scispace - formally typeset
Search or ask a question
Author

M S Meghana

Bio: M S Meghana is an academic researcher. The author has contributed to research in topics: Cryptocurrency & Blockchain. The author has co-authored 1 publications.

Papers
More filters
Proceedings ArticleDOI
21 May 2021
TL;DR: The consensus protocol in the cryptography and peer-to-peer architecture is one of the essential parts of the blockchain technology as discussed by the authors, and the best consensus protocol provides the fault tolerance.
Abstract: The revolution with technologies happens very often, here is one such technology called “Blockchain” which will be a game-changer in many functional sectors of the society. Initially, this technology was developed to support cryptocurrencies (such as Bitcoin, Ethereum, and Litecoin etc).Now a days it is gaining the attention of the researchers in almost the entire field. The consensus protocol in the cryptography and peer to peer architecture is one of the essential parts of the blockchain technology. The best consensus protocol in a blockchain system provides the fault tolerance. These censuses in blockchain are broadly classified in to two types. The absolute-finality consensus protocol and probabilistic-finality consensus protocols. In this paper, the different types of censuses protocols are discussed along with their working, strength and weakness. It also gives the overview on the different types of blockchain technology with their advantages and disadvantages. At the last we also presented a comparison of these consensus protocols by considering different qualitative parameters.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A blockchain-based verifiable user data access control policy for secured cloud data storage is suggested for a version associated with big data in health care, which operates based on blockchain technology.
Abstract: Adding the adequate level of security of information systems dealing with sensitive data, privacy, or defense systems involves some form of access control. The audits performed are dealing with the determination of the allowed activities of the legal users, when attempting to access resources of the system. Usually, full access is provided after the user has been successfully authenticated through an authentication mechanism (e.g., password), while the corresponding authorization control is based on the confidentiality level of the respective resources and the authorization level assigned to each user. A very important diversification occurring in modern digital technologies is related to the identification based on blockchain technology, which is presented as a public, distributed data series, unable to modify its history and grouped in time-numbered blocks. In this work, a blockchain-based verifiable user data access control policy for secured cloud data storage is suggested for a version associated with big data in health care. It is an innovative system of applying classified access policies to secure resources in the cloud, which operates based on blockchain technology. System evaluation is carried out by studying a case in its resilience to Eclipse attack under different malicious user capabilities for routing table poisoning.

1 citations