Enviar búsqueda
Cargar
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
•
0 recomendaciones
•
14 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V9/i8/IRJET-V9I8228.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 5
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
IJCNCJournal
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
IJCNCJournal
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
final.pdf
final.pdf
ishantpatil1
Blockchain technology in Agriculture: Applications, Impact and future
Blockchain technology in Agriculture: Applications, Impact and future
IRJET Journal
Recomendados
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
IJCNCJournal
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
IJCNCJournal
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
final.pdf
final.pdf
ishantpatil1
Blockchain technology in Agriculture: Applications, Impact and future
Blockchain technology in Agriculture: Applications, Impact and future
IRJET Journal
A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technology
TELKOMNIKA JOURNAL
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
IRJET Journal
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET Journal
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
IJECEIAES
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
IRJET Journal
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Más contenido relacionado
Similar a A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technology
TELKOMNIKA JOURNAL
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
IRJET Journal
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET Journal
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
IJECEIAES
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
IRJET Journal
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
Similar a A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
(20)
A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technology
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge and security...
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Online banking management system project.pdf
Online banking management system project.pdf
Kamal Acharya
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
RagavanV2
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Último
(20)
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Online banking management system project.pdf
Online banking management system project.pdf
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1376 A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY Aditya Routh1, Koushik Pal2, Subhomoy Das3, Jishnu Nath Paul4 Department of Electronics& Communication Engineering, Guru Nanak Institute of Technology, Kolkata, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Since Satoshi Nakamoto published white Paper on Bitcoin in 2008, blockchain has (slowly)became one of the foremost mentioned strategies for securing data storage and transfer through decentralized, trust-less, peer-to-peer systems. This analysis identifies peer- reviewed literature that seeks to utilize Blockchain for cyber security functions and presents a scientific analysis of the foremost often adopted blockchain security applications. In this proposed work, we are introducing blockchain technology in cybersecurity where IOT security, availability and decentralized storage of data and many more applications will be add on into the system. Thus the Intelligence Agencies and Cybersecurity Cell does not face any issues or drawbacks while operating, although cybersecurity is itself a very secure but after introducing blockchain in it, it will be impossible to seize. Keywords – Blockchain in cybersecurity, roles, uses cases, methodology, making of more secure system. I. INTRODUCTION India is home to a population that is unmoving in numerous socio-economic backgrounds. As per the living standards of individuals, a large vary of devices area unit in use - from high-end secured electronic devices to inexpensive mobile phones. This makes it troublesome for authorities to line uniform legal and technical standards to control data-protection. Additionally, digital attainment and awareness among the population is very low. Cyber-Security refers to the act of protective and making certain the protection of laptop systems and electronic devices from targeted cyber-attacks, opportunist malware (- viruses, trojans and bugs) or accidental introduction of malware by users. So, the main motto of this project is to ensure more secure system which is unbeatable and overcome the drawbacks which was faced earlier. This proposed application of blockchain in cybersecurity will work as decentralized system i.e. it every user will get to know activities and with the help of it, it will notify whenever any outsider tries to invade it and if somehow if invasion is successful it will be impossible to change aur retrieve the data as each block in blockchain requires a security key if anyone to tamper it, it will automatically become invalid. II. OBJECTIVE Cybersecurity protects both raw and meaningful data, but only on internet-based threats. Organisations implement information security for a wide range of reasons. The main objectives are typically related to ensuring confidentiality, integrity, availability of company information. The main objective of this proposed work is to enhance cybersecurity by using blockchain technology. As we all know cybersecurity is itself a very secured network, but at some instances it is not so efficient as any organisations or anyone can tamper the data if equipped with the knowledge. As result the data will be in a threat, but by introducing blockchain in it we overcome this issue. The goal of blockchain is to permit digital information, to be recorded and distributed, however not altered. During this manner, a blockchain is that the foundation of immutable ledgers, or records of transactions that can’t be altered, deleted or destroyed. Here we minimize the chance to a bigger extent. We also can’t ignore the point that it is decentralized service i.e. nobody should apprehend or trust anyone else. Every user within the network features a copy of actual same data within the variety of distributed ledger. If the user’s ledger is altered or corrupted in any manner, it’ll be rejected by the bulk of the users within the network. In particular every block within the chain needs a security key, if anybody tried to counter that, the information can become invalid for the trespasser and can’t operate any more. So, this method ensures most security of the information and prevents any variety of malpractice. This can facilitate the security agencies that’s serves for the nation. III. METHODOLGY AND BLOCK DIAGRAM This research will be qualitative analysis to evaluate the applicability of Blockchain technology in today’s cybersecurity industry. The paper will focus on two aspects of all the highlighted papers, to begin with will
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1377 look at the latest implementations of the evolving Blockchain technology in cybersecurity. Second, it’ll check out the strategies available for deploying Blockchain cybersecurity solutions. The main takeaways from the research findings will be used to form a discussion on how Blockchain can afford security in today’s IT user environments. Fig1.Blockdiagram of blockchain IV. GENERAL DESCRIPTION Use cases of blockchain in cybersecurity: Decentralized storage of crucial data: The blockchain-based decentralized storage system splits users’ files into varied tiny chunks of information, mentioned as “blocks”. It then encrypts every block with Availability: In recent times, cyberattacks trying to impact technology services availableness square on the surge with DDoS (Distributed Denial-of-Service) being the foremost common types of attacks. However, in blockchain-based systems, DDoS attacks square measure expensive as the assaulter makes an attempt to overpower the network with an excellent variety of tiny transactions. Blockchains haven’t any single purpose of failure that decreases the possibilities of IP- based DDoS attacks disrupting the traditional operation. Information remains accessible through numerous nodes and so full copies of the ledger are often accessed the least bit times. The mixture of multiple nodes and distributed operation makes the platforms and systems resilient. IoT security: As far much IoT thinks about, Blockchain technology stands out due to its ability to unravel measurability, reliability and privacy problems. It allows coordination between devices, furthermore as chase of immeasurable connected devices and process transactions. This is a decentralized approach in which cryptographic algorithms square measure enforced so client information get pleasure from bigger privacy. It’s associate degree approach that eradicates faults and offers a resilient scheme. With the increasing application of AI and IoT, the protection of information and systems from hackers has forever been a serious concern. Usage of Blockchain for improved security by victimization device-to-device encryption to secure communication, key management techniques, and authentication is a potential use case to keep up cybersecurity within the IoT system. Likewise, all information gets distributed and hold on at decentralized locations. If interlopers decide to hack into these locations, they hit encrypted blocks of information. What’s more, they will only be able to obtain a chunk of information, not the entire file. This, in sum, is however blockchain-based decentralized storage systems ensure data security. a unique hash or with public-private keys and distributes the blocks across multiple computers or “nodes”. This method of distributing information across the network of node is called ‘sharding’.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1378 Fig2.Blockchian in cybersecurity Cybersecurity Threats and Incidents on Blockchain Network: Around 65 real world cybersecurity incidents have occurred round the globe amid2011 and 2019. The incidents have adversely affected the Blockchain system. We calculate the impact based on price of the cost coins at the time the attacks were discovered. However, these reports were discovered. However, these reports may differ a little from reality since the lack real life circumstances. We broadly divide the incidents as – hacks, scams and smart contract flow. The highest lose relates to hacking followed by scams and the contract flows. Figure-1, shows that the number of incidents reduced as the price of BTC fell. But as soon as the price soared up, so did the number of attacks. Fig-3. Blockchain incidents 2011-2019.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1379 Fig-4.. Top 10 most affected blockchain incidents. V. WORKFLOW OF THE SYSTEM For better understanding of the working of this proposed system, we can divide the whole procedure in two parts- firstly, the working of blockchain technology and secondly, how the cybersecurity system works. So, in the first section we are going to discuss about the process of the blockchain technology. Blockchain is system of recording information in a way that makes it difficult or impossible to change, hack or cheat the system. A blockchain is basically a digital ledger of transactions that’s duplicated and distributed across the complete network of computer systems on the blockchain. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every user’s ledger. The decentralized information managed by multiple users is known as Distributed Ledger Technology. Now, within the second part we are going to discuss regarding the cybersecurity and the way it works. It’s sub-categorized in 3 points- analysis, implementation and support. Analysis- It includes an intensive analysis of infrastructure, necessities and effective cyber threat scenario. Solid reasons for and against solutions. Joint realization of proof of construct, trial and take a look at surroundings Implementation- Licensing support, consulting and deployments with the expertise from thousands of difficult IT security projects. Know how across industries and company sizes and a high level of routine. Support- Troubleshooting, support and 24/7 instant facilitate with qualified contact persons. Certified power concerning product moreover as data concerning individual- environments. Enhancements, reviews and potential analyses. VI. LITERATURE SURVEY In the paper 1: Cybersecurity through Blockchain technology: A Review. In October 2019, this paper was published by Alex. R. Mathew. It was published in International Journal of Engineering and Advanced Technology (IJEAT). This paper looked at several use cases of Blockchain in the cybersecurity industry as envisioned by 30 researchers. It found that most researchers are concentrating on the adoption of Blockchain to protect IoT (Internet of Things) devices, networks, and data. In the paper 2: Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications: A Review. In July 2020, this paper was published by Malehe Yassine, Mamoun Alajab, Imed Romdhani. It was published in The Internal Audit and IT Audit. This paper
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1380 This book focuses on the applications of blockchain in cybersecurity, privacy, and digital forensics, for different industry sectors such as Internet of Things and health- care. In the paper 3: A systematic literature review of blockchain cyber security, in June 2020, this paper was published by Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo. This research has identified available recent research on how blockchain solutions can contribute to cyber security problems. The initial keyword searches for this research and current media reports highlight blockchain as a standalone technology that brings with it an exorbitant array of possible solutions for finance, logistics, health, cyber security. This research has focused solely on cyber security. Undoubtedly, there are worthy applications for blockchain; however, a decentralized, trustless system cannot by itself solve all problems one may uncover in the field of cyber security. looked at Blockchain has moved beyond hype to real- world implementation in a broad range of industries (eg, finance, supply chain management, and Internet of Things) and applications (eg, cybersecurity and digital forensics), partly evidenced by its evolution over the last decade or so. VII. CONCLUSION AND FUTURE SCOPE Blockchain technology continues to evolve and notice additional use cases within the modern times. One in every of the viable areas where it’s been studied and applied is cybersecurity. The Blockchain infrastructure makes it extremely sensible in addressing the present security challenges in areas like as IoT devices, and information in transmission and storage. Alongside this, alternative major area units as of Blockchain security are networks and information. As ascertained within the discussion, the Blockchain technology is be want to secure IoT devices through additional reliable authentication and information transfer mechanisms. This will forestall hackers from breaching into these devices which frequently ship with poor security configurations. In future, for obvious reasons, Blockchain technology’s scope lies within the field of Cybersecurity. Though the Blockchain ledger is open and distributed, the information is secured and verified. The encryption is finished through cryptography to eliminate vulnerabilities like as unauthorized information tampering bolstered the existing efforts to enhance security and to deter malicious actors. VIII. REFERENCES 1. Swan, Melanie. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.", 2015. 2. Crosby, Michael, et al. "Blockchain technology: Beyond bitcoin." Applied Innovation 2.6-10 (2016): pp. 71. 3. Iansiti, Marco, and Karim R. Lakhani. "The truth about blockchain." Harvard Business Review 95.1 (2017): pp. 118-127. 4. Cachin C. Architecture of the hyperledger blockchain fabric. InWorkshop on distributed cryptocurrencies and consensus ledgers 2016, 310(1), pp. 4. 5. Coindesk: Bitcoin venture capital funding, www.coindesk.com/bitcoin-venture-capital, 17 July 2019. 6. CoinMarketCap: Cryptocurrency market capitalizations—Coinmarketcap, https://coinmarketcap.com/, 17 July 2019. 7. Chowdhury, M.J.M., Colman, A., Kabir, M.A., Han, J., Sarda, P.: Blockchain as a notarization service for data sharing with personal data store. In: Trust- Com/BigDataSE 2018, IEEE (2018) 1330–1335. 8. V. Buterin, A Next-Generation Smart Contract and Decentralized Application Platform, Etherum, 2014 [Online]. 9. T. Salman, M. Zolanvari, A. Erbad, R. Jain, M. Samaka, Security services using blockchains: a state of the art survey, in: IEEE Communications Surveys & Tutorials, 2018. 10. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, 2008.
Descargar ahora