Narayani Singh, Rahul Patekar, G. Kedia, Neha Tirpude
{"title":"一种基于分散区块链的高效用户认证方案","authors":"Narayani Singh, Rahul Patekar, G. Kedia, Neha Tirpude","doi":"10.47164/ijngc.v14i1.1021","DOIUrl":null,"url":null,"abstract":"Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"10 1","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain\",\"authors\":\"Narayani Singh, Rahul Patekar, G. Kedia, Neha Tirpude\",\"doi\":\"10.47164/ijngc.v14i1.1021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.\",\"PeriodicalId\":42021,\"journal\":{\"name\":\"International Journal of Next-Generation Computing\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2023-02-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Next-Generation Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47164/ijngc.v14i1.1021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Next-Generation Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47164/ijngc.v14i1.1021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain
Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.