Security and Privacy with Blockchain - PowerPoint PPT Presentation

About This Presentation
Title:

Security and Privacy with Blockchain

Description:

The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities. – PowerPoint PPT presentation

Number of Views:221
Slides: 9
Provided by: Johnkite
Category:
Tags:

less

Transcript and Presenter's Notes

Title: Security and Privacy with Blockchain


1
Security and Privacy with Blockchain
blockchainexpert.uk
2
  • INTRODUCTION

Blockchain offers a creative way to deal with
performing functions, storing information,
executing transactions, building up trust in an
open domain and so forth. Many consider the
technology of blockchain as a breakthrough for
cryptography and cybersecurity, with use cases
going from the Internet of things, digital
currency frameworks like Bitcoin, smart
contracts, and many others. The distributed
ledger technology is indeed in the prime
consideration note and is going to gain more
popularity among both the scholarly world and
industry in the coming years, with of course the
privacy in the blockchain on being at the focal
point of discussion. To those, who are coming
across the blockchain concepts for the first
time- blockchain is a distributed ledger
technology intended to manage and organize the
growing list of transaction records happening
across the world. Here the information is stored
in blocks with each block guarded with
cryptographic techniques. To get added the
information into blocks, the data has to be
verified by the nodes in the network enforcing
the strong integrity of its transaction data.
3
  • Only upon successfully overcoming the
    decentralized consensus protocols, any new data
    is added to the blockchain network. Thus security
    and privacy in the blockchain are always upheld.
  • According to academia, Blockchain innovation is a
    breakthrough in secure computing. Without any
    centralized system, in an open organized
    framework, blockchain enables conducting the
    transactions in the most reliable manner.
  • It is estimated that by 2025, the revenue out of
    blockchain-based venture applications will reach
    19.9 billion. The development pace of 26.2 is
    estimated to get witnessed in the coming years.
    In the interim, Citibank, HSBC, IBM, Accenture,
    Goldman Sachs, Morgan Stanley, Microsoft, Cisco,
    Tencent, Ali and other widely acclaimed budgetary
    foundations, counseling firms, IT merchants and
    Internet monsters are quickening lab research and
    capital format on blockchain innovation.
    Blockchain in collaboration with big data and
    artificial intelligence are considered to be the
    giant leap innovation for the cutting edge
    financial industry. Notwithstanding Bitcoin.com,
    a few symmetrical endeavors, for example, the
    Hyperledger venture supported by IBM and Apache
    establishment, Ethereum, FileCoin give
    open-source archives and stages for blockchain
    development work.

4
Security and Privacy Properties With
Blockchain The fundamental security properties of
blockchain originate from both bitcoin
architecture and cryptography advances.
Hypothetically, the first secure blockchain was
detailed utilizing cryptography in 1991. Further
in 1993, by consolidating Merkle trees in the
architecture, the proficiency of the
cryptographic chain of blocks was advanced giving
birth to various inborn security qualities, for
example, consistency, tamper-proof, protection
from a Distributed Denial-of-Service (DDoS)
assault, pseudonymity, and protection from
double-spending assault and so forth. Let us see
few among it Consistency of the ledger The
idea of consistency with regards to blockchain
alludes to the property that all nodes have a
similar record simultaneously. In a centralized
system often the consistency is questioned as the
data is passed across multiple institutions for
the process of reconciliation, clearing or
liquidation. In the conventional architecture
model, the data gets handled simultaneously by
many subjecting to errors and inconsistencies in
the ledger. However, with blockchain, this issue
is totally erased. Blockchain alludes to a strong
consistency model where nodes have always the
same data in the same specified period.
5
When someone makes a request in blockchain to add
new data, it is verified by the nodes and is
updated across all the nodes. Each node of the
blockchain network gets consistent
eventually. The integrity of Transactions When
we make use of the current online payment methods
for any kind of business say investment, asset
management, bonds or any other, often it brings
the danger of misrepresenting or falsifying the
authentications. The trustworthiness of exchanges
is always questioned as there involves third
parties managing different strings. However, with
blockchain, the data is tamper-resistant. The
peer-to-peer transaction totally evades the
necessity of third-party intervention in the
play. Any transaction information stored in
the blockchain is impossible to get tampered, be
it while generating new blocks or after the
generation process. Even if anyone tries to
tamper with the information stored on the
blockchain, such attempts are cleverly prevented
by the blockchain protocols. As each transaction
records are compressed with a Hash function, it
is indeed a hard nut cracking attempt to tamper.
6
Resistance to DDoS Attacks A denial-of-service
attack alludes to a kind of digital assaults that
disrupt the facilitated Internet benefits by
making the host machine or the system
inaccessible to its planned clients. DDoS attacks
over-burden the host framework by flooding with
pointless solicitations, thus slowing down the
fulfillment of administration processes.Thanks to
the fully decentralized architecture of
blockchain. The security of transaction records
is greatly upheld by the consensus protocol. Even
if the blockchain nodes go offline, the security
of the data stored in blockchain nodes remains
intact. The attacker would need to gather
adequate computational assets to make any
alterations.
7
Click here to read more about Security and
Privacy with Blockchain
8
Thank You !
UK
Mail Us
Phone
Cybrosys Limited Alpha House, 100 Borough High
Street, London, Greater London SE1 1LB, United
Kingdom
info_at_blockchainexpert.uk
44 7414439281
Write a Comment
User Comments (0)
About PowerShow.com