Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan
{"title":"b区块链技术中基于身份验证和加密的安全服务","authors":"Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974500","DOIUrl":null,"url":null,"abstract":"Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"Authentication & Encryption Based Security Services in Blockchain Technology\",\"authors\":\"Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan\",\"doi\":\"10.1109/ICCCIS48478.2019.8974500\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.\",\"PeriodicalId\":436154,\"journal\":{\"name\":\"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCIS48478.2019.8974500\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS48478.2019.8974500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication & Encryption Based Security Services in Blockchain Technology
Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.