This book gives a comprehensive overview of blockchain programming and its implementation in the wide range of blockchain-based applications such as cross-border payment, digital banking, and digital identities. The consistent thrive of the blockchain phenomenon and the ecosystem of e-business use cases have led to the Industrial Revolution in the e-business world, and it is demonstrated in this book. The digital advancement, interference, and transformation being brought through the influence of the blockchain advancements are creating waves across e-business verticals. The book caters to academics, industrial practitioners, and entrepreneurs working in the field of blockchain technology and programming.
Author(s): Bharat S. Rawal, Gunasekaran Manogaran, M. Poongodi
Series: Blockchain Technologies
Publisher: Springer
Year: 2022
Language: English
Pages: 223
City: Singapore
Contents
Introduction to Cryptography in Blockchain
1 What is Cryptography?
2 Types of Encryption and Decryption Algorithms
3 Secure Hash Algorithms
4 Cryptography in Blockchain
4.1 Secure Hash Algorithm
4.2 Public-Key Cryptography
4.3 Digital Signature
5 How to Implement Cryptography Using Java
5.1 Symmetric Encryption
5.2 Asymmetric Encryption
5.3 Key Storage
5.4 Digital Signatures
6 Blockchain Block Hashing
7 Blockchain Hashcode Using Java
8 Creation of Block and Hashes Using Java
9 Create a Blockchain
References
Quantum-Safe Cryptography and Security
1 Overview
2 Scope and Purpose
2.1 What is Cryptography?
2.2 What is Quantum Computing?
2.3 What Quantum Computing Does Well?
2.4 What Does Quantum-Safe Mean?
3 Technology Survey––What's Currently “State of the Art?”
3.1 The Pervasiveness of the RSA and ECC in Various Security Protocols
4 Quantum-Safe Cryptography Primitives
4.1 Quantum Key Distribution
4.2 Working of Quantum Key Distribution
4.3 QKD Channel Authentication
4.4 QKD Protocols and Their Implementation
4.5 QKD in the Networks
5 Code-Based Cryptosystems
6 Lattice-Based Cryptosystems
7 Hash-Based Cryptosystems
8 Multivariate Cryptosystems
9 Comparison of the Classical and the Quantum Safe
10 Security Protocols: How We Can Upgrade
10.1 X.509 Certificates
10.2 Internet Key Exchange (IKE v2)
10.3 Transport Layer Security Version 1.2/S-MIME/SSH
11 Field of Applications and the User Cases
12 Field of Application
13 Economics of Quantum-Safe Cryptography
14 Conclusion
References
How Profitable Is Bitcoin Mining?
1 Hashing, Electricity, Difficulty Calculation, and Complexity
2 Introduction
2.1 Hash Rate
2.2 51% Attack
2.3 Consensus Algorithm
2.4 Peers
2.5 Compute
2.6 Electricity Cost
2.7 Threat from Quantum Computing
3 The Solution to the Double-Spending Problem
4 Value Creation in Bitcoin
5 Validation Using “E3 Model”
5.1 Measuring the Value Streams
6 Miner Sustainability Assessment
6.1 Data Collection
6.2 Value Flows
7 What’s the Problem?
8 Conclusion
References
Generative Adversarial Network-Based Visual-Aware Interactive Fashion Design Framework
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset Collection
3.2 Augmentation
3.3 Preprocessing Techniques Used
4 Proposed Architecture
4.1 Proposed Discriminator Architecture
4.2 Proposed Generator Architecture
5 Results and Discussions
5.1 Experimental Setups
5.2 Experimental Results
6 Evaluation Metrics Results
6.1 Frechet Inception Distance
6.2 Perceptual Path Length
6.3 A Human Evaluation User Study
6.4 Human Evaluation Quality Assessments User Study
7 Conclusion and Future Work
7.1 Conclusion
7.2 Future Work
References
Plasma Chain and Blockchain Security Model
1 Introduction
1.1 Blockchain
1.2 Cryptocurrency
2 Role and Benefits of Blockchain Technology in Society
2.1 Benefits and Role of Blockchain
2.2 Ways in Which Blockchain Benefit Society
3 How Blockchain Maintain Security Model
4 Proof of Security Model in Blockchain
4.1 Blockchain Security in Telecom
4.2 Is the Blockchain Secure Even After This?
5 Blockchain Transaction Methods
5.1 Size of Blockchain for Transaction
6 Problems with Existing Public Chains
7 Plasma Network and Checking Point Layer
8 Incentivized Checkpointing
9 Block Rewards
10 Conclusion
References
Blockchain, Smart Contracts, and Decentralized Applications: An Introduction
1 Introduction
2 Blockchain and Distributed Ledgers
2.1 Public Distributed Ledgers
2.2 Private Distributed Ledgers
2.3 Consortium Distributed Ledgers
3 A Step-by-Step Guide on How Blockchain Works
4 Smart Contracts and DApps
4.1 Smart Contract
4.2 Features and Benefits of Smart Contracts
4.3 Decentralized Applications (DApps)
5 Blockchain in Different Industry Sectors
5.1 Blockchain in Banking
5.2 Blockchain in Supply Chain
5.3 Blockchain in Health Care
5.4 Blockchain in Government Sector
6 Traditional Model Versus Blockchain
References
A Contingent of Blockchain-IoT - An Organized Review
1 Introduction
2 Main Process/Operations of Blockchain
3 Operations
4 Roles of Participants
5 Aspects of BC
6 3 D’s & 2 A’s and I of BC
7 Types of Blockchain
8 In the View of Industry’s Experts
9 Blockchain Infrastructures
10 Other Infrastructures
11 Design Space of BC
12 Enabling Technologies
13 IoT
14 Functional Components of IoT
15 5 ‘A’s and 3 ‘I’ s in IoT
16 BC-IoT Implementation
17 Difference Between the Platforms of Blockchain
18 Research Categories of Blockchain
References
A Secured Data Processing Model for Monitoring the Student’s Performance Using Decentralized Application
1 Introduction
2 Literature Review
3 Related Work
4 Working Flow
5 Experimental Setup on Blockchain Technique
6 Case Study is Made on student’s Data Set in the Training Session
7 Measuring the Grey Area on Training Data and Testing Data
8 Overall Performance of Each Student on Different Skill Sets
9 Conclusion
References
An Efficient Trust-Based Supply Chain Management Framework Utilizing the Internet of Things and Blockchain Technology
1 Introduction
2 Trust Performance Metrics
3 Factors Affecting IOT Trust
4 Factors Affecting Blockchain Trust
5 Factors Affecting Supply Chain Trust
6 An Efficient Trust-Based Supply Chain Management Framework
7 A Computational Model to Evaluate Product Status and Make Decisions
8 Conclusion
References
Blockchain Technology and Machine Learning for Fake News Detection
1 Introduction
2 Fake News Detection Terminology
3 Machine Learning and Deep Learning for Fake News Detection
4 Era of Blockchain Technology for Fake News Detection
5 Blueprint of FN Detection System
6 Conclusion
References
Using Blockchain-Based Attestation Architecture for Securing IoT
1 Introduction
2 Challenges
3 Blockchain Architecture
3.1 Smart Contract [11]
3.2 Ledger [10]
3.3 Cryptography [12]
3.4 Consensus [13]
3.5 Events [10]
4 Related Works
5 The Proposed Approach of Using IoT with Blockchain
6 Business Use Cases for Blockchain IoT Security
6.1 Smart Homes
6.2 Implementation of Security Fabric for IoT
7 Conclusion
References
The Forgotten Cryptocurrencies: Beyond Bitcoin
1 Introduction
2 Bitcoin Network
2.1 Tether
2.2 Bitcoin Cash
2.3 Litecoin
3 Ethereum Network
3.1 Chainlink
4 Ripple Network
4.1 XRP
4.2 Stellar
5 EOS Network
5.1 Telos
6 Conclusion
References
Decentralized Application for the Classification of Products Based on IPFS and Blockchain
1 Introduction
2 Theoretical Background
3 Application Modules
4 Database Model
5 General System Requirements
6 Functional Model Based on Use Cases
7 Architecture
8 Component Diagram
9 Deployment Diagram
10 Results
11 Conclusion
References