logo

Assignment | Security Using Blockchain

   

Added on  2022-10-07

14 Pages2397 Words10 Views
Running head: SECURITY USING BLOCKCHAIN
SECURITY USING BLOCKCHAIN
Name of the Student
Name of the University
Author note

SECURITY USING BLOCKCHAIN
Table of Contents
Title: 2
Introduction: 2
Rationale: 2
1. Problem Domain: 2
2. Purpose and justification: 4
Research questions: 4
Conceptual framework: 5
Methodology: 6
Project Plan 6
Deliverables 6
Work Breakdown Structure 8
Risk Analysis: 8
Duration 9
Gantt chart 9
Timeline: 10
Conclusion: 10
References: 12

SECURITY USING BLOCKCHAIN
Title:
The area or the field of the emerging technology which has been chosen to work on is
the Security using the Block-Chain technology.
Introduction:
A Block-chain can be described as the records of the lists that are growing in a
gradual manner. These records are termed and referred to as the blocks which are related
using the cryptography system. Each block contains the cryptographic graphs of the block
that is located before the certain block. The blocks also contain timestamps that includes the
data which represents the transactions. The block chain is found to be defiant to the matter of
further modifications of the data in the system(Crosby et al., 2016). The block chain
technology is also utilized in the security services and also in the IOT networks. The
objective of this report lies in surveying the approaches in the block chain that are utilized in
many security services.
The need of the block chain technology exists, as the system allows two different
parties to exchange the resources and create the communication in a peer to peer based
network. In this network the decisions that are distributed are taken by the majority except by
a single and particular authority which creates an advantage over the other system.
Rationale:
1. Problem Domain:
The navigation done in the online process in any kind of online access has been prone
to hacker attacks that have been happening over the world. The matter of the hacker attacks
on the internet has become a real concern on the usage of the online access which is mitigated
by the block chain technology and is reduced to a certain extent (Lin & Liao, 2017). The

SECURITY USING BLOCKCHAIN
block chain has been introduced for a decade approximately and it was initially used for the
purpose of storing the crypto currency generally the bitcoin. However, it has been an integral
part of the cyber security and increases the level of the cyber security and is utilized in
various kind of industry.
The Internet of Things (IoT) has appeared as a region of incredible effect, potential
and development with the emergence of intelligent homes, smart cities and intelligent
everything, and by 2020 Cisco Inc (Puthal et al., 2018) is expected to have 50.000 billion
connected phones. However, it is simple to hack and compromise most of these IoT devices.
In general, these IoT phones are computing, storing and network capabilities restricted,
making them more susceptible to assaults than other endpoints such as Smartphone, tablets or
PCs.
Therefore, distributed control and safety mechanisms are necessary in current
applications by existence. For these apps, most present practical safety solutions are
centralized and inefficient. This can be mitigated by the blockchain’s property that makes
itself distributive in nature.
One controller can create a single point of failure centralized choices.Third party
safety can impose hazards for safety and privacy if the party is affected. Both traditional
methods are subject to several difficulties. Three significant issues lie before the CA-based
PKI: a confidential third-party, a single fault and costs. Systems consumers need to trust the
CA to generate and manage government keys that impose high security hazards if the CA is
affected. The entire scheme fails if the CA fails(Biggs et al., 2018). This architecture has one
point of failure In addition; public keys management can be costly and ineffective through a
centralized CA, particularly with present large-scale apps involving a large group of users.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Trusted & Decentralized IOT Software Updates Using Blockchain | Report
|11
|2196
|19

(PDF) Blockchain: Challenges and applications
|12
|716
|90

Assignment | Project Proposal and Plan
|7
|1830
|16

Block Chain Security Article 2022
|11
|2780
|11

Utilizing Blockchain in Internet of Things
|25
|6891
|265

Emerging Technologies in Information Security: Blockchain, AI, and Crowdsourcing
|7
|1366
|408