Open Access   Article Go Back

Improving Security of Blockchain Through Authorisation

Vivek Sharma1 , Nagendra Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-10 , Page no. 111-114, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si10.111114

Online published on May 05, 2019

Copyright © Vivek Sharma, Nagendra Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vivek Sharma, Nagendra Kumar, “Improving Security of Blockchain Through Authorisation,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.111-114, 2019.

MLA Style Citation: Vivek Sharma, Nagendra Kumar "Improving Security of Blockchain Through Authorisation." International Journal of Computer Sciences and Engineering 07.10 (2019): 111-114.

APA Style Citation: Vivek Sharma, Nagendra Kumar, (2019). Improving Security of Blockchain Through Authorisation. International Journal of Computer Sciences and Engineering, 07(10), 111-114.

BibTex Style Citation:
@article{Sharma_2019,
author = {Vivek Sharma, Nagendra Kumar},
title = {Improving Security of Blockchain Through Authorisation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {10},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {111-114},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=985},
doi = {https://doi.org/10.26438/ijcse/v7i10.111114}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.111114}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=985
TI - Improving Security of Blockchain Through Authorisation
T2 - International Journal of Computer Sciences and Engineering
AU - Vivek Sharma, Nagendra Kumar
PY - 2019
DA - 2019/05/05
PB - IJCSE, Indore, INDIA
SP - 111-114
IS - 10
VL - 07
SN - 2347-2693
ER -

           

Abstract

Blockchain is the chain of blocks and each block consists a time stamp, transaction data and a cryptographic hash of previous block. It is a decentralized distributed network in which each peer node connected with each other and shares history of all the transactions. Each new block added to blockchain whenever a transaction occur need to be verified by all the peer node and transaction executed successfully if more that 50% allows. There are some vulnerabilities which are present in Blockchain because of its publicly open network and lack of security certification. We tried to modify the Blockchain with the use of smart contracts with the existing blockchain network and using X.509 Certification for specifying the permission allotted to each peer node at the time it is added to the network.

Key-Words / Index Term

Blockchain,Block,Node,X.509Certificate,Cryptographic,Hash,Vulnerabilities

References

[1]DMITRY EFANOV, PAVEL ROSCHIN, ALL-PERVASIVENESS OF THE BLOCKCHAIN TECHNOLOGY, PROCEDIA COMPUTER SCIENCE ,VOLUME 123, 2018, PAGES 116-121
[2] ZIGA TURK, ROBERT KLINC, POTENTIALS OF BLOCKCHAIN TECHNOLOGY FOR CONSTRUCTION MANAGEMENT,PROCEDIAENGINEERING,VOLUME 196, 2017, PAGES 638-645
[3]LichengWang,XiaoyingShen,JingLi,JunShao,YixianYangCryptographic primitives in blockchains,Journal of Network and computerApplicationsVolume127, 2019, Pages 43-58
[4] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
[5] Philip A. Bernstein, Eric Newcomer, in Principles of Transaction Processing (Second Edition), 2009
[6] L. M. BACH ; B. MIHALJEVIC ; M. ZAGAR , COMPARATIVE ANALYSIS OF BLOCKCHAIN CONSENSUS ALGORITHMS,IEEE,2018
[7]V.Y.Kulkarni,R.A.Rane,P.Mestr,S.Panchal, Risk Rating System of X.509 Certificates, Procedia Computer Science, Volume 89, 2016, Pages 152-161
[8] Adam MihaiGergelyBogdanCrainicu, The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure Procedia Technology,Volume 22, 2016, Pages 926-930
[9]R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
[10]S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[11]H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
[12] Farrell S, Housley R., An Internet Attribute Certificate Profile for Authorization, Request for Comments: 3281, Network Working Group, Standards Track, IETF, 2002.
focuses on An Introduction to Methods of Backup and Disaster Recovery for Cloud Computing .