Preface
Page: i-ii (2)
Author: Sonali Vyas, Shaurya Gupta, Vinod Kumar Shukla and Chinwe Peace Igri
DOI: 10.2174/9789815305814124010001
Evaluation of Data Management in Blockchainbased Systems
Page: 1-37 (37)
Author: Bhakti Thakre* and Uma Yadav
DOI: 10.2174/9789815305814124010003
PDF Price: $15
Abstract
Blockchain records every data transaction on its network through a
distributed digital ledger that is accessible to the public. The agreement-based process
of recording and updating data across dispersed nodes is crucial for enabling trustless
multi-party transactions in blockchain-based systems. The degree of utility and
performance of a blockchain-based application is ultimately determined by
understanding what and how the data is stored and changed. By offering an immutable
and consistent data storage technology, it improves the quality of the data while posing
new data management issues.
It analyzes blockchains from the viewpoint of a developer to highlight important
concepts and considerations when incorporating a blockchain into a larger software
system as a data store. Data Management involves architectural layers for storing data
and conceptualizing each layer in blockchain, examining the flow of data in
blockchain-based applications, andexploring data administration aspects for blockchains. Data domination issues in blockchains are related to privacy and Quality
Assurance (QA). The privacy of data can be preserved by keeping it in an encrypted
form, but it affects usability and flexibility in terms of effective search. Attribute-based
Searchable Encryption (ABSE) has proven its worth by providing fine-grained
searching capabilities in the shared cloud storage.
In order to emphasize key ideas and things to keep in mind when integrating a
blockchain as a data storage system into a larger software system, it analyzes
blockchains from the perspective of a developer. Data management includes creating
architectural layers for data storage, conceptualizing each layer in a blockchain,
analyzing data flow in blockchain-based applications, and finally investigating data
administration features for blockchains. The problems with data dominance in
blockchains concern Quality Assurance (QA) and privacy. Data privacy can be
maintained by encrypting it, but this compromises flexibility and usability in terms of
efficient search. Since it allows for more precise searching in shared cloud storage,
attribute-based searchable encryption, or ABSE, has shown its value.
The vulnerability of cloud services to assaults stems from their widespread
accessibility. In cloud computing, data tampering is a risk to data integrity that can
happen. Clients using cloud computing across a range of application areas demand
assurances regarding the veracity and accuracy of their data.
Data Security and Traffic Management Using Iot and Blockchain Application
Page: 38-63 (26)
Author: Lipsa Das*, Bhanu Prakash Lohani, Deepshikha Bhargava and Bhuvi Sharma
DOI: 10.2174/9789815305814124010004
PDF Price: $15
Abstract
The integration of Internet of Things (IoT) and blockchain technologies offers promising solutions for ensuring robust data security and efficient traffic management in contemporary urban environments. This book chapter explores the synergy between IoT and blockchain applications, presenting novel approaches to address the evolving challenges of data integrity, privacy, and traffic congestion. Through the convergence of these technologies, innovative mechanisms for securely collecting, transmitting, and storing data from IoT devices are introduced, fostering trust and transparency in data transactions. Additionally, leveraging blockchain's decentralized ledger, smart contracts, and cryptographic principles, the chapter elaborates on how immutable records can streamline traffic management systems, enabling real-time monitoring, optimization, and enforcement of traffic regulations. This chapter elucidates the potential of IoT and blockchain integration to revolutionize data security and traffic management paradigms, paving the way for smarter, safer, and more sustainable urban ecosystems.
Data Management and Security in Blockchain Networks
Page: 64-84 (21)
Author: M. M. Dhabu, Ashish Tiwari, Kavita Sharma*, V. S.S. Koushik, Vrudhula Sreedhar, V. V. Jithin and Malla Abhilash
DOI: 10.2174/9789815305814124010005
PDF Price: $15
Abstract
Blockchain is one of the major enhancements in this era of information technology. In this chapter, we will dig in deep for data management and security in blockchain networks. Blockchain is a decentralized, immutable, traceable, and trustworthy network for storing and retrieving information. As far as the need to store data is concerned, various factors come into consideration, such as network security, data security, cyber security risk, and data integrity in storage systems. Storing data in blockchain gives us rapid query processing and enhanced data auditing schemes with its public ledger, which leads to low computation costs and quick traceability. Here, data is distributed and decentralized. Storing data in chains leads to better data quality, owing to block chains' immutability, transparency, and traceability, which enables users to get better analytics and mining results. Generally, the main threats to data are users’ privacy, anonymity, and data tampering. Storing data in the blockchain ensures these issues don’t arise. Being the whole process is auditable, consistency and accuracy of blockchain are not compromised, although it gives high safety and security markups to the data stored. Current implementations of blockchain in real time show high computational cost, time, and latency, which leads to low scalability. High levies are charged to users for peer-to-peer transactions in public blockchains. However, the most discussed issues are related to blockchain security, data management challenges, and policies around the world.
Data Management, Security Challenges, and Solutions in Blockchain Network
Page: 85-104 (20)
Author: Pallabi Baruah* and Bhairab Sarma
DOI: 10.2174/9789815305814124010006
PDF Price: $15
Abstract
Data management challenges are one of the primary concerns in businessrelated organizations. It may result in poor risk management decisions, data loss, data breaches, illegal access, data silos, noncompliance with legislation, an unregulated environment, a limited number of resources, and so on. Again, data security, or information security, includes the practices, policies, and principles to protect digital data and other kinds of information. Data security is based on three foundational principles — confidentiality, integrity, and availability. All operations around the globe are becoming increasingly reliant on data to operate their day-to-day operations and make educated business decisions. With so much data being created, it has become challenging to manage data throughout the enterprise, which may be dispersed over different geolocations and using tens of business line applications. It's accepted that data is the new oil for any organization. There may be very crucial data that may result in tremendous opportunities for companies, which is why it is vital to have welldefined data management plans in place in order to face the most difficult challenges that data management implies. In this chapter, emphasis is given to the most common data management challenges and pain points and to solving them in blockchain networks. It also includes the implementation of blockchain network technology in a wide range of applications, opportunities, and challenges.
Security Enhancement of Smart Grids using Blockchain Technology
Page: 105-124 (20)
Author: Praveen Nelapati, Nitesh A. Funde*, Anusha Viswanadapalli, Khushboo Jain and Meera Dhabu
DOI: 10.2174/9789815305814124010007
PDF Price: $15
Abstract
The smart grid idea is implemented as a modern interpretation of the
traditional power grid; it enables a two-way flow of electricity and data, including
energy management, using different entities such as smart meters, appliances, and
renewable energy resources. The critical nature of smart grids evokes traditional
network attacks. Physical attacks, cyber-attacks, and natural disasters are significant
threats to smart grid deployment. These threats can lead to infrastructural failures and
various problems, including blackouts, energy theft, breaches of customer privacy, and
endangering safety of operating personnel.
The blockchain has some significant features, making it an applicable technology for
smart grid standards to solve security issues and trust challenges. We categorize the
blockchain applications in the smart grid into three categories: energy trading,
infrastructure management, and smart-grid operations management. We present
different methods for security enhancement of Smart Grids (SG) using blockchain
technology. A wide range of energy applications have suggested a suitable blockchain
architecture in smart grid operations, a sample block structure and the potential
blockchain technicalities employed in it. There is a need to critically examine the
security issues aimed at preventing possible threats or failures. Various security
challenges and threats are discussed with respect to their possible sources of
occurrence. The important research problems and possible future research directions
are presented for addressing smart grid security concerns using blockchain.
AI-enabled Security in Blockchain System
Page: 125-150 (26)
Author: Pawan Whig*, Ramya Thatikonda, Jhansi Bharathi Madavarapu and Ashima Bhatnagar Bhatia
DOI: 10.2174/9789815305814124010008
PDF Price: $15
Abstract
Blockchain allows the safe interchange of sensitive data without the need for duplication, reducing inaccuracies in medical records and gaining time through time savings. The data is timestamped as well, further enhancing its security. Blockchain technology is able to increase the safety and effectiveness of payments in a broad range of medical contexts. As a consequence, only those who have given permission to read or change health data are able to do so. In a safe and secure health sector with Automation tech, this book chapter suggests using chain technologies to construct an information and knowledge repository and retrieval mechanism for patients and healthcare providers. For the benefit of scholars within the same area, a case study focused on security and privacy concerns of the virtual world will be explored in this book chapter.
Cyber Attacks on Big Data System
Page: 151-177 (27)
Author: Lipsa Das*, Suman Avdhesh Yadav, Deepshikha Bhargava and Khushi Dadhich
DOI: 10.2174/9789815305814124010009
PDF Price: $15
Abstract
The way in which companies process and leverage large swaths of information has completely changed due to Big Data technologies. Furthermore, these technologies have also created new openings for global hackers who aim to compromise the hefty vaults of information. The sheer scale and complexity of Big Data systems and their frameworks have made them difficult to assault, which has also opened them up to a variety of attacks. For instance, cybercriminals deploy various forms of malware, such as viruses and worms, that erode the integrity of the information. Alternatively, perpetrators use aggressive approaches, sometimes relying on victims to go outside their networks and expose their critical information. Their vulnerability often increases due to an absence of powerful encryption, which can further increase their susceptibility by focusing on the complexity of these systems. The effects of such attacks are significant and extend far beyond merely operational continuity. Even greater problems relate to an organization's confidentiality and the integrity of its data. However, by focusing on advanced threat detection methods, stronger access controls, and encrypted Big Data systems, organizations should be at least partially able to reduce these threats. Moreover, some semblance of the current security may be maintained throughout the Big Data systems' lifetimes. As society increasingly relies on large-scale data processing, it becomes essential to overcome the unique obstacles presented by cyber threats. Doing so ensures that these critical systems can continue to operate efficiently and reliably.
Subject Index
Page: 178-182 (5)
Author: Sonali Vyas, Shaurya Gupta, Vinod Kumar Shukla and Chinwe Peace Igri
DOI: 10.2174/9789815305814124010010
Introduction
Data Management and Security in Blockchain Systems offers a comprehensive exploration of how blockchain technology is reshaping the landscape of data management and security. This book addresses key aspects of blockchain-based systems, including data integrity, transparency, and tamper resistance, making it an essential resource for students, researchers, and professionals. Covering topics from blockchain-enabled IoT traffic management to the integration of AI for enhanced security, this book presents solutions to current challenges such as cyberattacks, smart grid security, and scalable network designs. Each chapter is thoughtfully structured to provide readers with a solid understanding of blockchain applications in diverse domains. Perfect for those seeking to understand blockchain’s potential to secure and manage data in an increasingly interconnected world. Key Features: - Comprehensive overview of data management and security in blockchain networks. - Practical insights into IoT, smart grids, and AI integration. - In-depth analysis of cybersecurity challenges and solutions.