Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan
{"title":"Authentication & Encryption Based Security Services in Blockchain Technology","authors":"Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974500","DOIUrl":null,"url":null,"abstract":"Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS48478.2019.8974500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21
Abstract
Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.