S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash
{"title":"b区块链基于Aadhaar","authors":"S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash","doi":"10.1109/ICCCT2.2019.8824892","DOIUrl":null,"url":null,"abstract":"Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Blockchain Based Aadhaar\",\"authors\":\"S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash\",\"doi\":\"10.1109/ICCCT2.2019.8824892\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.\",\"PeriodicalId\":445544,\"journal\":{\"name\":\"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT2.2019.8824892\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2019.8824892","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.