Abstract
How to protect data against illegal access and modification has been a long desire by those who wishes to share confidential ideas. With the modern time highly secure cryptographic techniques as well as intrusion detection systems emerged to solve such issues. Because of centralization many of the time it has been recorded that intrusion within the system occurred and people bears huge loss of financial and confidential data. In this paper, it is presented how blockchain technology challenges the approach of centralization and developing trust among users within a peer to peer network. Author presents how this technology is working on a mechanism through which they may distribute control and decision power among the entities within the blockchain network. In this paper, it has also been presented that data hacking for hackers may not be impossible but it will surely not be effortless to do.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
French, S., Leyshon, A., Thrift, N.: A very geographical crisis: the making and breaking of the 2007–2008 financial crisis. C. J. Regi. Eco. Soci. 2(2), 287–302 (2009)
Haber, S., Stornetta W.S.: How to time-stmap a digital document. J. Crypt. 437–455 (1990)
Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf Accessed 4 Jan 2022
Salah, K., Nizamuddin, N., Jayaraman, R., Omar, M.: Blockchain-based soybean traceability in agricultural supply chain. IEEE Access 73295–73305 (2019)
Akhtar, M.M., Rizvi, D.R.: Traceability and detection of counterfeit medicines in pharmaceutical supply chain using blockchain-based architectures. In: Ahad, M.A., Paiva, S., Zafar, S. (eds.) Sustainable and Energy Efficient Computing Paradigms for Society. EICC, pp. 1–31. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-51070-1_1
World Economic Forum survey report of September 2015: Deep shift – technology tipping points and societal ımpact. https://www.weforum.org/reports/deep-shift-technology-tipping-points-and-societal-impact Accessed 4 Jan 2022
Lashkari, B., Musilek, P.: A Comprehensive review of blockcahin consensus mechanism. IEEE Access 9, 43620–43652 (2021)
Unix Time: https://en.wikipedia.org/wiki/Unix_timeBlock Number Accessed 6 Jan 2022
MD5 Hash generator: https://passwordsgenerator.net/md5-hash-generator/. Accessed 6 Jan 2022
Hao, J., Sun, Y., Luo, H.: A safe and efficient storage scheme based on blockchain and IPFS for agricultural products tracking. J. Com. 29(6), 158–167 (2018)
Szabo, N.: Smart contracts: building blocks for digital markets. J. Tra. Thou. 16, 18.2, 28 (1996)
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.-Y.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Sys. M. Cyb: Sys. 49(11), 2266–2277 (2019)
Arumugan, S.S., Umashankar, V., Narendra, C.N.: IoT enabled smart logistics using smart contracts. Int. Con. L.I.S.S. 2018. LISS, pp. 1–6. IEEE (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gaur, A.K., Valan, J.A. (2022). Impact of Security in Blockchain Based Real Time Applications. In: Das, A.K., Nayak, J., Naik, B., Vimal, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. CIPR 2022. Lecture Notes in Networks and Systems, vol 480. Springer, Singapore. https://doi.org/10.1007/978-981-19-3089-8_19
Download citation
DOI: https://doi.org/10.1007/978-981-19-3089-8_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3088-1
Online ISBN: 978-981-19-3089-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)