{"title":"网络安全和区块链综述","authors":"Silvana Qose, Beatrix Fregan","doi":"10.1109/SACI55618.2022.9919583","DOIUrl":null,"url":null,"abstract":"Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.","PeriodicalId":105691,"journal":{"name":"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of Cyber Security and Blockchain\",\"authors\":\"Silvana Qose, Beatrix Fregan\",\"doi\":\"10.1109/SACI55618.2022.9919583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.\",\"PeriodicalId\":105691,\"journal\":{\"name\":\"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SACI55618.2022.9919583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI55618.2022.9919583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Since the introduction of the Blockchain in Satoshi Nakamoto's study in 2008, Blockchain has become one of the foremost often mentioned ways to secure information storage and transfers for the trustless. This article is based on a literature review of decentralized technology and peer-to-peer systems that represents a scientific analysis of the most frequently adopted blockchain security applications in the usage of the Blockchain for cyber security functions. The findings indicate that the Internet of Things (IoT) and networks, machine visualization, and public-key cryptography hands themselves innovative to blockchain applications, just like safe storage of Personally Identifiable Information or online applications and certification schemes. This is a well-timed study based on systematic studies from several scientific journals. It will be an additional mild assessment of future prospects in Blockchain and cyber security research and blockchain security for AI data, including the safety of Blockchain in IoT and sidechain safety.