Analysis of Blockchain Cyber Security: A Literature Review
VerifiedAdded on 2025/05/01
|13
|446
|168
AI Summary
Desklib provides past papers and solved assignments for students. This report explores blockchain's role in AI.

Journal name: - A Systematic literature
review of Block chain cyber security
Author names: Paul J.Taylor, Tooska Dargahi, Ali
Dehghantanha, Reza M.Parizi and Kim-Kwang Raymond
Choo.
Student name
Student id
review of Block chain cyber security
Author names: Paul J.Taylor, Tooska Dargahi, Ali
Dehghantanha, Reza M.Parizi and Kim-Kwang Raymond
Choo.
Student name
Student id
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Block-chain Technology
• Block-chain is the technique where it stores or structures the
information in the form of a chain [1] of blocks .
• Every block stores information in the set of transaction performed at a
particular time.
Source: [3]
• Block-chain is the technique where it stores or structures the
information in the form of a chain [1] of blocks .
• Every block stores information in the set of transaction performed at a
particular time.
Source: [3]

Challenges in Block-chain technology
Block-chain is simple technology but its execution has the number [2]
of challenges .
• Security
• Anonymity and data privacy
• Scalability and storage capacity
Block-chain is simple technology but its execution has the number [2]
of challenges .
• Security
• Anonymity and data privacy
• Scalability and storage capacity
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Solutions for challenges
• Litecoin
• GHOST
• Zerocoin [3] and Zerocash
• Mixcoin
• Dark Wallet
• Hawk
• Quorum
• Hyperledger
• Off-chain technology
Source:[2]
• Litecoin
• GHOST
• Zerocoin [3] and Zerocash
• Mixcoin
• Dark Wallet
• Hawk
• Quorum
• Hyperledger
• Off-chain technology
Source:[2]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Applications
Source:[3]
Source:[3]

Block-chain in cyber security
• Block chain in IOT
• Block chain in AI [4] data Security
• Side-chain security
• Block chain in dataset sharing
• Block chain in data storage and sharing
• Block chain in IOT
• Block chain in AI [4] data Security
• Side-chain security
• Block chain in dataset sharing
• Block chain in data storage and sharing
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Block-chain in IOT
• It build trust
• Helps in reducing [5] cost
and time
• Accelerate transaction and
remove complexity
Source:[4]
• It build trust
• Helps in reducing [5] cost
and time
• Accelerate transaction and
remove complexity
Source:[4]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Block-chain in AI
• Integration of encryption and AI work very [1] efficiently.
• It helps to understand the decision made by Artificial intelligence.
Source:[7]
• Integration of encryption and AI work very [1] efficiently.
• It helps to understand the decision made by Artificial intelligence.
Source:[7]

Block chain in data storage and sharing
• Hash algorithm helps in maintaining [6] data securely.
• Client-side encryption and localizing the network makes data
storage secure.
• Hash algorithm helps in maintaining [6] data securely.
• Client-side encryption and localizing the network makes data
storage secure.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Side chain Block-chain
Side chain occur in parallel with the [1] transaction of main
block-chain.
Source:[8]
Side chain occur in parallel with the [1] transaction of main
block-chain.
Source:[8]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Latest trend in Block-Chain
Self healing and RIM Firmware and Meta data
Source:[2]
Self healing and RIM Firmware and Meta data
Source:[2]

Reference
• [1] P. J.Taylor, T. Dargahi, A. Dehghantanha, R. M.Parizi and K.K R. Choo, “A
Systematic literature review of Block chain cyber security,” Digital Communication
and Networks (2019), doi: https://doi.org/10.1016/j.dcan.2019.01.005.
• [2] M.Banerjee, J.Lee,and K.K. R.Choo, “A blockchain future for internet of things
security: a position paper,” Digital Communication and Networks, vol.4, no.3, pp. 149-
160, Aug 2018.doi: https://doi.org/10.1016/j.dcan.2017.10.006.
• [3] F.Casino, T. K.Dasaklis and C.Patsakis“A systematic literature review of
blockchain-based applications: Current status, classification and open issues,”
Telematic and Informatics, vol.36, pp. 55-81, Mar, 2019.doi:
https://doi.org/10.1016/j.tele.2018.11.006.
• [4] A.Reyna, C.Martín, J.Chen,E.Solerand M.Díaz“On blockchain and its integration
with IoT. Challenges and opportunities,” Future Generation Computer Systems,
vol.88, pp.173-190, Nov, 2018.doi: https://doi.org/10.1016/j.future.2018.05.046.
• [5] S.Huckle, R.Bhattacharya, M.White and NataliaBeloff, “Internet of Things,
Blockchain and Shared Economy Applications,” Procedia Computer Science, vol.98,
pp.461-466, 2016.doi: https://doi.org/10.1016/j.procs.2016.09.074.
• [6] N.M.Kumar and P. K.Mallick, “Blockchain technology for security issues and
challenges in IoT,” International Conference on Computational Intelligence and Data
Science, vol.132, pp.1815-1823, 2018.doi: https://doi.org/10.1016/j.procs.2018.05.140.
• [1] P. J.Taylor, T. Dargahi, A. Dehghantanha, R. M.Parizi and K.K R. Choo, “A
Systematic literature review of Block chain cyber security,” Digital Communication
and Networks (2019), doi: https://doi.org/10.1016/j.dcan.2019.01.005.
• [2] M.Banerjee, J.Lee,and K.K. R.Choo, “A blockchain future for internet of things
security: a position paper,” Digital Communication and Networks, vol.4, no.3, pp. 149-
160, Aug 2018.doi: https://doi.org/10.1016/j.dcan.2017.10.006.
• [3] F.Casino, T. K.Dasaklis and C.Patsakis“A systematic literature review of
blockchain-based applications: Current status, classification and open issues,”
Telematic and Informatics, vol.36, pp. 55-81, Mar, 2019.doi:
https://doi.org/10.1016/j.tele.2018.11.006.
• [4] A.Reyna, C.Martín, J.Chen,E.Solerand M.Díaz“On blockchain and its integration
with IoT. Challenges and opportunities,” Future Generation Computer Systems,
vol.88, pp.173-190, Nov, 2018.doi: https://doi.org/10.1016/j.future.2018.05.046.
• [5] S.Huckle, R.Bhattacharya, M.White and NataliaBeloff, “Internet of Things,
Blockchain and Shared Economy Applications,” Procedia Computer Science, vol.98,
pp.461-466, 2016.doi: https://doi.org/10.1016/j.procs.2016.09.074.
• [6] N.M.Kumar and P. K.Mallick, “Blockchain technology for security issues and
challenges in IoT,” International Conference on Computational Intelligence and Data
Science, vol.132, pp.1815-1823, 2018.doi: https://doi.org/10.1016/j.procs.2018.05.140.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.