The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems. The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies discusses how to implement and manage processes for releasing and delivering blockchain applications. It presents the core of blockchain technology, IoT-based and AI-based blockchain systems, and various manufacturing areas related to Industry 4.0. The book illustrates how to apply design principles to develop and manage blockchain networks, and also covers the role that cloud computing plays in blockchain applications. All major technologies involved in blockchain-embedded applications are included in this book, which makes it useful to engineering students, researchers, academicians, and professionals interested in the core of blockchain technology.

Author(s): Alex Khang, Subrata Chowdhury, Seema Sharma
Publisher: CRC Press
Year: 2022

Language: English
Pages: 288
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Acknowledgments
Editor Biographies
Contributors
1 Comprehensive Analysis of Fundamentals, Innovation, and Key Challenges of Blockchain
1.1 Introduction
1.2 Research Background
1.2.1 Background of Blockchain Research
1.2.2 Background of Security Vulnerability Research
1.2.3 System Vulnerabilities
1.3 Blockchain Concept
1.4 Analysis of Critical Technologies of Blockchain
1.4.1 Hash Algorithm
1.4.2 Merkle Tree
1.5 Research Gap
1.5.1 Data Storage and Interaction
1.5.1.1 Multi-Form Data Storage
1.5.2 Privacy Protection
1.5.2.1 User Privacy Protection
1.5.2.2 Enterprise Privacy Protection
1.5.3 Resource Allocation
1.5.4 Vulnerability Attack
1.5.4.1 Fork Attack
1.5.4.2 Cryptography-Based Attacks
1.5.4.3 Other Attacks
1.6 Conclusion
References
2 Cryptocurrency Methodologies and Techniques
2.1 Introduction
2.2 Literature Survey
2.3 How Does the Cryptocurrency Works
2.3.1 Working Method of Cryptocurrency
2.3.2 Cryptocurrency Examples
2.3.2.1 Bitcoin
2.3.2.2 Ethereum
2.3.2.3 Litecoin
2.3.2.4 Ripple
2.3.3 How to Buy Cryptocurrency
2.3.3.1 The First Step Is to Select a Platform
2.3.3.2 The Seconds Step Is Adding Money to Your Account
2.3.3.3 The Third Step Is Making a Purchase
2.3.4 How to Store a Cryptocurrency
2.3.5 What Can You Buy With Cryptocurrency?
2.3.5.1 Websites That Deal With Technology and E-Commerce
2.3.6 Cryptocurrency Fraud and Cryptocurrency Scams
2.3.7 Is Cryptocurrency Being Safe?
2.3.8 Four Tips to Investing in Cryptocurrency Safely
2.3.8.1 Research Collaborations
2.3.8.2 Understand How to Keep Your Digital Currency Safe
2.3.8.3 Diversify Your Portfolio
2.3.8.4 Prepare for Turbulence
2.4 Conclusion and Future Work
References
3 Framework for Modeling, Procuring, and Building Systems for Smart City Scenarios Using Blockchain Technology and IoT
3.1 Introduction
3.2 Literature Survey
3.3 Proposed Work
3.3.1 State-Of-The-Art IoT Infrastructure
3.3.2 Data Analysis for Plan of Action
3.3.3 Major Components of Smart City
3.3.3.1 Smart Education
3.3.3.2 Smart Environment
3.3.3.3 Smart Roads and Platforms
3.3.3.4 Smart Buildings
3.3.3.5 Public Service Tracking
3.3.3.6 Smart Energy
3.3.3.7 Smart Agriculture
3.3.3.8 Smart Banking
3.3.4 IoT Devices and Support to Physically Disabled Persons
3.4 Blockchain Enabled Securities
3.5 Blockchain and IoT Integration
3.6 Compendium Among IoT, IoC, and IoE
3.7 Genesis of Smart Technologies
3.8 System Implementation
3.9 Future Challenges
3.10 Conclusion and Future Scope
References
4 Development of a Framework Model Using Blockchain to Secure Cryptocurrency Investment
4.1 Introduction
4.2 Blockchain Technology
4.3 Need for Blockchain Technology in Cryptocurrency
4.4 Model to Secure Cryptocurrency Investment
4.5 Transaction Unified as Block
4.6 Block as Network
4.7 Network Approval for Transaction
4.8 End–End Encryptions
4.8.1 Decentralization
4.8.2 Trust
4.8.3 Security
4.9 Discussion
4.10 Conclusion
References
5 A Blockchain Approach to Improving Digital Linked Management Information Systems (MIS)
5.1 Introduction
5.2 Background
5.3 Information System and Blockchain Types
5.3.1 Information Systems
5.3.1.1 Information Creation
5.3.1.2 Information Processing
5.3.1.3 Information Analysis
5.3.1.4 Information Visualization
5.3.1.5 Digital Data Warehouse
5.3.2 Public, Private, and Consortium Blockchains
5.3.2.1 Public Blockchains
5.3.2.2 Private Blockchains
5.4 Digital Block Information System (DIGBI) to DLIMS 2.0
5.5 Integration of MIS and Blockchain
5.6 Query Processing and Design of Smart Contract
5.6.1 Smart Contract Algorithm Based On PINSI
5.6.1.1 Initialization
5.6.2 Algorithm PINSI 2.0 Cryptographic Part
5.6.2.1 Encryption/Decryption Process
5.7 Blockchain-Based Transaction Design Process
5.8 System Implementation
5.9 System Evaluation
5.10 Performance Test
5.11 Performance Analysis
5.12 Conclusions
References
6 A Perspective On Blockchain-Based Cryptocurrency to Boost A Futuristic Digital Economy
6.1 Introduction
6.2 Related Work
6.3 Background
6.3.1 Smart Contract
6.3.2 Decentralized Finance
6.3.3 Digital Economy
6.4 Current Market Scenario
6.5 Case Study: India
6.6 Application Areas
6.6.1 Financial Services
6.6.2 Government Sector
6.6.3 Health Sector
6.6.4 Entertainment Sector
6.6.5 Digital Identification
6.7 Challenges
6.8 Conclusion
References
7 Application of Blockchain in Online Learning: Findings in Higher Education Certification
7.1 Introduction
7.2 Problem Statement
7.3 Perspective and Challenges
7.3.1 Intervention for Stabilization of Supply and Demand
7.3.2 Facilitate
7.3.3 Assistance
7.3.4 Record
7.3.5 Trusted Certification
7.3.6 Decentralized Sharing
7.3.7 Provide Income Support
7.4 Intensified Cooperation With Competent World Organizations
7.5 Conclusion
References
8 Robot Process Automation in Blockchain
8.1 Introduction
8.2 Workflow of Blockchain
8.3 Components of Blockchain
8.4 Benefits of Using Blockchain
8.5 Challenges of Blockchain
8.6 Advancements of Blockchain
8.7 Why Need Blockchain Technology
8.8 Robotic Process Automation and Blockchain
8.9 Similarities of RPA and Blockchain Technology
8.10 Advantages of Using RPA and Blockchain Together
8.11 Opportunities and Challenges of Using RPA and Blockchain Together
8.12 Uses of RPA in Blockchain
8.12.1 Educational Sector
8.12.2 Government Sector
8.12.3 Online Platforms
8.12.4 Business/Corporate Sector
8.13 Role of RPA in Blockchain Management
8.14 Conclusion
References
9 A Novel Approach to Cryptography: Deep Learning-Based Homomorphic Secure Searchable Encryption for Keyword Searches in the Blockchain Healthcare System
9.1 Introduction
9.2 Hyperledger Composer
9.3 Related Work
9.4 System Architecture
9.5 System Implementation
9.6 Discussion
9.7 Conclusion
References
10 Design and Implementation of a Smart Healthcare System Using Blockchain Technology With A Dragonfly Optimization-Based Blowfish Encryption Algorithm
10.1 Introduction
10.2 Problem Statement
10.3 Proposed Work
10.3.1 Dataset Description
10.3.1.1 Patients Generated Data
10.3.1.2 Health and Clinical Records Data
10.3.2 Data Preprocessing Using Normalization
10.3.3 Data Validation Using Smart Contracts
10.3.4 Dragonfly Optimization Based Blowfish Encryption Algorithm
10.3.4.1 Key-Expansion
10.3.4.2 Data Encryption
10.3.4.3 F Function in Data Encryption
10.3.5 Blockchain Mechanism
10.3.5.1 Verification of Data Using Proof of Stake (PoS) Consensus Protocol
10.3.5.2 Decryption of Data and Access Granting
10.3.5.3 End Users
10.4 Performance Analysis
10.4.1 Encryption Time
10.4.2 Security Level
10.4.3 Communication Cost
10.4.4 Computation Cost
10.4.5 Time Consumption
10.5 Conclusion
References
11 Implementation of a Blockchain-Based Smart Shopping System for Automated Bill Generation Using Smart Carts With Cryptographic Algorithms
11.1 Introduction
11.2 Problem Statement
11.3 Proposed Work
11.3.1 Database On Server
11.3.2 Smart Cart
11.3.3 Data Validation Using Smart Contracts
11.3.4 Data Stored in Blockchain
11.3.4.1 Data Encryption Using Synchronous Discrete Twofish Encryption Algorithm
11.3.5 Generation of Bill
11.4 Results and Discussion
11.5 Conclusion
References
12 Multi-Node Data Privacy Audit for Blockchain Integrity
12.1 Introduction
12.2 Problem Description and Analysis
12.2.1 Problem Description
12.2.2 Probability Analysis of Cross-Shard Transactions
12.2.3 Probability of Cross-Shard Transaction Rollback
12.3 Multi-Round Consensus Processing Cross-Shard Transaction Verification Scheme
12.3.1 The Process of Processing Transactions in the Multi-Round Verification Scheme
12.3.2 Selection of the Number of Rounds of the Multi-Round Verification Scheme
12.3.2.1 Probability of Byzantine Collision Attack
12.3.2.2 Influence of Multiple Rounds On Rollback Probability
12.3.2.3 The Upper Limit of the Number of Rounds
12.3.3 Node Random Allocation Algorithm
12.4 Experimental Setup and Result Analysis
12.4.1 Experimental Environment and Parameter Settings
12.4.2 Experiment Design and Result Analysis
12.4.2.1 Transaction Verification Rate Test
12.4.2.2 Transaction Throughput Test
12.5 Conclusion
References
13 IoT, AI, and Blockchain: An Integrated System Investigation for Agriculture and Healthcare Units
13.1 Introduction
13.2 IoT in Agriculture and Healthcare
13.2.1 Agriculture
13.2.1.1 Water Management and Monitoring
13.2.1.2 Soil Monitoring and Assessment
13.2.1.3 Crop Growth Assessment
13.2.1.4 Disease Monitoring
13.2.1.5 Environmental Condition Monitoring
13.2.2 Healthcare
13.2.2.1 Data Acquisition
13.2.2.2 Data Processing
13.2.2.3 Application Phase
13.3 AI in Agriculture and Healthcare
13.3.1 Agriculture
13.3.1.1 Soil and Irrigation Management
13.3.1.2 Seed Emerging Assessment
13.3.2 Healthcare
13.3.2.1 Disease Prediction and Diagnosis
13.3.2.2 Artificial Intelligence as Life Assistance
13.4 Blockchain
13.4.1 Blockchain With AI and IoT in Agriculture
13.4.2 Blockchain With AI and IoT in Healthcare
13.5 Conclusion
References
14 Security and Privacy Challenges in Blockchain Application
14.1 Introduction
14.2 Blockchain Architecture
14.2.1 Distributed Ledger
14.2.2 Consensus Mechanism And Mining
14.2.3 Smart Contract Platform
14.3 Literature Survey
14.3.1 Blockchain for E-Government
14.3.2 Blockchain for Industry
14.3.3 Blockchain for Cryptocurrency
14.3.4 Blockchain for IoT
14.3.5 Blockchain for Healthcare
14.4 Security of Blockchain
14.4.1 Summary of Blockchain Security Policies
14.4.2 Prominent Features of Blockchain Security
14.5 Privacy of Blockchain
14.6 Security Issues of Blockchain Technology
14.6.1 The 51% Vulnerability Risk
14.6.2 Double Spending and Exploring Sybil
14.7 Conclusion
References
15 Blockchain-Based Cloud Resource Allocation Mechanisms for Privacy Preservation
15.1 Introduction
15.2 Blockchain Statement
15.3 Blockchain-Based Cloud Resource Allocations
15.3.1 Manufacturing Resource/Requirement Release
15.3.2 The Matching Process
15.3.2.1 Step 1
15.3.2.2 Step 2
15.3.2.3 Step 3
15.3.2.4 Step 4
15.4 Smart Contract Design for Cloud Manufacturing
15.4.1 Manufacturing Resource Verification Contract
15.4.2 Manufacturing Resource Trading Contract
15.4.3 The Game of Supply and Demand
15.4.4 Stackelberg Balance of Resources
15.5 Experiment and Result Analysis
15.5.1 Smart Contract Testing and Result Analysis
15.5.2 Game Simulation and Result Analysis
15.6 Conclusion
References
16 Blockchain-Based Privacy Protection Credential Model for Zero- Knowledge Proof Over Distributed Systems
16.1 Introduction
16.2 Related Work
16.3 System Model
16.3.1 System Goals
16.3.1.1 Autonomous Control
16.3.1.2 Distributed Authentication
16.3.1.3 Build Trust
16.3.1.4 Privacy Protection
16.3.1.5 Revocability
16.3.1.6 Portability
16.3.2 System Architecture
16.4 Blockchain-Based Distributed Identity Authentication System
16.4.1 Symbol Definition
16.4.1.1 DID
16.4.1.2 Subject
16.4.1.3 Claim
16.4.1.4 Verifiable Credential
16.4.1.5 Presentation
16.4.2 Algorithm Description
16.4.2.1 Digital Identity Management System
16.4.2.2 Credential Management System
16.4.3 System Application
16.5 Experimental Evaluation
16.6 Smart Contract Design
16.7 System Performance Test
16.8 Conclusion
References
Index