A study on Blockchain & Its Technology

Authors

  • Rachna Singh SGTBIMIT
  • Ashmeet kaur SGTBIMIT
  • Ayeena Bhalla SGTBIMIT

DOI:

https://doi.org/10.48165/acspublisher.tjmitm.2022.29

Keywords:

Blockchain, Bitcoin, Concerns, cryptocurrencies

Abstract

A blockchain is essentially a distributed database of records or public ledger of all transaction or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participating in the system. And, once entered, information can never be erased. the blockchain contains a certain and verifiable record of every single transaction ever made Bitcoin, the decentralized peer to peer digital currency, is the most popular example that uses blockchain technology. the digital currency bitcoin itself is highly controversial but the underlying blockchain technology has worked flawlessly and found wide range of application in both financial and non -financial world. This concept is enabled by “Blockchain” technology is proposed as a research project in 1991, the blockchain concept predated its first widespread application in use: Bitcoin, in 2009. In the years since, the use of blockchain has exploded via the creation of various cryptocurrencies, decentralized fiancé (Defi) applications, non-fungible tokens (NFTs) , and smart contracts

References

Amazon Elastic Compute Cloud web services at http://aws.amazon.com/ec2

Sales Force Force.com Platform as a service at http://developer.force.com

NetSuite SaaS portal at http://www.netsuite.com

Gartner Data Quest Forecast on Public Cloud Services Doc IDG00200833, June 2, 2010

Chow,R.,Gotlle,P.,Jakobsson, E.S.,Staddon,J., Masuoka,R., and Molina,J.;2009, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. Proceedings of the 2009 ACM workshop on Cloud computing security, 2009.

Gellman, R., Privacy in the Cloud: Risks to Privacy and Confidentiality in Cloud Computing. Technical Report prepared for World Privacy Forum, 2009

C. Hong, M. Zhang, and D. Feng, AB-ACCS: A cryptographic access control scheme for cloud storage, (in Chinese), Journal of Computer Research and Development, vol. 47, no. 1, pp. 259–265, 2010.

Enrique Jimenez Domingo and Minguel Lagares Lemos, CLOUDIO: A Cloud Computing-oriented Multi-Tenant Architecture for Business Information Systems In Proc. of the 23rdInternational Conference on Cloud Computing pages 532-533.IEEE, 2010.

D. Feng, Y. Qin, D. Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of Computer Research and Development, vol. 48, no. 8, pp. 1332–1349, 2011.

Raj Kumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities”, in the 2009 International Conference on High Performance Computing and Simulation, HPCS 2009, pp:1-

Telecommunication Industry Association, TIA-942: Data Center Standards Overview at http://tiaonline.org

Carpenter, M., Liston, t., and Skoudis, E, Hiding Virtualization from Attackers and Malware. IEEE Security and Privacy Magazine, 2007

Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy. New York: O’Reilly. McFedries, P. (2008, August). The Cloud Is The Computer. IEEE Spectrum. Mikkilineni, R., & Sarathy, V. (2009). Cloud Computing and the Lessons from the Past. In Proceedings of the 18th IEEEInternational Workshops onEnabling Technologies: Infrastructures for Collaborative Enterprises, Groningen, The Netherlands.

Ohlman, B., Eriksson, A., & Rembarz, R. (2009). What Networking of Information Can Do for Cloud Computing. In Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Groningen, The Netherlands.

G. O Rabi Prasad, Manas Ranjan, Suresh Chandras Cloud “Computing: security issues and Research Challenges” published in IRACSTInternational Journal of Computer Science and Information Technology and Security (IJCSITS), Vol. 1, No. 2, December 2011.

Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I and Zaharia M, “A view of cloud computing, Communications” of the ACM Magazine , 2010, 53 50-58.

Ashraf I, “An over view of service model of cloud computing” published in Int. J. of Multidisciplinary and Current Research, vol.2, 2014, 779-783.

Bala Narayada Reddy G,” Cloud computing-types of cloud,” 2013, Retrieved from http://bigdatariding.blogspot.my/2013/10/cloudcomputingtypes-of-cloud.html.

Christina A A, “Proactive measures on account hijacking in cloud computing network” published in Asian Journal of Computer Science and Technology, vol.4, 2015, 31-34.

Choubey R, Dubey R and Bhattacharjee J, “A survey on cloud computing security challenges and threats” published in International Journal on Computer Science and Engineering (IJCSE), vol.3, 2011, 1227-1231.

Published

2022-08-23

How to Cite

A study on Blockchain & Its Technology . (2022). Trinity Journal of Management, IT & Media (TJMITM), 13(Special Issue), 49–56. https://doi.org/10.48165/acspublisher.tjmitm.2022.29