The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Data Confidentiality, Integrity, and Authentication
Abstract
Blockchain has been created in the process of development in bitcoin. It's a singly linked list of block, with each block containing a number of transactions and each list in the blocks using with cryptographic functions. The cryptographic hash function contains the hash of the previous block, timestamp, and transaction ID. Blockchain services include the authentication, confidentiality, integrity, data and resource provenance, and privacy and access control lists technologies. The authentication provider authenticates decentralized database with transactions in private-public key pair. This key-pair is used in the transport layer security with the entire network. The network legitimizes the transaction after that and adds the transaction to the blockchain. A sequence of blocks in blockchain holds the complete record of transactions like a public ledger. The integrity data written in the blockchain cannot be altered subsequently. By limiting access to the information in confidentiality, only authorized users can access the information, so that information is also protected.
Related Content
P. V. Naveen, A. Poongodi.
© 2026.
24 pages.
|
Sathya Selvaraj Sinnasamy, S. Kamaleswari, U. Surendar, Biswaranjan Senapati, B. Vaidianathan, M. Gandhi.
© 2026.
14 pages.
|
B. Aarthi, A. Smruthi, Pamireddy Thanishka, G. Sakthi Prasanna, P. Mahendran.
© 2026.
18 pages.
|
R. Radhika, A. Muthukumaravel.
© 2026.
24 pages.
|
R. Regin, K. Lalith Reddy, R. Sanjay Narayanan, Y. Likhith Srinivas, R. Steffi, S. Saranya, S. R. Saranya.
© 2026.
26 pages.
|
R. Saranya, S. Silvia Priscila.
© 2026.
20 pages.
|
Manjunath Singh H., R. Tanuja.
© 2026.
28 pages.
|
|
|