International Conference on Contemporary Computing

Verified

Added on  2022/09/18

|13
|2851
|23
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: Block chain technology
Security using block chain technology
Name of Student
Name of the University
Author note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1BLOCK CHAIN TECHNOLOGY
Article 1
CITATION Block chain technology: applications in health care.
SUMMARY The block chain technology is gaining immense attention in recent years
with the hiked interest in different fields, involving the healthcare industry.
This technology offers one secure as well as distributed database, which can
managed and operated without any administrator or the central authority.
Block chain utilizes a peer-to-peer and distributed network for making a
growing continuous list of all the ordered records, which identified as the
blocks in order to form one digital ledger. In every transaction that are
presented in the signed block in a cryptographic manner, is identified and
validated by the network itself automatically (Angraal, Krumholz & Schulz,
2017). Apart from that, the block chain technology have also gathered
immense interest as one efficient platform for improving the transparency as
well as authenticity of the sensitive and confidential healthcare data by
many use cases, which includes maintenance of the permission in the
electronic health records (EHR) and streamlining claims processing. In the
particular article the author majorly focused on the basics of the block chain
technology. The impact along with the recent and future applications of the
technology in a healthcare perspective has also illustrated.
CRITIQUE The critical analysis and the diagrammatic explanation provided by the
author has made the article an authentic one.
Document Page
2BLOCK CHAIN TECHNOLOGY
Article 2
CITATION Block chain technology: Beyond bitcoin.
SUMMARY A block chain is identified as the distributed database of several records and digital
events which has shared as well as executed between all the participating parties.
Every transaction that occur in public ledger gets verified through the consensus of
all participants in system. In addition to that, the article explains that, block chain
contains verifiable record of all the transactions. Bitcoin, is identified as the peer-
to-peer decentralized digital currency and the most common example which uses
the block chain technology (Crosby et al., 2016). The important hypothesis is,
block chain establishes one system for designing the distributed consensus in
digital world. Block chain is beneficial for developing a scalable and democratic
digital economy that differs from the centralized one. In this article, the author has
explained block chain technology and its use in financial and non-financial sectors.
CRITIQUE The author has described the business opportunities as well as the challenges of
technology and the authentic resources used here provide a strong support to the
article.
Article 3
CITATION Block chain: A panacea for healthcare cloud-based data security and
privacy.
SUMMARY One emerging trend noticed in the healthcare is the shift of service as well
as data to the cloud approach, mainly due to the convenience and the
savings. However, there exist limitations in using this specific cryptographic
control models for addressing the privacy and security concerns in the
Document Page
3BLOCK CHAIN TECHNOLOGY
cloud-based environment. The block chain technology can build a
distributed online database comprising with the data structures, which is
also identified as blocks, are linked with one another. Each block is
associated with timestamp of the production along with the hash associated
to the previous block and a transaction data, which is responsible for a
secure environment for the healthcare data.
CRITIQUE As opined by Esposito et al. (2018), the cloud based approach along with
the block chain facilities can efficiently manage and secure the health care
data.
Article 4
CITATION Managing IoT devices using block chain platform.
SUMMARY The block chain technology has unfolded as a revolutionary technology in
the current technological age. Though this technology was started off as the
core technology of the Bitcoin, currently its advantages has spread to
several fields including the Internet of Things (IoT) and security. As the
hardware and software improve, beginning of IoT is well-noticed. In order
to perform several operations, the IoT devices need to synchronize and
communicate with each other. However, in several cases where more than
thousands of IoT devices need to connect with each other, it might lead to
several potential challenges (Huh, Cho & Kim, 2017). The author has
described the usefulness of block chain in building the complex IoT system.
Block chain can be used to configure and control the IoT devices. The

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4BLOCK CHAIN TECHNOLOGY
author has chosen Ethereum as the block chain platform as its using its
smart contract feature is beneficial in writing the Turing-complete code for
running on top of the Ethereum.
CRITIQUE Thus, it will become easy to manage and operate the configuration of the
IoT devices and building core management system.
Article 5
CITATION The truth about block chain.
SUMMARY This article explains the parallel among the block chain and the TCP/IP for
ensuring the security of the systems. The immense success of the TCP/IP
protocols has harkened the age of Internet because of providing low-cost
connectivity to the users. Similarly to that, as a fresh layer of the Internet,
block chain can become beneficial in tracking and managing the large
networks of devices without any kind of centralized controller (Iansiti &
Lakhani, 2017). Block chain technology creates a cooperative and
distributed cloud storage environment on a peer-to-peer network to offer
comparatively higher speeds and resiliency at a lower cost. Similarly, the
TCP/IP also minimize the cost related to the connections for providing
secure connection to its users.
CRITIQUE The critical analysis of the parallel relationship of block chain and TCP/IP for the
purpose of security is well explained by the author.
Document Page
5BLOCK CHAIN TECHNOLOGY
Article 6
CITATION A survey on the security of block chain systems.
SUMMARY According to this article, block chain cannot get hacked itself. Security of
the block chain technology differs from the hacks, such as those carried out
on the crypto currency exchange (Li et al., 2017). Despite of the fact that
block chain technology are decentralized, still there exist centralized aspects
of the same, for example the crypto currency exchanges. This explains that
the hackers may attack one single point with the hope of getting access. In
such case, the hacks gives rise to call for a decentralized exchange.
Moreover, block chain creates a set of digital blocks where the records are
made secure by the use of cryptography.
CRITIQUE The author has explained about the difficulty of hacking the security of block
chain.
Article 7
CITATION A Survey of Block chain Security Issues and Challenges.
SUMMARY Block chain technologies are not only a single technique, rather, it contains
mathematics, cryptography, economic model, and algorithm combining a
list of peer-to-peer networks and utilizing the distributed consensus
algorithms in order to solve the synchronize problem related to the
traditional distributed database. According to Lin & Liao (2017), there exist
Document Page
6BLOCK CHAIN TECHNOLOGY
different type of block chain, which are, public, private and consortium
block chain with different type of structure like main data, hash, timestamp
and others. In addition, the article explains several security issues such as,
fork problem, time conformation, integrated cost, majority attack and others.
CRITIQUE The author has proposed a critically analyzed paper with appropriate
references, which make the article a justified one.
Article 8
CITATION Block chain.
SUMMARY This article describes the block chain as one effective disruptive technology
and the distributed ledgers that are helpful in carrying out several projects of
different industries (Nofer et al., 2017). Crypto-currencies, insurance,
settlement are the typical financial applications of the block chain; whereas,
the decentralized IoT, internet applications, decentralized storage and many
others are the nonfinancial applications of the block chain. In addition, the
block chain might disrupt the whole process of transaction by executing the
contracts automatically in one cost-effective as well as secure manner.
CRITIQUE The author has purposed future aspects of the block chain, however the
article evidences a lack of critical analysis of the topic.
Article 9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7BLOCK CHAIN TECHNOLOGY
CITATION Block chain security in cloud computing: Use cases, challenges, and
solutions.
SUMMARY According to Park & Park, (2017) block chain gives security by the
authentication of two or more peers which share an encryption, generation
of the hash value as well as virtual cash. Moreover, this technology can be
used beyond the Internet of Things (IoT) environment. In recent days, cloud
computing is gaining wide acceptance in every IT environments for its
availability and efficiency. Use of block chain can give strong security as
compared to the data storage in the central database. Furthermore, since this
particular technology is associated with one openness attribute, it is efficient
in providing transparency in data when applied to the area that requires the
disclosure of data. If combined with cloud approaches, block chain can
handover more secure services.
CRITIQUE Several technical measures like proof of stack and work can be implemented
for improving the security of the block chain are analyzed by the author.
Article 10
CITATION Securing smart cities using block chain technology.
SUMMARY In order to manage and integrate the social, physical as well as the business
infrastructures, the smart cities depend majorly on the information
technology system and these systems gives improved services to the
dwellers and ensures the efficient utilization of all the existing resources.
Document Page
8BLOCK CHAIN TECHNOLOGY
With several proliferation of emerging technologies like cloud computing,
IoT and many others, smart cities are delivering innovative solutions
However, despite having numerous benefits, the digital disruption holds
many potential challenges related to the security of the information. Block
chain technology can become beneficial to trigger these potential
challenges. The vital advantage of utilizing this technology is that, the
particular technology is resilient against several type of threats. Moreover, it
provides a series of features for example, enhanced fault tolerant capacity,
improved reliability and faster operation
CRITIQUE The author has analyzed about the integration of efficient block chain
technology with different devices in the smart city might create a platform
in which several devices will become efficient to communicate securely.
Article 11
CITATION Block chain technology in the chemical industry: Machine-to-machine
electricity market.
SUMMARY Innovation in chemical industry is vital than before as several new
competitors as well as technologies are encountering the market and the
product cycle are rigorously reduced towards improved commoditization of
the services and products. The utilization of block chain in the chemical
company might enhance their capability to innovate and make interesting
solutions for the customers. In addition, the block chain facilitates close
collaboration in one close or open community via sharing data and
Document Page
9BLOCK CHAIN TECHNOLOGY
information securely with the stakeholders on the real time. This technology
handovers one efficient agile commerce platform in which the future
generation chemical organizations can compete (Sikorski, Haughton &
Kraft, 2017). Moreover, the new ecosystems can fit into the consortium of
the block chain model, giving a platform for secure, traceable, efficient,
resource trading.
CRITIQUE The author has used appropriate source and critically analyzed the paper by
making it an appropriate one.
Article 12
CITATION Block chain: Future of financial and cyber security.
SUMMARY Innovative utilization of the block chain technology is emerging as a part of
different fields other than crypto-currencies and it will definitely useful in
boosting the cyber security. Implementation of different data distribution
protocols and rigorous encryption in network, the business industries can
keep their information safe from the hackers. Moreover, implementing this
technology can fully decentralize the domain name servers (DNS), by
distributing the associated contents to a wide number of nodes and turning it
almost impossible for the attackers to perform any type of attack. However,
the domain editing rights can be provided to the domain owners and no
other users can perform any change to it. Hence, it decreases the risk of
information being hacked and changed by any unauthorized users. Use of

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10BLOCK CHAIN TECHNOLOGY
this technology for protecting the data, one particular system may ensure
that it is nearly invulnerable to the hackers, until each node become
simultaneously wiped.
CRITIQUE According to the author any kind of financial operations having less
transparency with low traceability, become vulnerable to the disruption by
the block chain application.
Abstract
The technology of block chain refers to public accessible, transparent ledger which helps
is transfer of values through encryption key along with security. The aim is to explore the area of
emerging technology of Block chain. Twelve articles have been taken and analyzed on the
emerging technology of block chain. Several application of block chain is explained in various
industries.
Block chain has high security, several devices uses block chain technology in smart cities, health
care, chemical industry etc. All the aspects of block chin is explored above starting from its
origin, opportunities, challenges, application etc. The integration of cloud approach with block
chain makes the data more secure, and the devices using block chain have positive effect in the
smart cities. Therefore, it can be concluded that block chain have several application in various
industries along with its challenges.
Document Page
11BLOCK CHAIN TECHNOLOGY
Reference
Angraal, S., Krumholz, H. M., & Schulz, W. L. (2017). Blockchain technology: applications in
health care. Circulation: Cardiovascular quality and outcomes, 10(9), e003800.
Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using
blockchain technology. In 2016 IEEE 18th international conference on high performance
computing and communications; IEEE 14th international conference on smart city; IEEE
2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp.
1392-1393). IEEE.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology:
Beyond bitcoin. Applied Innovation, 2(6-10), 71.
Esposito, C., De Santis, A., Tortora, G., Chang, H., & Choo, K. K. R. (2018). Blockchain: A
panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing,
5(1), 31-37.
Huh, S., Cho, S., & Kim, S. (2017, February). Managing IoT devices using blockchain platform.
In 2017 19th international conference on advanced communication technology (ICACT)
(pp. 464-467). IEEE.
Iansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review,
95(1), 118-127.
Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain
systems. Future Generation Computer Systems.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Document Page
12BLOCK CHAIN TECHNOLOGY
Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information
Systems Engineering, 59(3), 183-187.
Park, J., & Park, J. (2017). Blockchain security in cloud computing: Use cases, challenges, and
solutions. Symmetry, 9(8), 164.
Sikorski, J. J., Haughton, J., & Kraft, M. (2017). Blockchain technology in the chemical
industry: Machine-to-machine electricity market. Applied Energy, 195, 234-246.
Singh, S., & Singh, N. (2016, December). Blockchain: Future of financial and cyber security. In
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)
(pp. 463-467). IEEE.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]