Shweta Pandey, A. Gehlot, A. Dixit, Rajat Balyan, Rajesh Singh, Samta Kathuria
{"title":"Innovation Intervention: Cyber Stalking","authors":"Shweta Pandey, A. Gehlot, A. Dixit, Rajat Balyan, Rajesh Singh, Samta Kathuria","doi":"10.1109/IC3I56241.2022.10072899","DOIUrl":null,"url":null,"abstract":"Today, there is a growing acceptance of the Internet of Things (IoT). In addition, for Technology devices to better serve the expanding need for network devices or the services provided, a few major obstacles still require special attention. This new technology has enormous promise in the most varied technical fields and may considerably aid in realizing the IoT technologies vision in several ways, including by boosting the capacity for decentralization, simplifying interaction, enabling transaction models, or promoting autonomous device coordination. In order to help the issues related to cyberstalking technology plays important role like blockchain, big data. The objective of this article is to explain the fundamentals of big data & blockchain technology, as well as how they may be utilized to protect stalkers security and safety. Then, introduce the stalker, as selfish miner variation whose goal is to stop a node from publishing any blocks mostly on main chain.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072899","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Today, there is a growing acceptance of the Internet of Things (IoT). In addition, for Technology devices to better serve the expanding need for network devices or the services provided, a few major obstacles still require special attention. This new technology has enormous promise in the most varied technical fields and may considerably aid in realizing the IoT technologies vision in several ways, including by boosting the capacity for decentralization, simplifying interaction, enabling transaction models, or promoting autonomous device coordination. In order to help the issues related to cyberstalking technology plays important role like blockchain, big data. The objective of this article is to explain the fundamentals of big data & blockchain technology, as well as how they may be utilized to protect stalkers security and safety. Then, introduce the stalker, as selfish miner variation whose goal is to stop a node from publishing any blocks mostly on main chain.