Abstract
More than hundred countries have experienced WannaCry Ransomware cyber-attack in 2017. This attack demanded around $300 of Bitcoin cryptocurrency from users to retrieve their data. There onwards, Blockchain technology and cryptocurrency are catching the attention of everyone. Blockchain is a growing digital record keeping register in the distributed form which cannot be altered. In case of Blockchain, no central authority is needed. Modification of the data or assets stored on Blockchain is highly difficult or nearly impossible. All the data available on Blockchain can be publicly seen by everyone. It cuts down the excessive costs required in the conventional manual record keeping registers. Blockchain technology has lot of bonus points including integrity, write access, reduced cost, trust, etc. With Blockchain technology, various tokens are available such as currency tokens, asset tokens, utility tokens, and equity tokens.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Garner B (2018) What’s a sybil attack & how do Blockchains mitigate them? COINCENTRAL Blogs. https://coincentral.com/sybil-attack-blockchain/
Houben R, Snyers A (2018) Cryptocurrencies and Blockchain—legal context and implications for financial crime, money laundering and tax evasion. In: European Parliament Study Requested by TAX3 committee
IoTeX in HackerNoon.com Blog (2018) Eclipse attacks on Blockchains’ peer-to-peer network. https://hackernoon.com/eclipse-attacks-on-blockchains-peer-to-peer-network-26a62f85f11
Jesus EF, Chicarino VRL, de Albuquerque CVN, Rocha AADA (2018) A survey of how to use Blockchain to secure internet of things and the stalker attack. Hindawi J Secur Commun Netw 2018:1–28. Article ID 9675050
Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in IoT. In: Proceedings of Elsevier science direct international conference on computational intelligence and data science (ICCIDS), pp 1815–1823
Mire S (2018) Disruptor daily blog on, “Blockchain in cybersecurity: 10 possible use cases. https://www.disruptordaily.com/blockchain-use-cases-cyber-security/
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Bitcoin White Paper
Natoli C, Gramoli V (2016) The balance attack against proof-of-work Blockchains: the R3 testbed as an example. ArXiv J 1612
Nayak K, Kumar S, Miller A, Shi E (2016) Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European symposium on security and privacy (EuroS&P)
Priyadarshini I (2019) Introduction to Blockchain technology. In: Le D-N et al (eds) Cyber security in parallel and distributed computing, pp 93–262
Pro Blockchain Media Blog (2018) The emergence of Blockchain 5.0. https://pro-blockchain.com/en/the-emergence-of-blockchain-5-0
Unibright Blog (2017) Blockchain evolution: from 1.0 to 4.0. https://medium.com/@UnibrightIO/blockchain-evolution-from-1-0-to-4-0-3fbdbccfc666
Williams S (2018) The motley fool blog on “20 real-world uses for Blockchain technology”. https://www.fool.com/investing/2018/04/11/20-real-world-uses-for-blockchain-technology.aspx
Yafimava D (2019) Openledger insights blog on “What are consortium Blockchains, and what purpose do they serve?”. https://openledger.info/insights/consortium-blockchains/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Blockchain Technology. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)