Improving Security of Blockchain Through Authorisation
Vivek Sharma1 , Nagendra Kumar2
Section:Research Paper, Product Type: Journal Paper
Volume-07 ,
Issue-10 , Page no. 111-114, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.111114
Online published on May 05, 2019
Copyright © Vivek Sharma, Nagendra Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vivek Sharma, Nagendra Kumar, “Improving Security of Blockchain Through Authorisation,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.111-114, 2019.
MLA Style Citation: Vivek Sharma, Nagendra Kumar "Improving Security of Blockchain Through Authorisation." International Journal of Computer Sciences and Engineering 07.10 (2019): 111-114.
APA Style Citation: Vivek Sharma, Nagendra Kumar, (2019). Improving Security of Blockchain Through Authorisation. International Journal of Computer Sciences and Engineering, 07(10), 111-114.
BibTex Style Citation:
@article{Sharma_2019,
author = {Vivek Sharma, Nagendra Kumar},
title = {Improving Security of Blockchain Through Authorisation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {10},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {111-114},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=985},
doi = {https://doi.org/10.26438/ijcse/v7i10.111114}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.111114}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=985
TI - Improving Security of Blockchain Through Authorisation
T2 - International Journal of Computer Sciences and Engineering
AU - Vivek Sharma, Nagendra Kumar
PY - 2019
DA - 2019/05/05
PB - IJCSE, Indore, INDIA
SP - 111-114
IS - 10
VL - 07
SN - 2347-2693
ER -
Abstract
Blockchain is the chain of blocks and each block consists a time stamp, transaction data and a cryptographic hash of previous block. It is a decentralized distributed network in which each peer node connected with each other and shares history of all the transactions. Each new block added to blockchain whenever a transaction occur need to be verified by all the peer node and transaction executed successfully if more that 50% allows. There are some vulnerabilities which are present in Blockchain because of its publicly open network and lack of security certification. We tried to modify the Blockchain with the use of smart contracts with the existing blockchain network and using X.509 Certification for specifying the permission allotted to each peer node at the time it is added to the network.
Key-Words / Index Term
Blockchain,Block,Node,X.509Certificate,Cryptographic,Hash,Vulnerabilities
References
[1]DMITRY EFANOV, PAVEL ROSCHIN, ALL-PERVASIVENESS OF THE BLOCKCHAIN TECHNOLOGY, PROCEDIA COMPUTER SCIENCE ,VOLUME 123, 2018, PAGES 116-121
[2] ZIGA TURK, ROBERT KLINC, POTENTIALS OF BLOCKCHAIN TECHNOLOGY FOR CONSTRUCTION MANAGEMENT,PROCEDIAENGINEERING,VOLUME 196, 2017, PAGES 638-645
[3]LichengWang,XiaoyingShen,JingLi,JunShao,YixianYangCryptographic primitives in blockchains,Journal of Network and computerApplicationsVolume127, 2019, Pages 43-58
[4] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
[5] Philip A. Bernstein, Eric Newcomer, in Principles of Transaction Processing (Second Edition), 2009
[6] L. M. BACH ; B. MIHALJEVIC ; M. ZAGAR , COMPARATIVE ANALYSIS OF BLOCKCHAIN CONSENSUS ALGORITHMS,IEEE,2018
[7]V.Y.Kulkarni,R.A.Rane,P.Mestr,S.Panchal, Risk Rating System of X.509 Certificates, Procedia Computer Science, Volume 89, 2016, Pages 152-161
[8] Adam MihaiGergelyBogdanCrainicu, The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure Procedia Technology,Volume 22, 2016, Pages 926-930
[9]R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
[10]S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[11]H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
[12] Farrell S, Housley R., An Internet Attribute Certificate Profile for Authorization, Request for Comments: 3281, Network Working Group, Standards Track, IETF, 2002.
focuses on An Introduction to Methods of Backup and Disaster Recovery for Cloud Computing .