دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2022] نویسندگان: K.M. Baalamurugan (editor), S. Rakesh Kumar (editor), Abhishek Kumar (editor), Vishal Kumar (editor), Sanjeevikumar Padmanaban (editor) سری: ISBN (شابک) : 3030705005, 9783030705008 ناشر: Springer سال نشر: 2021 تعداد صفحات: 330 [325] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 10 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Blockchain Security in Cloud Computing (EAI/Springer Innovations in Communication and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت بلاک چین در رایانش ابری (نوآوری های EAI/Springer در ارتباطات و محاسبات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب به بررسی مفاهیم و تکنیک های امنیت ابری با استفاده از بلاک چین می پردازد. همچنین امکان استفاده از بلاک چین برای تامین امنیت در حوزه های مختلف مورد بحث قرار گرفته است. نویسندگان در مورد اینکه چگونه بلاک چین پتانسیل افزایش قابل توجه حریم خصوصی و امنیت داده ها را دارد و در عین حال دقت و یکپارچگی داده های ابری را افزایش می دهد، بحث می کنند. نکته برجسته این کتاب بر روی کاربرد فناوری های یکپارچه در ارتقای مدل های امنیت ابری، موارد استفاده و چالش های آن متمرکز شده است. مشارکت کنندگان، هم از دانشگاه و هم از صنعت، ارزیابی فنی و مقایسه خود را با فناوری های موجود ارائه می کنند. این کتاب مربوط به متخصصان فناوری اطلاعات، محققان و دانشگاهیان در زمینه فناوری های انقلاب چهارم است.
This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.
Preface Contents Introduction Blockchain Security 1 Introduction 2 Privacy of a Blockchain 3 Security of Blockchain 3.1 Public Blockchain 3.2 Private Blockchain 3.3 Robustness 4 Network Servicing Protocol 5 Distributed Consensuses 5.1 Effect of Consensus on Distributed Computing 6 Merkle Patricia Tree 6.1 Patricia Tree 6.2 Merkle Tree 7 Rewards 8 Analysis and Discussions 9 Conclusions 10 Future Scopes References Significance of Blockchain Technologies in Industry 1 Introduction 2 Effects of Blockchain Technology in the Industry 3 Blockchain Technology Industry Applications 4 Significance of Blockchain Technology and Decentralization in Industry 5 Use of Blockchain in Industry 6 Conclusion References Review of Blockchain Forensics Challenges 1 Introduction 2 Background 2.1 Blockchain Structure 2.2 Digital Forensic Science 2.3 Digital Forensic Investigation Process 3 Related Works 4 Research Methodology 4.1 Phase I 4.2 Phase II 5 Blockchain Forensic Investigation Models 5.1 Forensic-Chain 5.2 Block4Forensic 5.3 Bitcoin Transaction Network Analytic Method 5.4 SDNLog-Foren 5.5 BlockSLaaS 5.6 FIF-IoT 5.7 BIFF 5.8 B-FICA 5.9 B-CoC 6 Results and Discussions 7 Potential Future Challenges 8 Conclusion References Distributed Computing in Blockchain Technology 1 Introduction 1.1 Public Ledger 1.1.1 Public Ledgers: Where Everything Gets Stored 1.1.2 Public Ledgers Work the Same Way as Bank Records, Though with a Few Differences 1.1.3 How Does Public Ledger Work? 1.1.4 Blocks in Blockchain 1.1.5 Block Time 2 Overview of Distributed Computing 2.1 Bitcoin Shared Network 2.2 Transaction in Bitcoin Network 2.3 Exchanges: Private Keys 2.4 Handling: Mining 2.5 Bitcoin Mining 2.6 Difficulty 2.6.1 The Computationally Difficult Problem 2.6.2 The Difficulty Metric 2.7 Reward 2.8 The Mining Environment Hardware 2.8.1 FPGA Module 2.8.2 CPU Mining 2.8.3 GPU Mining 2.8.4 FPGA Mining 2.8.5 ASIC Mining 2.8.6 Mining Administrations (Cloud Mining) 3 Importance of Disseminated Registering in the Blockchain 3.1 Transaction 3.2 First Things First 3.3 Tokens 3.4 Issues and Challenges of Distributed Consensus 3.5 Crash Fault 3.6 The Byzantine Fault 4 Platforms to Develop Blockchain 4.1 Hyperledger Fabric Components and Architecture 4.1.1 Participation Service Provider (MSP) 4.1.2 Customer 4.1.3 MSP/Hub 4.1.4 Types of Peers 4.1.5 Orderer 4.2 Overview of Ripple and Corda 4.2.1 Ripple (XRP) 4.2.2 Corda 4.3 Merkle Tree 4.3.1 Merkle Trees in Bitcoin 5 Barriers to Implementing Blockchain 5.1 Creation of Coin 5.1.1 Where Cryptocurrency Comes From 5.2 Payments and Double-Spending 5.3 Types of Spending Attack 5.3.1 Race Assault 5.3.2 Finney Assault 5.3.3 Vector76 Assault 5.3.4 Blockchain Reorganization Assault 5.3.5 Majority Assault 6 Privacy Challenges 6.1 Introduction 6.2 To the Community 6.3 Applications in Identity Authentication 6.4 Online Identity 6.5 Proprietorship Rights 6.6 Smart Property 6.7 Security Issues and Future Directions 6.8 51 Percent Attack 6.9 Similarity 6.10 The Need of a Decentralized Storage References Review of Cryptocurrencies Implementations in the Cloud Environment: Ethereum in the Cloud 1 Introduction 2 Related Works 3 Description of the Ethereum Blockchain 3.1 Definition of Ethereum Virtual Machine (EVM) 3.1.1 The Uses of the EVM 3.1.2 The Work of the EVM 3.1.3 Renting Time on the EVM 3.1.4 Gas Unit to Control the Overuse of the Resources 3.2 The Communication Between the Decentralized Applications (Dapp) and the EVM 3.2.1 Whisper Protocol/Web3 3.2.2 The Domain Path (Swarm) 3.3 Mining in the Ethereum Blockchain 3.3.1 DAG File 3.3.2 Proof of Work 3.3.3 Difficulty 3.3.4 Patricia Tree/State Tree 3.4 Account 3.5 Transactions 3.6 Messages 3.7 Other Aspects 3.8 Smart Contracts 3.9 Crypto Economics and Attacks 3.9.1 Common Attacks 4 Types of Blockchain and How to Decide Which One to Implement 5 The Combination Cloud Blockchain 5.1 Assuring Data Provenance and Auditing Over the Cloud 5.2 Blockchain Cloud Vulnerabilities 5.2.1 Double-Spending Attack 5.2.2 Selfish Mining Attack 5.2.3 Eclipse Attack 5.2.4 Block Discarding Attack and Difficulty Raising Attack 5.2.5 Block Withholding Attack [19] 5.2.6 Anonymity Issues in Blockchain Cloud 5.3 Integration of Blockchain with Cloud Environments 5.4 Cloud Support for Blockchain Transactions and Data: Challenges and Requirements 5.5 Blockchain Support for Cloud Users, Task, and Data Management 5.6 The Integration of Blockchain and Cloud of Things 5.7 Motivation of Integration of Blockchain and Cloud of Things 5.8 Technical Limitations of Blockchain 5.9 The Opportunities for Integration of Blockchain and Cloud of Things 5.10 Blockchain as a Service (BaaS) 6 The Implementation of Ethereum Blockchain for Azure: Azure Workbench 6.1 Specifying the Application Policy 6.2 Implementation of Workflow 6.3 Smart Contract Security 7 Simulation of 51% Attack 8 Conclusion References Blockchain: Structure, Uses, and Applications in IoT 1 Introduction 1.1 Blockchain Concept 1.2 Internet of Things 2 History of Blockchain 3 Working of Blockchain 4 Applications of Blockchain 4.1 Blockchain Finance 4.2 Blockchain Business 4.3 Blockchain Smart Contracts 4.4 Blockchain in IoT 5 Uses of Blockchain 6 Future Trends of Blockchain in IoT 7 Conclusion References Securing IoT Communications Using Blockchain Technology 1 Introduction 2 The Internet of Things 3 Blockchain 3.1 Segments of a Blockchain 3.2 Actualizing a Blockchain 4 Blockchain-Based Internet of Things 5 Secure IoT Communication Using Blockchain 6 Approaches to Strengthen IoT Security Through Blockchain Technology 7 How a Blockchain Works 8 How to Secure IoT with Blockchain: The Problem of Centralization 9 The Communication Model 10 Challenges of a Secured IOT Model 10.1 The Blockchain Model 10.2 Benefits of Blockchain in IOT 10.3 Challenges of Blockchain in IOT 10.4 The Optimum Secure IoT Model 11 Conclusion References A Real-Time Monitoring Tool for Analyzing Ethereum Digital Currency in Global Business Transaction 1 Introduction 2 Ethereum Virtual Machine 2.1 The Ethereum State Transition Function 2.1.1 State 2.1.2 Transactions 2.1.3 Vapor and EVM Bytecode 2.1.4 Transaction-Based State Machine 2.1.5 Account State 3 Cryptocurrency Security Standard (CCSS) 3.1 Cryptocurrency Wallets 3.1.1 Hot and Cold Wallets 3.1.2 Hardware Wallets 3.1.3 Paper Wallets 3.1.4 Desktop Wallets 3.1.5 Mobile Wallets 3.1.6 Web Wallets 3.1.7 Takeaway 4 Consensus Algorithms 4.1 Double Verification of Stake (DVOS) 4.2 Advanced Verification of Stake (AVOS) 4.3 Byzantine Fault Tolerance (BFT) 4.4 Advanced Byzantine Fault Tolerance (ABFT) 4.5 SIEVE 4.6 Verification of Force (VOF) 4.7 Unique Node Lists (UNL) 4.8 Verification of Light (VOL) 4.9 Double Verification of Activity (DVOA) 4.10 Double Verification of Capacity (DVOC) 5 Human-Readable Programming Language (HRPL) 5.1 Ethereum High-Level Languages 5.1.1 LLL 5.1.2 Serpent 5.1.3 Solidity 5.1.4 Vyper 5.1.5 Bamboo 6 Simulation and Analysis 7 Conclusion References Blockchain-Powered Healthcare Information Exchange Systems to Support Various Stakeholders 1 Introduction 2 Preliminaries 2.1 An Overview of Healthcare Systems 2.2 An Overview of Security Issues in Healthcare Systems 2.3 An Overview of Cloud Computing 2.4 An Overview of Blockchain Technology 3 Proposed Blockchain-Powered Healthcare System 3.1 Proposed System Overview 3.2 Notations Used in the Proposed System 3.3 Three Major Entities in Our Proposed Architecture 3.4 Three Major Phases of Our Proposed Architecture 3.5 Security Measures 4 Results and Discussion 4.1 Experimental Results 4.2 Discussion 5 Conclusion References The Future of Cloud Computing: Blockchain-Based Decentralized Cloud/Fog Solutions – Challenges, Opportunities, and Standards 1 Introduction 2 Open Chain Access Protocol 2.1 Blocklet 2.2 Components of Blocklet 2.3 Computing with Services in the Cloud 2.4 Ledgers 2.5 Blocks 2.6 Cloud of Things 3 Cloud Computing Works 4 Blockchain’s Best Features for Corporations 4.1 Risks and Benefits of Going Serverless 5 Application of Blockchain in Cloud Computing 5.1 Bitcoin Concept 5.2 Transactional Database Access and Permission 6 Blockchain-as-a-Service Expedites Land-Based Applications 6.1 Computing Serverless 7 The Current Blockchain Situation 8 Improve the Blockchain Development Policy Climate 9 Decentralized Approaches and Challenges Faced Based on Blockchain 9.1 Decentralized Cloud Solutions Focused on Blockchain 9.2 Decentralization 9.3 Applications from BCoT 10 Conclusion References Blockchain Technology: A Boon at the Pandemic Times – A Solution for Global Economy Upliftment with AI and IoT 1 Introduction 1.1 Work of a Blockchain 1.2 The Significant Characteristics of Blockchain 2 Literature Survey 3 Blockchain: Trust Techniques, Applications, and Challenges 3.1 The Trust Techniques 3.2 Application in Real World 3.3 Blockchain Challenges 4 Blockchain with AI and IoT 4.1 Blockchain with AI (Artificial Intelligence) 4.2 Confluence of AI and Blockchain 4.3 Blockchain with IoT (Internet of Things) 4.4 Certain Use Cases of Blockchain with IoT 4.5 Challenges that IoT Overcomes Using Blockchain 5 Blockchain Support During the Pandemic 5.1 Ways in which Block Chain Can Be Used 5.2 All-Round Support of Blockchain to Fight the Pandemic 6 Economy Upliftment Using Blockchain 6.1 Blockchain, AI, and IoT Can Support to Handle the Economy for the Post-COVID Future 6.1.1 Artificial Intelligence 6.1.2 Internet of Things 6.1.3 Blockchain Technology 7 The Blockchain Toolkit by the World Economic Forum 7.1 Providing the Ecosystem Value 7.2 Digital Identity 7.3 Data Protection 7.4 Information Integrity 7.5 Cybersecurity 8 Conclusion References Securing Healthcare Information Using Blockchain Technology: A Deep Insight 1 Introduction 2 Motivation of Blockchain 2.1 Blockchain Technology in Healthcare 2.2 Types 2.3 Mining Process in Blockchain Technology 3 Issues in Blockchain Technology 3.1 Securing Healthcare Records Using Blockchain Technology 4 Conclusion References Decentralized Healthcare Management System Using Blockchain to Secure Sensitive Medical Data for Users 1 Introduction 1.1 HCMS 1.2 Blockchain 1.3 Cryptography 1.4 Hashing 2 Related Work 2.1 Our Contribution 2.2 Proposed System 3 Results and Discussion 4 Conclusion References Imminent Threat with Authentication Methods for AI Data Using Blockchain Security 1 Introduction 2 Prioritize Vulnerabilities: From Identification 2.1 Identifying Flaws 3 Vulnerabilities and the Management of Remediation 3.1 Scanning Efforts 4 Attack Model 4.1 Semi-Honest Model 4.2 Malicious Model 5 Encryption of Authentication and Connection 5.1 Hashing Blockchain 5.2 Blockchain Technology Architecture: Public 5.3 Blockchain Architecture 5.4 Consortium Architecture 5.5 Blockchain Development of Networks 5.6 Key Characteristics of Blockchain Architecture 5.7 Key Features of a Blockchain Network 5.7.1 Public Blockchain 5.7.2 Permissioned Blockchain 5.7.3 Consortium Blockchain 6 Existing Solutions Using Blockchain Technology 7 DeepChain Suggested a Value-Driven Reward System Based on BC to Solve Security Problems 8 Challenges to ML and BC 9 Conclusion References Index