Improving Security of Blockchain Through Authorisation
Keywords:
Blockchain, Block, Node, X.509Certificate, Cryptographic, Hash, VulnerabilitiesAbstract
Blockchain is the chain of blocks and each block consists a time stamp, transaction data and a cryptographic hash of previous block. It is a decentralized distributed network in which each peer node connected with each other and shares history of all the transactions. Each new block added to blockchain whenever a transaction occur need to be verified by all the peer node and transaction executed successfully if more that 50% allows. There are some vulnerabilities which are present in Blockchain because of its publicly open network and lack of security certification. We tried to modify the Blockchain with the use of smart contracts with the existing blockchain network and using X.509 Certification for specifying the permission allotted to each peer node at the time it is added to the network.
References
[1]DMITRY EFANOV, PAVEL ROSCHIN, ALL-PERVASIVENESS OF THE BLOCKCHAIN TECHNOLOGY, PROCEDIA COMPUTER SCIENCE ,VOLUME 123, 2018, PAGES 116-121
[2] ZIGA TURK, ROBERT KLINC, POTENTIALS OF BLOCKCHAIN TECHNOLOGY FOR CONSTRUCTION MANAGEMENT,PROCEDIAENGINEERING,VOLUME 196, 2017, PAGES 638-645
[3]LichengWang,XiaoyingShen,JingLi,JunShao,YixianYangCryptographic primitives in blockchains,Journal of Network and computerApplicationsVolume127, 2019, Pages 43-58
[4] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
[5] Philip A. Bernstein, Eric Newcomer, in Principles of Transaction Processing (Second Edition), 2009
[6] L. M. BACH ; B. MIHALJEVIC ; M. ZAGAR , COMPARATIVE ANALYSIS OF BLOCKCHAIN CONSENSUS ALGORITHMS,IEEE,2018
[7]V.Y.Kulkarni,R.A.Rane,P.Mestr,S.Panchal, Risk Rating System of X.509 Certificates, Procedia Computer Science, Volume 89, 2016, Pages 152-161
[8] Adam MihaiGergelyBogdanCrainicu, The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure Procedia Technology,Volume 22, 2016, Pages 926-930
[9]R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
[10]S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[11]H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
[12] Farrell S, Housley R., An Internet Attribute Certificate Profile for Authorization, Request for Comments: 3281, Network Working Group, Standards Track, IETF, 2002.
focuses on An Introduction to Methods of Backup and Disaster Recovery for Cloud Computing .
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
