Implementing and Leveraging Blockchain Programming

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book gives a comprehensive overview of blockchain programming and its implementation in the wide range of blockchain-based applications such as cross-border payment, digital banking, and digital identities. The consistent thrive of the blockchain phenomenon and the ecosystem of e-business use cases have led to the Industrial Revolution in the e-business world, and it is demonstrated in this book. The digital advancement, interference, and transformation being brought through the influence of the blockchain advancements are creating waves across e-business verticals. The book caters to academics, industrial practitioners, and entrepreneurs working in the field of blockchain technology and programming.

Author(s): Bharat S. Rawal, Gunasekaran Manogaran, M. Poongodi
Series: Blockchain Technologies
Publisher: Springer
Year: 2022

Language: English
Pages: 223
City: Singapore

Contents
Introduction to Cryptography in Blockchain
1 What is Cryptography?
2 Types of Encryption and Decryption Algorithms
3 Secure Hash Algorithms
4 Cryptography in Blockchain
4.1 Secure Hash Algorithm
4.2 Public-Key Cryptography
4.3 Digital Signature
5 How to Implement Cryptography Using Java
5.1 Symmetric Encryption
5.2 Asymmetric Encryption
5.3 Key Storage
5.4 Digital Signatures
6 Blockchain Block Hashing
7 Blockchain Hashcode Using Java
8 Creation of Block and Hashes Using Java
9 Create a Blockchain
References
Quantum-Safe Cryptography and Security
1 Overview
2 Scope and Purpose
2.1 What is Cryptography?
2.2 What is Quantum Computing?
2.3 What Quantum Computing Does Well?
2.4 What Does Quantum-Safe Mean?
3 Technology Survey––What's Currently “State of the Art?”
3.1 The Pervasiveness of the RSA and ECC in Various Security Protocols
4 Quantum-Safe Cryptography Primitives
4.1 Quantum Key Distribution
4.2 Working of Quantum Key Distribution
4.3 QKD Channel Authentication
4.4 QKD Protocols and Their Implementation
4.5 QKD in the Networks
5 Code-Based Cryptosystems
6 Lattice-Based Cryptosystems
7 Hash-Based Cryptosystems
8 Multivariate Cryptosystems
9 Comparison of the Classical and the Quantum Safe
10 Security Protocols: How We Can Upgrade
10.1 X.509 Certificates
10.2 Internet Key Exchange (IKE v2)
10.3 Transport Layer Security Version 1.2/S-MIME/SSH
11 Field of Applications and the User Cases
12 Field of Application
13 Economics of Quantum-Safe Cryptography
14 Conclusion
References
How Profitable Is Bitcoin Mining?
1 Hashing, Electricity, Difficulty Calculation, and Complexity
2 Introduction
2.1 Hash Rate
2.2 51% Attack
2.3 Consensus Algorithm
2.4 Peers
2.5 Compute
2.6 Electricity Cost
2.7 Threat from Quantum Computing
3 The Solution to the Double-Spending Problem
4 Value Creation in Bitcoin
5 Validation Using “E3 Model”
5.1 Measuring the Value Streams
6 Miner Sustainability Assessment
6.1 Data Collection
6.2 Value Flows
7 What’s the Problem?
8 Conclusion
References
Generative Adversarial Network-Based Visual-Aware Interactive Fashion Design Framework
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset Collection
3.2 Augmentation
3.3 Preprocessing Techniques Used
4 Proposed Architecture
4.1 Proposed Discriminator Architecture
4.2 Proposed Generator Architecture
5 Results and Discussions
5.1 Experimental Setups
5.2 Experimental Results
6 Evaluation Metrics Results
6.1 Frechet Inception Distance
6.2 Perceptual Path Length
6.3 A Human Evaluation User Study
6.4 Human Evaluation Quality Assessments User Study
7 Conclusion and Future Work
7.1 Conclusion
7.2 Future Work
References
Plasma Chain and Blockchain Security Model
1 Introduction
1.1 Blockchain
1.2 Cryptocurrency
2 Role and Benefits of Blockchain Technology in Society
2.1 Benefits and Role of Blockchain
2.2 Ways in Which Blockchain Benefit Society
3 How Blockchain Maintain Security Model
4 Proof of Security Model in Blockchain
4.1 Blockchain Security in Telecom
4.2 Is the Blockchain Secure Even After This?
5 Blockchain Transaction Methods
5.1 Size of Blockchain for Transaction
6 Problems with Existing Public Chains
7 Plasma Network and Checking Point Layer
8 Incentivized Checkpointing
9 Block Rewards
10 Conclusion
References
Blockchain, Smart Contracts, and Decentralized Applications: An Introduction
1 Introduction
2 Blockchain and Distributed Ledgers
2.1 Public Distributed Ledgers
2.2 Private Distributed Ledgers
2.3 Consortium Distributed Ledgers
3 A Step-by-Step Guide on How Blockchain Works
4 Smart Contracts and DApps
4.1 Smart Contract
4.2 Features and Benefits of Smart Contracts
4.3 Decentralized Applications (DApps)
5 Blockchain in Different Industry Sectors
5.1 Blockchain in Banking
5.2 Blockchain in Supply Chain
5.3 Blockchain in Health Care
5.4 Blockchain in Government Sector
6 Traditional Model Versus Blockchain
References
A Contingent of Blockchain-IoT - An Organized Review
1 Introduction
2 Main Process/Operations of Blockchain
3 Operations
4 Roles of Participants
5 Aspects of BC
6 3 D’s & 2 A’s and I of BC
7 Types of Blockchain
8 In the View of Industry’s Experts
9 Blockchain Infrastructures
10 Other Infrastructures
11 Design Space of BC
12 Enabling Technologies
13 IoT
14 Functional Components of IoT
15 5 ‘A’s and 3 ‘I’ s in IoT
16 BC-IoT Implementation
17 Difference Between the Platforms of Blockchain
18 Research Categories of Blockchain
References
A Secured Data Processing Model for Monitoring the Student’s Performance Using Decentralized Application
1 Introduction
2 Literature Review
3 Related Work
4 Working Flow
5 Experimental Setup on Blockchain Technique
6 Case Study is Made on student’s Data Set in the Training Session
7 Measuring the Grey Area on Training Data and Testing Data
8 Overall Performance of Each Student on Different Skill Sets
9 Conclusion
References
An Efficient Trust-Based Supply Chain Management Framework Utilizing the Internet of Things and Blockchain Technology
1 Introduction
2 Trust Performance Metrics
3 Factors Affecting IOT Trust
4 Factors Affecting Blockchain Trust
5 Factors Affecting Supply Chain Trust
6 An Efficient Trust-Based Supply Chain Management Framework
7 A Computational Model to Evaluate Product Status and Make Decisions
8 Conclusion
References
Blockchain Technology and Machine Learning for Fake News Detection
1 Introduction
2 Fake News Detection Terminology
3 Machine Learning and Deep Learning for Fake News Detection
4 Era of Blockchain Technology for Fake News Detection
5 Blueprint of FN Detection System
6 Conclusion
References
Using Blockchain-Based Attestation Architecture for Securing IoT
1 Introduction
2 Challenges
3 Blockchain Architecture
3.1 Smart Contract [11]
3.2 Ledger [10]
3.3 Cryptography [12]
3.4 Consensus [13]
3.5 Events [10]
4 Related Works
5 The Proposed Approach of Using IoT with Blockchain
6 Business Use Cases for Blockchain IoT Security
6.1 Smart Homes
6.2 Implementation of Security Fabric for IoT
7 Conclusion
References
The Forgotten Cryptocurrencies: Beyond Bitcoin
1 Introduction
2 Bitcoin Network
2.1 Tether
2.2 Bitcoin Cash
2.3 Litecoin
3 Ethereum Network
3.1 Chainlink
4 Ripple Network
4.1 XRP
4.2 Stellar
5 EOS Network
5.1 Telos
6 Conclusion
References
Decentralized Application for the Classification of Products Based on IPFS and Blockchain
1 Introduction
2 Theoretical Background
3 Application Modules
4 Database Model
5 General System Requirements
6 Functional Model Based on Use Cases
7 Architecture
8 Component Diagram
9 Deployment Diagram
10 Results
11 Conclusion
References