网络安全和区块链综述

Silvana Qose, Beatrix Fregan
{"title":"网络安全和区块链综述","authors":"Silvana Qose, Beatrix Fregan","doi":"10.1109/SACI55618.2022.9919583","DOIUrl":null,"url":null,"abstract":"Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.","PeriodicalId":105691,"journal":{"name":"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of Cyber Security and Blockchain\",\"authors\":\"Silvana Qose, Beatrix Fregan\",\"doi\":\"10.1109/SACI55618.2022.9919583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.\",\"PeriodicalId\":105691,\"journal\":{\"name\":\"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SACI55618.2022.9919583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI55618.2022.9919583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

自2008年中本聪(Satoshi Nakamoto)的研究中引入区块链以来,区块链已成为最常被提及的为无信任者提供信息存储和传输安全的方法之一。本文基于对去中心化技术和点对点系统的文献综述,代表了对区块链用于网络安全功能中最常用的区块链安全应用程序的科学分析。研究结果表明,物联网(IoT)和网络、机器可视化和公钥密码学为区块链应用程序提供了创新,就像安全存储个人身份信息或在线应用程序和认证方案一样。这是一项基于几家科学期刊系统研究的适时研究。这将是对区块链和网络安全研究的未来前景以及人工智能数据的区块链安全的额外温和评估,包括区块链在物联网和侧链安全中的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Review of Cyber Security and Blockchain
Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信