SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4611
BLOCKCHAIN SECURITY IMPLEMENTATION FOR FINANCIAL DOMAINS
Jamuna Prasad Rao1, Mr.K. Shankara2
1Reg.no:1116132, MCA VI semester, Department of MCA, Sree Vidyanikethan Institute of Management, S.V.University,
Tirupati, Andhra Pradesh.
2Assistant Professor, Department of MCA, Sree Vidyanikethan Institute of Management, A.Rangampeta, Tirupati.
-------------------------------------------------------------------------------***-------------------------------------------------------------------------------
Abstract:- Now a day’s security becomes a very major
aspect in all online transactions. The online browsing, online
transaction needs a security. The security became very
questionnaire for the real world. The online transactions
need to maintain a strong security towards the finance and
other aspects. The SSL security evaluates client information
and encrypts the data. The encrypted format of the
information will be send to the server. The server decrypt
and access the information. This process provides a security
for data transmission. The data modification security is
required in various domains. The financial domain is one the
major required domain to block the modifications. The need
for providing the security, for the transactions is fulfilling by
Blockchain. The resistance for data modifications is the
specialty of Blockchain design required domain to block the
modifications. The need for providing the security, for the
transactions is fulfilling by Blockchain.
Keywords: Chain of transactions, blocking , Non Editable
transactions, Byzantine, Decentralized System.
INTRODUCTION:
Up to 1990 the encrypted based security was implemented
on host level. The chain of cryptographic network security
was first implemented in the year 1991 [1]. Blockchain is
considered as peer-to-peer network collection of protocol
for inter-node communication and the new blocks are
validated. The distributed computing system was
implemented for record transactions [2]. The record
transactions are permanent and not editable. The
Blockchain contains a strong fault tolerance by the
implementation of Byzantine. The complete Blockchain
was implemented as a Decentralized system.
LITERATURE REVIEW:
The network chain of security was first proposed by Staurt
Haber and W. Scott Stornetta in the year of 1991. They
were implemented a system where the document
timestamps could not be tampered due to time and person
[3]. In the year 1992 Markle trees are designed, to
implement several security certificates. In 2008 Hash cash
was implemented to add blocks to the chain of networks.
In 2014 Blockchain was implemented for providing
security to the Bitcoin transactions that supports 50 GB to
100 GB as the file size [4]. In 2016 IBM was Adopted
Blockchain technology for their financial transactions and
recognized very less frauds.
ARCHITECTURE OF BLOCK CHAIN:
The chain of transactions, in all segments is recorded by
the decentralized system and also reflects the distributed
system. The block chain is a public digital ledger, majorly
implemented to record the transactions with the special
property of non editable. The verification of transactions
made easy, a user can verify the transaction individually
with no cost [5]. The Blockchain supports robust workflow
and support a complete secure security. The primary
objective of Blockchain is implementing peer network and
distributed time stamping. The transaction may take place
only once. The transactions are not editable. The
Blockchain architecture is shown in figure 1.
Figure 1. Architecture of Block Chain
IMPLEMENTATION OF BLOCKCHAIN:
Blockchain was completed for Bitcoin Transactions. The
users of Bitcoin was increased like a flood of water, so it
became essential to implement strong security and the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4612
transactions are non editable [6]. Inorder to provide
strong security for transactions the Bitcoin organization
choose Blockchain. Bitcoin Transactions are implemented
with block chain the graph show the Bitcoin transaction
within a short spam. The growth of transactions through
Blockchain is shown in the figure 2.
Figure2. Graph Representing transactions.
The structure of Blockchain contains various stages:
Blocks formation: the valid transactions are stored in the
form of blocks. Each block defines with hashed and
encoded format into a tree format. Each block contains a
relationship with another block [7]. A separate memory
holds address of another block. When the data is storing on
different block the link is establish with the next block. The
chain of block is formed with linked blocks. The complete
block looks like an integrated chain of networks. The
Blockchain architecture is shown in the figure3.
Figure 3: Block Diagram of Block Chain
Block time description:
When the transaction takes place it should be create a
block. The average time taken on the network to generate
an extra block in the block chain is described as block time.
The Blockchain blocks as shown in the figure 4.
Figure 4: Blocks designed by 3D
Hard forks structure:
It describes the change of rule in the block. If any new rule
applies for any block, the same rule should be applicable
for all blocks. The updating of rules should be unique [8].
The block chain does not allow implementing different
rules for the individual blocks. The total set of blocks
should be implemented the same rule. The hard forks
structure force the users to implement uniform rule for all
the blocks.
Decentralization method:
The block chain changes the architecture into
decentralized system. Peer-to-Peer is the storage system of
data in the network [9]. By the implementation of block
chain decentralized system, the user can eliminate most of
the risk while storing and providing security. Block chain
implements public key and private key cryptography
techniques to ensure the security.
ABOUT FINANCIAL DOMAIN:
The financial domain needs a strong security. One of the
major problems for financial services is data overriding
and modification of data. These problems cost major
issues. So it is essential to provide better security for all
the transactions. The Blockchain provides non-editable
and committed transactions [10]. There is no third party
involvement in all the transactions. The block chain
transaction security is unalterable and allows only copying
of transactions. Depends on the requirement we can verify
the transactions. The users are provided complete history
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4613
verification option with the help of Blockchain. Different
types of the financial services for the users through
Blockchain as shown in the figure 4.
Figure 5: Areas of Financial Domains
The Block chain provides a strong security for Financial
Domains. The security contains digital Rights, Wagers,
ESCrow, Equity, Debts, Derivations, crow funding. The
Blockchain architecture supports all the above
functionalities of Financial Domain. The figure 6 shows the
secure transaction of financial transactions in the hands of
Blockchain.
Figure 6: Secure Transactions
CONCLUSION:
Providing the security for the online and off line
transactions is became a hectic task for the developers and
users. The Blockchain gave a sufficient solution for this
type of problems. Blockchain with the set of nodes verify
the transaction in multiple areas and commit the
transaction. The transactions once committed may not be
editable. The financial domains need a non editable
transactions maintenance system. The purpose of security
may be full fill by the Blockchain.
REFERENCES:
1. State of blockchain q1 2016: Blockchain funding
overtakes bitcoin,” 2016. [Online]. Available:
http://www.coindesk.com/state-of- blockchain-q1-
2016/
2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
3. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in
crypto-currencies and blockchain technologies: A
monetary theory and regulation perspective,” 2015.
[Online]. Available:
http://dx.doi.org/10.2139/ssrn.2646618563
4. G. Foroglou and A.-L. Tsilidou, “Further applications of
the blockchain,”2015.
5. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou,
“Hawk: The blockchain model of cryptography and
privacy-preserving smart contracts,” in Proceedings of
IEEE Symposium on Security and Privacy (SP), San
Jose, CA, USA, 2016, pp. 839–858.
6. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole
new world: Income tax considerations of the bitcoin
economy,” 2013. [Online]. Available:
https://ssrn.com/abstract=2394738
7. Y. Zhang and J. Wen, “An iot electric business model
based on the protocol of bitcoin,” in Proceedings of
18th International Conference on Intelligence in Next
Generation Networks (ICIN), Paris, France, 2015, pp.
184–191.
8. M. Sharples and J. Domingue, “The blockchain and
kudos: A distributed system for educational record,
reputation and reward,” in Proceedings of 11th
European Conference on Technology Enhanced
Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–
496.
9. C. Noyes, “Bitav: Fast anti-malware by distributed
blockchain consensus and feedforward scanning,”
arXiv preprint arXiv:1601.01405, 2016.
10. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin
mining is vulnerable,” in Proceedings of International
Conference on Financial Cryptography and Data
Security, Berlin, Heidelberg, 2014, pp. 436–454.
11. A. Biryukov, D. Khovratovich, and I. Pustogarov,
“Deanonymisation of clients in bitcoin p2p network,”
in Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security, State of
blockchain q1 2016: Blockchain funding overtakes
bitcoin,” 2016. [Online]. Available:
http://www.coindesk.com/ state-of- blockchain-q1-
2016/
12. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
13. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in
crypto-currencies and blockchain technologies: A
monetary theory and regulation perspective,” 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4614
[Online]. Available: http://dx.doi.org/10.2139/ssrn.
2646618563
14. G. Foroglou and A.-L. Tsilidou, “Further applications of
the blockchain,”2015.
15. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou,
“Hawk:The blockchain model of cryptography and
privacy-preserving smart contracts,” in Proceedings of
IEEE Symposium on Security and Privacy (SP), San
Jose, CA, USA, 2016, pp. 839–858.
16. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole
new world: Income tax considerations of the bitcoin
economy,” 2013. [Online]. Available:
https://ssrn.com/abstract=2394738
17. Y. Zhang and J. Wen, “An iot electric business model
based on the protocol of bitcoin,” in Proceedings of
18th International Conference on Intelligence in Next
Generation Networks (ICIN), Paris, France, 2015, pp.
184–191.
18. M. Sharples and J. Domingue, “The blockchain and
kudos: A distributed system for educational record,
reputation and reward,” in Proceedings of 11th
European Conference on Technology Enhanced
Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–
496.
19. C. Noyes, “Bitav: Fast anti-malware by distributed
blockchain consensus and feedforward scanning,”
arXiv preprint arXiv:1601.01405, 2016.
20. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin
mining is vulnerable,” in Proceedings of International
Conference on Financial Cryptography and Data
Security, Berlin, Heidelberg, 2014, pp. 436–454.
21. A. Biryukov, D. Khovratovich, and I. Pustogarov,
“Deanonymisation of clients in bitcoin p2p network,”
in Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security,
22. C. Decker, R. Wattenhofer, Information propagation
in the Bitcoin network. In: Peer-to-Peer Computing
(P2P), IEEE Thirteenth International Conference on; p.
1–10, 2013.
23. E. P. Gareth and W. Peters, “Understanding modern
banking ledgers through blockchain technologies:
Future of transaction processing and smart contracts
on the internet of money,” November 2015.
24. A.Dev “Bitcoin mining acceleration and performance
quantification”. In: Electrical and Computer
Engineering (CCECE), IEEE 27th Canadian Conference
on; p. 1–6. 2014
25. A. Fernandez, E. Insfran, S. Abraho, Usability
evaluation methods for the web: A systematic mapping
study. Information and Software
Technology.;53(8):789– 817. 2011
26. C. Jentzsch, “Dezentralized autonomous organization
to automate governance,” 2016.
27. J. Peterson and J. Krug, “Augur: a decentralized, open-
source platform for prediction markets,” 2015.
28. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008.
29. M. Swan, “Blockchain: Blueprint for a New Economy”,
1st ed. O’Reilly, February 2015.
30. D.Vandervort “Challenges and Opportunities
Associated with a Bitcoin-Based Transaction Rating
System” vol. 8438. Springer Berlin; Heidelberg; p. 33–
42. 2014.
31. A. Beikverdi, J. Song, Trend of centralization in
Bitcoin’s distributed network. In: Software
Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing (SNPD), 2015 16th
IEEE/ACIS International Conference. p. 1–6. 2015
moto, “Bitcoin: A peer-to-peer electronic cash system,”
2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
32. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in
crypto-currencies and blockchain technologies: A
monetary theory and r State of blockchain q1 2016:
Blockchain funding overtakes bitcoin,” 2016. [Online].
Available: http://www.coindesk.com/ state-of-
blockchain-q1- 2016/
33. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
34. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in
crypto-currencies and blockchain technologies: A
monetary theory and regulation perspective,” 2015.
[Online]. Available: http://dx.doi.org/10.2139/ssrn.
2646618563
35. G. Foroglou and A.-L. Tsilidou, “Further applications of
the blockchain,”2015.
36. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou,
“Hawk: The blockchain model of cryptography and
privacy-preserving smart contracts,” in Proceedings of
IEEE Symposium on Security and Privacy (SP), San
Jose, CA, USA, 2016, pp. 839–858.
37. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole
new world: Income tax considerations of the bitcoin
economy,” 2013. [Online]. Available:
https://ssrn.com/abstract=2394738
38. Y. Zhang and J. Wen, “An iot electric business model
based on the protocol of bitcoin,” in Proceedings of
18th International Conference on Intelligence in Next
Generation Networks (ICIN), Paris, France, 2015,pp.
184–191.
39. M. Sharples and J. Domingue, “The blockchain and
kudos: A distributed system for educational record,
reputation and reward,” in Proceedings of 11th
European Conference on Technology Enhanced
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4615
Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–
496.
40. C. Noyes, “Bitav: Fast anti-malware by distributed
blockchain consensus and feedforward scanning,”
arXiv preprint arXiv:1601.01405, 2016.
41. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin
mining is vulnerable,” in Proceedings of International
Conference on Financial Cryptography and Data
Security, Berlin, Heidelberg, 2014, pp. 436–454.
42. A. Biryukov, D. Khovratovich, and I. Pustogarov,
“Deanonymisation of clients in bitcoin p2p network,”
in Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security,

More Related Content

What's hot

Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
eraser Juan José Calderón
 

What's hot (20)

Blockchain an introduction
Blockchain an introduction Blockchain an introduction
Blockchain an introduction
 
Blockchain & Islamic Finance
Blockchain & Islamic FinanceBlockchain & Islamic Finance
Blockchain & Islamic Finance
 
India Blockchain Strategy
India Blockchain StrategyIndia Blockchain Strategy
India Blockchain Strategy
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
 
Fundamentals of Block chain Technology
Fundamentals of Block chain TechnologyFundamentals of Block chain Technology
Fundamentals of Block chain Technology
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Distributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - EternicDistributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - Eternic
 
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
 
Blockchain Technology Report 2018
Blockchain Technology Report 2018Blockchain Technology Report 2018
Blockchain Technology Report 2018
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar]
 
Blockchain tutorial for MBA
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBA
 
Blockchain technology-report-final
Blockchain technology-report-finalBlockchain technology-report-final
Blockchain technology-report-final
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)
 
03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composer03 - An introduction to hyperledger composer
03 - An introduction to hyperledger composer
 

Similar to IRJET- Blockchain Security Implementation for Financial Domains

Similar to IRJET- Blockchain Security Implementation for Financial Domains (20)

Blockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual OverviewBlockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual Overview
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT][A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
 
Blockchain Technology Centralised Ledger to Distributed Ledger
Blockchain Technology Centralised Ledger to Distributed LedgerBlockchain Technology Centralised Ledger to Distributed Ledger
Blockchain Technology Centralised Ledger to Distributed Ledger
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain Cryptocurrency
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
 
E-VOTING SYSTEM USING BLOCKCHAIN
E-VOTING SYSTEM USING BLOCKCHAINE-VOTING SYSTEM USING BLOCKCHAIN
E-VOTING SYSTEM USING BLOCKCHAIN
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
IRJET- Study of Blockchain and its Concepts
IRJET-  	  Study of Blockchain and its ConceptsIRJET-  	  Study of Blockchain and its Concepts
IRJET- Study of Blockchain and its Concepts
 
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future CurrencyIRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
 
IRJET- Different Blockchain Platforms and Algorithms
IRJET-  	  Different Blockchain Platforms and AlgorithmsIRJET-  	  Different Blockchain Platforms and Algorithms
IRJET- Different Blockchain Platforms and Algorithms
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
Disadvantages and Advantages of Blockchain
Disadvantages and Advantages of BlockchainDisadvantages and Advantages of Blockchain
Disadvantages and Advantages of Blockchain
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Recently uploaded (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

IRJET- Blockchain Security Implementation for Financial Domains

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4611 BLOCKCHAIN SECURITY IMPLEMENTATION FOR FINANCIAL DOMAINS Jamuna Prasad Rao1, Mr.K. Shankara2 1Reg.no:1116132, MCA VI semester, Department of MCA, Sree Vidyanikethan Institute of Management, S.V.University, Tirupati, Andhra Pradesh. 2Assistant Professor, Department of MCA, Sree Vidyanikethan Institute of Management, A.Rangampeta, Tirupati. -------------------------------------------------------------------------------***------------------------------------------------------------------------------- Abstract:- Now a day’s security becomes a very major aspect in all online transactions. The online browsing, online transaction needs a security. The security became very questionnaire for the real world. The online transactions need to maintain a strong security towards the finance and other aspects. The SSL security evaluates client information and encrypts the data. The encrypted format of the information will be send to the server. The server decrypt and access the information. This process provides a security for data transmission. The data modification security is required in various domains. The financial domain is one the major required domain to block the modifications. The need for providing the security, for the transactions is fulfilling by Blockchain. The resistance for data modifications is the specialty of Blockchain design required domain to block the modifications. The need for providing the security, for the transactions is fulfilling by Blockchain. Keywords: Chain of transactions, blocking , Non Editable transactions, Byzantine, Decentralized System. INTRODUCTION: Up to 1990 the encrypted based security was implemented on host level. The chain of cryptographic network security was first implemented in the year 1991 [1]. Blockchain is considered as peer-to-peer network collection of protocol for inter-node communication and the new blocks are validated. The distributed computing system was implemented for record transactions [2]. The record transactions are permanent and not editable. The Blockchain contains a strong fault tolerance by the implementation of Byzantine. The complete Blockchain was implemented as a Decentralized system. LITERATURE REVIEW: The network chain of security was first proposed by Staurt Haber and W. Scott Stornetta in the year of 1991. They were implemented a system where the document timestamps could not be tampered due to time and person [3]. In the year 1992 Markle trees are designed, to implement several security certificates. In 2008 Hash cash was implemented to add blocks to the chain of networks. In 2014 Blockchain was implemented for providing security to the Bitcoin transactions that supports 50 GB to 100 GB as the file size [4]. In 2016 IBM was Adopted Blockchain technology for their financial transactions and recognized very less frauds. ARCHITECTURE OF BLOCK CHAIN: The chain of transactions, in all segments is recorded by the decentralized system and also reflects the distributed system. The block chain is a public digital ledger, majorly implemented to record the transactions with the special property of non editable. The verification of transactions made easy, a user can verify the transaction individually with no cost [5]. The Blockchain supports robust workflow and support a complete secure security. The primary objective of Blockchain is implementing peer network and distributed time stamping. The transaction may take place only once. The transactions are not editable. The Blockchain architecture is shown in figure 1. Figure 1. Architecture of Block Chain IMPLEMENTATION OF BLOCKCHAIN: Blockchain was completed for Bitcoin Transactions. The users of Bitcoin was increased like a flood of water, so it became essential to implement strong security and the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4612 transactions are non editable [6]. Inorder to provide strong security for transactions the Bitcoin organization choose Blockchain. Bitcoin Transactions are implemented with block chain the graph show the Bitcoin transaction within a short spam. The growth of transactions through Blockchain is shown in the figure 2. Figure2. Graph Representing transactions. The structure of Blockchain contains various stages: Blocks formation: the valid transactions are stored in the form of blocks. Each block defines with hashed and encoded format into a tree format. Each block contains a relationship with another block [7]. A separate memory holds address of another block. When the data is storing on different block the link is establish with the next block. The chain of block is formed with linked blocks. The complete block looks like an integrated chain of networks. The Blockchain architecture is shown in the figure3. Figure 3: Block Diagram of Block Chain Block time description: When the transaction takes place it should be create a block. The average time taken on the network to generate an extra block in the block chain is described as block time. The Blockchain blocks as shown in the figure 4. Figure 4: Blocks designed by 3D Hard forks structure: It describes the change of rule in the block. If any new rule applies for any block, the same rule should be applicable for all blocks. The updating of rules should be unique [8]. The block chain does not allow implementing different rules for the individual blocks. The total set of blocks should be implemented the same rule. The hard forks structure force the users to implement uniform rule for all the blocks. Decentralization method: The block chain changes the architecture into decentralized system. Peer-to-Peer is the storage system of data in the network [9]. By the implementation of block chain decentralized system, the user can eliminate most of the risk while storing and providing security. Block chain implements public key and private key cryptography techniques to ensure the security. ABOUT FINANCIAL DOMAIN: The financial domain needs a strong security. One of the major problems for financial services is data overriding and modification of data. These problems cost major issues. So it is essential to provide better security for all the transactions. The Blockchain provides non-editable and committed transactions [10]. There is no third party involvement in all the transactions. The block chain transaction security is unalterable and allows only copying of transactions. Depends on the requirement we can verify the transactions. The users are provided complete history
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4613 verification option with the help of Blockchain. Different types of the financial services for the users through Blockchain as shown in the figure 4. Figure 5: Areas of Financial Domains The Block chain provides a strong security for Financial Domains. The security contains digital Rights, Wagers, ESCrow, Equity, Debts, Derivations, crow funding. The Blockchain architecture supports all the above functionalities of Financial Domain. The figure 6 shows the secure transaction of financial transactions in the hands of Blockchain. Figure 6: Secure Transactions CONCLUSION: Providing the security for the online and off line transactions is became a hectic task for the developers and users. The Blockchain gave a sufficient solution for this type of problems. Blockchain with the set of nodes verify the transaction in multiple areas and commit the transaction. The transactions once committed may not be editable. The financial domains need a non editable transactions maintenance system. The purpose of security may be full fill by the Blockchain. REFERENCES: 1. State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” 2016. [Online]. Available: http://www.coindesk.com/state-of- blockchain-q1- 2016/ 2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf 3. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,” 2015. [Online]. Available: http://dx.doi.org/10.2139/ssrn.2646618563 4. G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,”2015. 5. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858. 6. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract=2394738 7. Y. Zhang and J. Wen, “An iot electric business model based on the protocol of bitcoin,” in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, pp. 184–191. 8. M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward,” in Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490– 496. 9. C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,” arXiv preprint arXiv:1601.01405, 2016. 10. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 436–454. 11. A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” 2016. [Online]. Available: http://www.coindesk.com/ state-of- blockchain-q1- 2016/ 12. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf 13. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,” 2015.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4614 [Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618563 14. G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,”2015. 15. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk:The blockchain model of cryptography and privacy-preserving smart contracts,” in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858. 16. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract=2394738 17. Y. Zhang and J. Wen, “An iot electric business model based on the protocol of bitcoin,” in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, pp. 184–191. 18. M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward,” in Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490– 496. 19. C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,” arXiv preprint arXiv:1601.01405, 2016. 20. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 436–454. 21. A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 22. C. Decker, R. Wattenhofer, Information propagation in the Bitcoin network. In: Peer-to-Peer Computing (P2P), IEEE Thirteenth International Conference on; p. 1–10, 2013. 23. E. P. Gareth and W. Peters, “Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money,” November 2015. 24. A.Dev “Bitcoin mining acceleration and performance quantification”. In: Electrical and Computer Engineering (CCECE), IEEE 27th Canadian Conference on; p. 1–6. 2014 25. A. Fernandez, E. Insfran, S. Abraho, Usability evaluation methods for the web: A systematic mapping study. Information and Software Technology.;53(8):789– 817. 2011 26. C. Jentzsch, “Dezentralized autonomous organization to automate governance,” 2016. 27. J. Peterson and J. Krug, “Augur: a decentralized, open- source platform for prediction markets,” 2015. 28. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. 29. M. Swan, “Blockchain: Blueprint for a New Economy”, 1st ed. O’Reilly, February 2015. 30. D.Vandervort “Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System” vol. 8438. Springer Berlin; Heidelberg; p. 33– 42. 2014. 31. A. Beikverdi, J. Song, Trend of centralization in Bitcoin’s distributed network. In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International Conference. p. 1–6. 2015 moto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf 32. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and r State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” 2016. [Online]. Available: http://www.coindesk.com/ state-of- blockchain-q1- 2016/ 33. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf 34. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,” 2015. [Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618563 35. G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,”2015. 36. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858. 37. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract=2394738 38. Y. Zhang and J. Wen, “An iot electric business model based on the protocol of bitcoin,” in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015,pp. 184–191. 39. M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward,” in Proceedings of 11th European Conference on Technology Enhanced
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4615 Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490– 496. 40. C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,” arXiv preprint arXiv:1601.01405, 2016. 41. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 436–454. 42. A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,