This book concentrates on the sustainable applications of the Blockchain Technology across multiple latest computational knowledge domains. It covers the feasible and practical collaboration of Blockchain Technology with latest Sustainable Smart Computing Technologies. It will target the vast applications of Blockchain in the field of Internet of Things, Artificial Intelligence, and Cybersecurity. The book effectively provides satisfactory information about the essentials of Blockchain and IoT to a typical pursuer alongside encouraging an examination researcher to distinguish some modern issue regions that rise up out of the intermingling of the two advancements. Besides, the creators talk about pertinent application zones, for example, smart city, e-social insurance, and so forth along the course of the book.
• Covers the recent advancements in Blockchain technology
• Discusses the applications of Blockchain technology for real life problems
• Address the challenges related to implementation of Blockchain technology
• Includes case studies
• Includes the latest trends and area of research in Blockchain Technology
This book is primarily aimed at graduates, researchers and professions working in the field of blockchain technology.
Author(s): Keshav Kaushik, Shubham Tayal, Susheela, Dahiya Ayodeji, Olalekan Salau
Publisher: CRC Press
Year: 2022
Language: English
Pages: 190
City: Boca Raton
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
1. Blockchain Platforms, Architectures, and Consensus Algorithm
1.1 Introduction
1.2 Blockchain Architecture
1.2.1 Ledger in Blockchain
1.2.2 Distributed System
1.2.3 Blockchain as a Distributed System
1.2.4 Distributed Ledger Technology
1.2.5 Cryptography
1.2.5.1 Cryptography Terminologies
1.2.5.2 Types of Cryptography
1.3 Types of Blockchain/Blockchain Network Types
1.4 Existing Blockchain Platforms
1.4.1 Key Terminologies
1.4.1.1 A Protocol
1.4.1.2 A Token
1.5 Consensus Mechanism
References
2. Current Research Trends and Application of Blockchain in Healthcare and Medical Systems
2.1 Introduction
2.2 Background Concepts on Blockchain Technology
2.2.1 Consensus Algorithms
2.2.2.1 Proof-Based Consensus Algorithms
2.2.2.2 Voting-Based Consensus Algorithms
2.2.2 Types of Blockchain
2.2.3 Smart Contracts
2.2.4 Characteristics of Blockchain
2.3 Applications of Blockchain in Healthcare
2.3.1 Electronic Health Records
2.3.2 Clinical Research
2.3.3 Medical Fraud Detection
2.3.4 Pharmacy Research
2.3.5 Telemedicine
2.3.6 Neuroscience
2.4 Blockchain-Based Supply Chain Management
2.4.1 Related Work
2.4.2 Proposed Framework
2.5 Research Challenges
2.5.1 Integration and Compatibility with Older Systems
2.5.2 Uncertain Cost of Operation
2.5.3 Scaling
2.5.4 Governance
2.5.5 Adoption and Incentives for Participation
2.6 Conclusion
References
3. Challenges and Benefits of Combining AI with Blockchain for
Sustainable Environment
3.1 Introduction
3.2 AI and Blockchain Technologies: Overview
3.3 Pollution Prevention and Renewable Energy for Sustainable Environment
3.3.1 Pollution Prevention for Sustainable Environment
3.3.2 Renewable Energy for Sustainable Environment
3.4 Benefits of Combining AI with Blockchain for Environmental
Sustainability
3.4.1 Energy Cost Reduction
3.4.2 Security of Stored Environmental Data and Information for Valid Decisions and Policies
3.4.3 Global Cooperation in the Fight against Climate Change
3.4.4 Rapid Response to Environmental Emergency and Prevention of Environmental Hazards
3.4.5 Less Energy Intermediaries
3.4.6 Energy Digitization
3.4.7 Serve as Tool for Air Pollution Monitoring for Cleaner Environment
3.4.8 Pollution Reduction
3.4.9 Enhances Accountability and Transparency in the Delivery of Humanitarian Relief Packages
3.4.10 Reduction of Carbon Footprint
3.4.11 Increased Energy Security
3.4.12 Decision and Energy Traceability
3.5 Challenges of Combining AI with Blockchain
3.5.1 Data Security
3.5.2 Issue of Standardization, Regulation and Governance
3.5.3 Quality of Data
3.5.4 Lack of Professional Expertise
3.5.5 Privacy
3.5.6 Scalability and Side Chains
3.5.7 Inaccessibility to Digital Infrastructure
3.6 Conclusion and Recommendation
3.6.1 Conclusion
3.6.2 Recommendations
References
4. Chain of Transactions: How Blockchain Is Changing the Landscape of FinTech
4.1 Introduction
4.2 Literature Survey
4.3 FinTech
4.3.1 The Main Differences between FinTech and Traditional Finance
4.4 Blockchain
4.4.1 History of Blockchain
4.4.2 How Does Blockchain Work
4.4.3 Features of Blockchain
4.5 Applications of Blockchain in FinTech
4.5.1 Cryptocurrency
4.5.2 Banking
4.5.3 Data Registration and Identification
4.5.4 Payments
4.5.5 Trade Finance
4.5.6 Insurance
4.5.7 Financial Inclusion
4.5.8 Investments
4.5.9 Credit and Alternative Lending
4.5.10 Tokenization
4.6 Successful Cases of Blockchain in FinTech
4.6.1 HSBC
4.6.2 U.A.E. Blockchain Strategies
4.6.3 Ripple
4.7 Issues with Blockchain
4.8 Conclusion
References
5. Blockchain for E-Governance and Tracing Fake News on
Social Media
5.1 Blockchain for E-Governance
5.1.1 Security and Privacy Concerns in e-Governance
5.2 Blockchain for Tracing Viral or Fake News on Social Media
5.3 Conclusion
References
6. Integration of Blockchain Technology and Intelligent System for Potential Technologies
6.1 Introduction
6.1.1 Normalisation Blockchain
6.2 Characteristics of Blockchain
6.2.1 Co-location
6.2.2 Trust and Integrity
6.2.3 Ownership
6.2.4 Non-Mutability
6.2.5 Every Brick Stores the Entire History
6.2.6 Codability
6.2.6.1 Information Transfer and Discovery
6.2.6.2 Computer Organisation
6.2.6.3 Classification Algorithm Overview
6.2.6.4 Uses of Cryptocurrency Forms for AI
6.3 Conclusion
References
7. Adapting Blockchain for Energy Constrained IoT in
Healthcare Environment
7.1 Introduction
7.2 Literature Review
7.3 Proposed Work
7.3.1 Generating Hash Code
7.4 Analysis and Simulation
7.4.1 Energy Consumption
7.5 Conclusion
References
8. Security and Privacy Issues in IoT Systems Using Blockchain
8.1 Introduction
8.2 Use of Blockchain in IoT
8.3 Security and Privacy Issues
8.3.1 Security Issues
8.3.1.1 Authentication
8.3.1.2 Network Security
8.3.1.3 Access Control
8.3.2 Privacy Issues
8.3.2.1 Data Privacy
8.3.2.2 Usage Privacy
8.3.2.3 Location Privacy
8.4 Blockchain for Securing IoT Systems
8.4.1 IoT eHealth
8.4.2 Smart Cities and Smart Home
8.4.3 IoT Vehicular Network
8.4.4 Software-Defined Networks
8.4.5 Wireless Sensor Networks
8.4.6 Supply Chain and IoT
8.5 Challenges in Adopting Blockchain for IoT System
8.6 Conclusion
References
9. Applications of Blockchain Technology in Cyber
Attacks Prevention
9.1 Introduction
9.2 Literature Review
9.2.1 Blockchain Evolution
9.2.2 Blockchain Platform
9.2.3 Blockchain Architecture
9.2.3.1 Blockchain Architecture That Are Public
9.2.3.2 Blockchain Architecture That Are Private
9.2.3.3 Blockchain Architecture That Are Consortium
9.2.4 Blockchain Consensus
9.3 Cyber Attack Prevention on Blockchain Systems
9.3.1 Digital Identity
9.3.2 Decentralized Identifier (DID) Using Cryptography for
Data Security
9.3.3 Phishing Attack
9.3.3.1 Types of Phishing
9.3.4 Mitigating Phishing Attack
9.3.4.1 Existing Phishing Solutions and Their Vulnerabilities
9.3.5 Blockchain Immutability for Phishing Attack Prevention
9.3.6 Data Security and Data Integrity Attack Prevention
Using Hash Function
9.3.6.1 Data Security and Integrity
9.3.6.2 Hashing Algorithms
9.3.7 Properties of a Good Hashing Algorithm
9.3.7.1 Avalanche Effect
9.3.7.2 Unidirectional Process/Pre-Image Resistance
9.3.7.3 Complexity/Collision Resistance
9.3.8 Benefits of Hash Function
9.3.8.1 Quality of File Comparison
9.3.8.2 Verifying the Integrity of File
9.3.9 Application of Hash Function
9.3.9.1 Password Storage
9.3.9.2 Data Integrity
9.3.9.3 Proof of Work in Blockchain
9.3.9.4 Digital Signature System
9.4 Digital Signature
9.4.1 Applications of Digital Signature
9.4.1.1 Key Agreement Protocol
9.4.1.2 Contract Signing Protocol
9.4.1.3 Fault Tolerance
9.4.1.4 Web-Based Assessment System
9.4.1.5 Identity-Based
9.4.2 Application of Blockchain on Digital Signature
9.4.3 Blockchain Immutability for Phishing Attack Prevention
9.5 Best Practices for Mitigating Injection Attack Using Blockchain
9.5.1 Innovative Use of Blockchain Technology for Data Security
9.5.1.1 Cyber Security
9.5.1.2 Finance
9.5.1.3 Government
9.5.1.4 Internet of Things (IoT)
9.5.1.5 Cloud Storage and Provenance
9.5.1.6 Smart Contracts
9.5.1.7 Healthcare
9.5.2 Blockchain Impact
9.6 Conclusion
References
10. A Lightweight Digital Voting Platform Using
Blockchain Technology
10.1 Introduction
10.2 Related Work
10.3 Data Resources
10.4 Methodology
10.5 Results and Discussion
10.6 Conclusion
Acknowledgments
References
Index