IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Content-Based Transaction Access From Distributed Ledger of Blockchain Using Average Hash Technique

Content-Based Transaction Access From Distributed Ledger of Blockchain Using Average Hash Technique
View Sample PDF
Author(s): Randhir Kumar (National Institute of Technology, Raipur, India)and Rakesh Tripathi (National Institute of Technology, Raipur, India)
Copyright: 2021
Pages: 17
Source title: Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles
Source Author(s)/Editor(s): Amit Kumar Tyagi (Research Division of Advanced Data Science, Vellore Institute of Technolgy, Chennai, India), Gillala Rekha (K. L. University, India)and N. Sreenath (Pondicherry Engineering College, India)
DOI: 10.4018/978-1-7998-3295-9.ch003

Purchase

View Content-Based Transaction Access From Distributed Ledger of Blockchain Using Average Hash Technique on the publisher's website for pricing and purchasing information.

Abstract

There are many critical applications working with blockchain-based technology including the financial sector, healthcare, and supply chain management. The fundamental application of blockchain is Bitcoin, which was primarily designed for the financial value transfer. Owing to the feature of decentralized storage structure, immutability, integrity, availability, and reliability of transactions, the blockchain has become the need of the current industry like VANET. However, presently, not much work has been done in order to mitigate the redundancy in the distributed ledger. Hence, the authors arrive at the intelligible conclusion to detect a similar transaction that can mitigate the redundancy of transaction in a distributed ledger. In this chapter, they are addressing two main challenges in blockchain technology: firstly, how to minimize the storage size of blockchain distributed ledger and, secondly, detecting the similar transaction in the distributed ledger to mitigate the redundancy. To detect similar transaction from the distributed ledger they have applied the average hash technique.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom