Blockchain Compliance in Supply Chain Regulations: A Comprehensive Overview DOI

B Thamizhkani.,

Neeraj Varshney, Mallikarjuna Rao Gundavarapu

и другие.

Опубликована: Ноя. 23, 2024

Язык: Английский

Investigating Blockchain Security Mechanisms for Tamper-Proof Data Storage DOI

P. Thilakavathy,

S. Jayachitra,

Anurag Aeron

и другие.

Опубликована: Ноя. 23, 2023

Across a wide range of sectors, blockchain technology has emerged as game-changing option for secure data storage. This research dives into the mechanisms that enable to protect integrity and immutability. investigates how reduces chances tampering unauthorized adjustments by examining its underlying concepts features, such decentralization, cryptography, consensus procedures, Blockchain networks are decentralized, so they don't rely on any one entity function. eliminates potential point failure or manipulation. Data is protected from disclosure thanks use hash functions digital signatures, two examples strong cryptographic algorithms. By confirming agreeing transactions, methods like Proof Work (PoW) Stake (PoS) keep ledger up-to-date accurate. linking blocks together recording timestamps, makes it practically impossible alter after been recorded. The distributed ledger's availability public ease encourage accountability deter dishonest participants. Smart contracts eliminate need third parties automating operations based predetermined rules cannot be altered have created. study also delves fork resistance, incentives truthful involvement, other network security measures. It covers implications both permissioned permissionless blockchains. provides but several drawbacks must taken account. These include issues with scalability possibility flaws in smart contracts. Therefore, securing performance requires cautiously considering particular case needs picking right platform configuration. For function properly real world, constant vigilance updates required

Язык: Английский

Процитировано

2

Enhancing IoT Security with Self-Adaptive Blockchain-Based Intrusion Detection System DOI
Pramod Kumar Naik, Khaja Mannanuddin, Karthikeyan Sundaresan

и другие.

Опубликована: Дек. 14, 2023

The extensive adoption of Internet Things (IoT) devices has resulted in a revolution across variety business sectors by presenting previously unimaginable prospects for connection and automation. Despite this, there been significant increase the usage IoT, which led to important security issues. This research presents ground-breaking solution known as Self-Adaptive Blockchain-Based Intrusion Detection System (SAB-IDSI), was developed particularly settings. In order determine how well SAB-IDSI performs contrast traditional Systems (IDS), series experiments assessments were carried out. findings indicate that accuracy intrusion detection. outstanding capability reliably detect genuine incursions while limiting false alarms is demonstrated its accuracy, 96.2%. False alerts are kept minimum. addition it very high recall rate 94.8%, ensures capture incursions. fact balanced F1-Score 95.5% further validates overall efficacy detection intrusions. average reaction time 12.5 milliseconds clear evidence effectiveness rapidly responding threats, greatly surpassing performance IDS. highlights potential timely threat mitigation, essential situations where essence. significantly lower energy consumption rate, demonstrates amount may remain operational also lowering total expenses.

Язык: Английский

Процитировано

2

Enhancing Security and Transparency Through the Integration of Blockchain and Machine Learning DOI

R. M. Bommi,

B Sundarambal,

Chokiyan Karthikeyini

и другие.

Опубликована: Дек. 21, 2023

This article examines a new strategy in improving security and trust by fusing blockchain technology with machine learning techniques. synergy exploits the decentralisation immutability properties of blockchains alongside analytical capabilities provided ML models to achieve optimal value creation. Through strict scrutiny, employed technique reveals efficacy as regards boosting measures well fostering transparency all sorts operations. It shows how such an integrated approach can take up issues pertaining problem securing contemporary data which will pave way for reliable, trustable, strong systems. For this reason, it becomes possible widen application these safe transparent technologies contribution enlargement into broader fields science.

Язык: Английский

Процитировано

1

Security and Privacy Issues in Distributed Healthcare Systems – A Survey DOI
Manish Bhardwaj, Samad Noeiaghdam, Yu‐Chen Hu

и другие.

Опубликована: Март 8, 2024

New computational and wireless modulation schemes have increased the effectiveness of healthcare (HC) delivery systems. Today's medical technology allows doctors nurses to keep tabs on patients' vitals without constantly checking in with them. Implantable technology, body area networks, Internet Things all contribute better patient monitoring care HC Because breaches security or privacy can devastating impacts treatments general health, optimizing between security, privacy, treatment is vital for systems despite complexity their underlying software technology. Numerous design faults lack effective measures equipment applications pose serious difficulties hazards industry. In this chapter, we discuss effects threats We provide a comprehensive overview possible attacks explore consequences each. also analyze shortcomings already recommended IT The chapter concludes suggestions further study into protecting networks from widely exploited flaws.

Язык: Английский

Процитировано

0

SECURING THE FUTURE OF EDUCATION: QUANTUM ENCRYPTION AND BEYOND – AN EXAMINATION OF CUTTING-EDGE SECURITY TECHNOLOGIES DOI Creative Commons

K. G. Shyja,

N Mehthab,

K. V. Shabna

и другие.

International Education and Research Journal, Год журнала: 2024, Номер 10(1)

Опубликована: Янв. 15, 2024

Education plays a pivotal role in the overall development of individuals as well society. A holistic approach to education involves examinations, various forms assessment, and continuous evaluation provide comprehensive view student's abilities knowledge. The digital era's transformational consequences are always welcomed dynamic field education. Today, many regional, national, worldwide tests, methods, learning platforms being administered online. Without doubt, short while, technology will control entire educational system. Nonetheless, even with most sophisticated technological approaches security encryption, preserving integrity online exams is becoming increasingly difficult. Quantum encryption may be able help this situation. application quantum along its theoretical underpinnings principles, focus study. By safeguarding against eavesdropping, it lays groundwork for future examination administration that ensure safest secure means transmitting question papers.

Язык: Английский

Процитировано

0

Implementing a Novel Blockchain Algorithm for Enhanced Data Integrity in Cloud Systems DOI

V. Balaji,

S. Ambika,

S Varshadevi

и другие.

Опубликована: Март 22, 2024

Язык: Английский

Процитировано

0

DATA ENCRYPTION TECHNIQUES FOR SECURING CLOUD STORAGE AND COMMUNICATION DOI

Ravindrakumar

ShodhKosh Journal of Visual and Performing Arts, Год журнала: 2024, Номер 5(4)

Опубликована: Апрель 30, 2024

Because of the fast use cloud computing, effective security measures have become necessary in order to safeguard sensitive data from being accessed by unauthorised parties and compromised. The encryption is an essential component security, since it guarantees confidentiality integrity while stored sent. Within scope this work, a number distinct methods, including as symmetric key encryption, asymmetric homomorphic are investigated. advantages, limits, appropriateness these approaches for various settings discussed. A strong emphasis placed on role that plays maintaining regulatory compliance, minimising risks associated with eavesdropping, safeguarding communications beginning finish. In addition, we investigate hybrid strategies, which combine advantages systems strike balance between efficiency security. Another topic covered difficulties management, performance overhead, interaction infrastructure already place. frameworks protect storage communication areas such healthcare, banking, e-commerce demonstrated through case studies based real-world scenarios. future, there possibility developing resistant quantum computing combat dangers posed computing. purpose study provide organisations guidance can assist them improving their postures utilising modern technology.

Язык: Английский

Процитировано

0

Enhancing Pharmaceutical Supply Chain Visibility Using IoT and Blockchain DOI
Mohsen Fallah, K. Srujan Raju,

R. Venkatasubramanian

и другие.

Опубликована: Ноя. 23, 2024

Язык: Английский

Процитировано

0

Leveraging Smart Contracts for Automated Freight and Logistics Management DOI
Myasar Mundher Adnan,

Bh. Prashanthi,

M.S. Jyothi

и другие.

Опубликована: Ноя. 23, 2024

Язык: Английский

Процитировано

0

Leveraging Blockchain Smart Contracts for Transparent Supply Chain Management DOI

Rohit Agarwal,

R. Dhilipkumar,

Aadi Nagender

и другие.

Опубликована: Ноя. 23, 2024

Язык: Английский

Процитировано

0