{"title":"区块链数据安全调查:优点、缺点和应用","authors":"Manisha Nehe, S. Jain","doi":"10.1109/ICRAECC43874.2019.8995064","DOIUrl":null,"url":null,"abstract":"Network security is consequential prospect while working over the internet, LAN or other networks. Data security must be high precedence when it comes to network setup. Data security assures that shared data is kept secure. In the network, data security is crucial against attackers and hackers. The data security is all about first to secure the information from pirated access and the second one is to protect from thwart hackers. The objective of network security is to keep the network running and safe for all legitimate users. The target of this paper is to present the merits and demerits of blockchain over data security in different sectors. The blockchain technology is used in various applications to store exchanges of values via transactions. All transactions made by nodes are signed digitally with the preceding transaction hash and the public key of the destination node; this scheme guarantees that transactions are tamper-proof. A block containing transactions will be approved by specific blockchain nodes. In block-chain technology, each page in a ledger of transactions forms a block. That block affects the next block or page through cryptographic hashing. In other words, when a block is finally completed, it creates a special secure code, that links to the next page or block, creating a chain of blocks, or block-chain. Data security can be accomplished using the block-chain concept. The hash tables of raw data files are stored on the blockchain, and other copies are validated by a hashing technique. Thus any interference with the data will be instantly found because the initial hash tables are stored on thousands of nodes.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Survey on Data Security using Blockchain: Merits, Demerits and Applications\",\"authors\":\"Manisha Nehe, S. Jain\",\"doi\":\"10.1109/ICRAECC43874.2019.8995064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network security is consequential prospect while working over the internet, LAN or other networks. Data security must be high precedence when it comes to network setup. Data security assures that shared data is kept secure. In the network, data security is crucial against attackers and hackers. The data security is all about first to secure the information from pirated access and the second one is to protect from thwart hackers. The objective of network security is to keep the network running and safe for all legitimate users. The target of this paper is to present the merits and demerits of blockchain over data security in different sectors. The blockchain technology is used in various applications to store exchanges of values via transactions. All transactions made by nodes are signed digitally with the preceding transaction hash and the public key of the destination node; this scheme guarantees that transactions are tamper-proof. A block containing transactions will be approved by specific blockchain nodes. In block-chain technology, each page in a ledger of transactions forms a block. That block affects the next block or page through cryptographic hashing. In other words, when a block is finally completed, it creates a special secure code, that links to the next page or block, creating a chain of blocks, or block-chain. Data security can be accomplished using the block-chain concept. The hash tables of raw data files are stored on the blockchain, and other copies are validated by a hashing technique. Thus any interference with the data will be instantly found because the initial hash tables are stored on thousands of nodes.\",\"PeriodicalId\":137313,\"journal\":{\"name\":\"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)\",\"volume\":\"225 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRAECC43874.2019.8995064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAECC43874.2019.8995064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Data Security using Blockchain: Merits, Demerits and Applications
Network security is consequential prospect while working over the internet, LAN or other networks. Data security must be high precedence when it comes to network setup. Data security assures that shared data is kept secure. In the network, data security is crucial against attackers and hackers. The data security is all about first to secure the information from pirated access and the second one is to protect from thwart hackers. The objective of network security is to keep the network running and safe for all legitimate users. The target of this paper is to present the merits and demerits of blockchain over data security in different sectors. The blockchain technology is used in various applications to store exchanges of values via transactions. All transactions made by nodes are signed digitally with the preceding transaction hash and the public key of the destination node; this scheme guarantees that transactions are tamper-proof. A block containing transactions will be approved by specific blockchain nodes. In block-chain technology, each page in a ledger of transactions forms a block. That block affects the next block or page through cryptographic hashing. In other words, when a block is finally completed, it creates a special secure code, that links to the next page or block, creating a chain of blocks, or block-chain. Data security can be accomplished using the block-chain concept. The hash tables of raw data files are stored on the blockchain, and other copies are validated by a hashing technique. Thus any interference with the data will be instantly found because the initial hash tables are stored on thousands of nodes.