, B. Balusamy, Enhancing network lifetime through power-aware routing in MANET. Int. J. Internet Technol. Secur. Trans. 9(1–2), 96–111 (2019)
HIMSS Blockchain Work Group. (2017, Oct. 23). Part 1: Navigating the blockchain landscape—Opportunities in digital health. [Online]. Available: http://www.himss.org/news/part-1-navigatingblockchain-landscape-opportunities-digital-health
D. Houlding, H. Flannery. (2018, Feb. 1). Part 2: Healthcare blockchain—A path to success in 2018. [Online]. Available: http://www.himss.org/news/part-2-healthcare-blockchain-path-success-2018
R. Rahim, R. Patan, R. Manikandan, S.R. Kumar, Introduction to blockchain and big data, in Blockchain, Big Data and Machine Learning, (CRC Press, 2020), pp. 1–23
HIMSS 2018 conference session. (2018, Mar. 6). Blockchain reset: Seeing through the hype and starting down the path. [Online]. Available: http://www.himssconference.org/session/blockchainreset-seeing-through-hype-and-starting-down-path
R. Chandran, S.R. Kumar, N. Gayathri, Designing a locating scams for mobile transaction with the aid of operational activity analysis in cloud. Wirel. Pers. Commun., 117, 1–14 (2020)
The Linux Foundation. (2017). About Hyperledger. [Online]. Available: https://www.hyperledger.org/about Ethereum Foundation. (2018). Ethereum: Blockchain app platform. [Online]. Available: https://www.ethereum.org/
A. Azaria, A. Ekblaw, T. Vieira, A. Lippman. (2016, Aug. 22–24). MedRec: using blockchain for medical data access and permission management, presented at the Int. Conf. Open and Big Data, Vienna, Austria. [Online]. Available: http://ieeexplore.ieee.org/document/7573685/
A.K. Show, A. Kumar, A. Singhal, N. Gayathri, K. Vengatesan, Future blockchain technology for autonomous applications/autonomous vehicle, in Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles, (IGI Global), United States of America pp. 165–177
N. Kumar, N. Gayathri, M. A. Rahman, B. Balamurugan (eds.), Blockchain, Big Data and Machine Learning: Trends and Applications, United States of America (CRC Press, 2020)
C. McFarlane, M. Beer, J. Brown, N. Prendergast. (2017, May). Patientory: a healthcare peer-to-peer EMR storage network v1.1. [Online]. Available: https://patientory.com/patientory_whitepaper.pd.
S.K. Sharma, R.K. Modanval, N. Gayathri, S.R. Kumar, C. Ramesh, Impact of application of big data on cryptocurrency. Cryptocurrencies and Blockchain Technology Applications, Scrivener Publishing LLC, Beverly, Massachusetts. 181–195 (2020)
A. Pandey, A. Kumar, A. Singha, N. Gayathri, S.R. Kumar, 4 Blockchain Databases 2. Blockchain, Big Data and Machine Learning: Trends and Applications, 97 (2020)
R. Chandran, S.R. Kumar, N. Gayathri, Genetic algorithm-based tabu search for optimal energy-aware allocation of data center resources. Soft. Comput. 24(21), 16705–16718 (2020). https://doi.org/10.1007/s00500-020-05240-9
L. Dong, W. Jinwu, Block chain technology principle, application field and challenge [J]. Telecomm. Sci. 32(12), 19–25 (2016)
Y. Yong, W. Feiyue, Development status and Prospect of block chain technology [J]. Acta Automat. Sin. 42(4), 481–494 (2016)
G. Nagasubramanian, R.K. Sakthivel, R. Patan, A.H. Gandomi, M. Sankayya, B. Balusamy, Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Comput. & Applic. 32(3), 639–647 (2020)
C. Gao, T. Liang, L.I. Huixing, et al., Development and Application of open automated demand response [J]. Power Syst. Technol. 93(3), 12–12 (2013)
R.K. Sakthivel, G. Nagasubramanian, F. Al-Turjman, M. Sankayya, Core-level cybersecurity assurance using cloud-based adaptive machine learning techniques for manufacturing industry. Trans. Emerg. Telecommun. Technol., e3947 (2020)
W. Beibei, S. Yujun, L. Yang, Application of uncertain demand response modeling in power integral incentive decision [J]. Automat. Electr. Power Syst. 2015(10). R.M. Parizi, On the gamification of human-centric traceability tasks in software testing and coding. In: 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), Towson, MD, 2016, pp. 193–200
A. Back, et al., Enabling blockchain innovations with pegged sidechains [Online]. Available: http://www.blockstream.com/sidechains.pdf, 2014
P. Robinson, Requirements for Ethereum Private Sidechains, arXiv Prepr. arXiv1806.09834, 2018
Q. Zhang, R.M. Parizi, K.K.R. Choo, A pentagon of considerations towards more secure Blockchains. IEEE Blockchain Tech. Briefs. pp. 1–30 (2018)
Bitcoin-abe, https://github.com/bitcoin-abe/bitcoin-abe
T.T.A. Dinh, J. Wang, G. Chen, R. Liu, B.C. Ooi, K.-L. Tan, BLOCKBENCH: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM International Conference on Management of Data, 2017, p. 10851100
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sonthi, V.K., Nagarajan, S., Murali Krishna M, M.V.B., Giridhar, K., Lalitha, V.L., Mohan, V.M. (2022). Imminent Threat with Authentication Methods for AI Data Using Blockchain Security. In: Baalamurugan, K., Kumar, S.R., Kumar, A., Kumar, V., Padmanaban, S. (eds) Blockchain Security in Cloud Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-70501-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-70501-5_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70500-8
Online ISBN: 978-3-030-70501-5
eBook Packages: EngineeringEngineering (R0)