Keywords : Blockchain


A Survey Paper on Cloud Security Based on Distributed Ledgers of Blockchain

Neetha S.S; Michel Rwibasira; Suchithra R

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue 3, Pages 38-42
DOI: 10.47392/irjash.2021.095

Technology grows up, day to day to facilitate human beings’ lifestyle, in order to protect them and their properties. Cloud computing is a platform that one hardware is shared by different clients in the virtual ways and works as standalone physical hardware, is accessed everywhere at any time through the internet. Security is an essential and a vital point to all customers is belonged in the same physical component. This survey paper discusses about cloud computing challenges, types of attacks, and currently solutions in the details. Furthermore, cloud security of models as application, network, and deployment and also services. Cloud security based on a distributed ledger helps the clients to operate within transparency manners and is decentralized to enhance cloud computing information security principals, cloud security requirements, cloud security control, and security design of cloud computing

Review of Deployment of Machine Learning in Blockchain Methodology

Sona Solanki; Asha D Solanki

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 9, Pages 14-20
DOI: 10.47392/irjash.2020.141

The evolution of blockchain methodology has been a remarkable, highly transformative and trend-setting platform in current years. BT's accessible platform reinforces data protection and confidentiality. In addition, the consensus framework in it ensures system is protected and accurate. Nevertheless, it introduces additional security challenges such as invasion by the majority and double consumption. Data analysis on encrypted data centered on blockchain is crucial to manage the existing challenges. Insights on these results elevates the value of emerging of Machine Learning technique. It covers the fair quantity of data needed to make specific choices. Consistency of data and its distribution are very critical in ML to increase findings reliability. The fusion of these two techniques will produce extremely accurate outcomes. In this article, we describe a thorough analysis on ML implementation to make smart applications based on BT further robust to threats. There are numerous standard ML approaches such as Support Vector Machines (SVM), Clustering, Bagging, and Deep Learning (DL) algorithms such as Convolutional Neural Network (CNN) and Long-Term Memory (LSTM) that can be employed to evaluate the threats on a block chain network. Finally, we discuss how two different techniques can be implemented in a number of smart applications like Unmanned Aerial Vehicle (UAV), Smart Grid (SG), medical care and Smart cities.

A Conceptual Study of Blockchain to Financial Sector

KohilaKanagalakshmi T; Ms. Lavita; Shweta Biradar

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 8, Pages 112-117
DOI: 10.47392/irjash.2020.103

A Blockchain technology is the basis of Bitcoin which has acknowledged widespread attentions recently. It is also known as distributed, indisputable and digital ledger which registers the transactions in the same order it is generated in a close real-time. In blockchain, transactions take place in a decentralized manner. The subsequent transactions can be included to the ledger only by the agreement of the participants in the network which is known as nodes The subsequent transactions can be added to the ledger only by the agreement of the participants in the network which is known as nodes. The applications of blockchain extending from banking, crypto currency and financial services, risk managements, social services and Internet of things. This paper explains a broad impression of blockchain technology in banking applications and recent advances.