Explore chapters and articles related to this topic
Blockchain System Implementation
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Bharghava Sai Nakkina, Deepthi Gudapati, Naga Venkat Palaparthy, Sai Sreenath Sadupally
In a traditional setting for cloud services, confidential data are stored over a centralized database. In the case of a successful cyber-attack, a centralized database offers the hackers a perfect nest of information in a single location. Without a distributed system, the hacker requires less effort to steal data as all the data are lodged in a single location, resulting in a huge compromise to the data’s confidentiality. A blockchain cloud-storage solution provides a venue to store data in a distributed and decentralized manner. Salesforce has started a similar concept called Salesforce Blockchain built on its CRM software using smart contracts and blockchain-based data-sharing [10].
Application of Blockchain for Energy Transition Systems
Published in Muhammad Asif, Handbook of Energy Transitions, 2023
Gijs van Leeuwen, Tarek Alskaif, Bedir Tekinerdogan
Fundamentally, the blockchain network is a collective digital database that enables a secure and verifiable distributed or decentralized management of data among a group of users [15,16]. This is the most important characteristic of a blockchain network that distinguishes it from a regular centralized database. In a centralized database, all data is stored on one server that is operated by a single controlling party, which means that the accuracy and security of this data are dependent on the actions of this controlling party. If the data is not well protected from cyberattacks or if the controlling party has any interest in manipulating it, the contents of the database can be changed unbeknownst to other stakeholders. In contrast, on a blockchain network, all the data can be accessed by all nodes (i.e., users) on the network at all times. If any node changes the content of the database, every other node in the network can read that, and there is a guarantee that everybody has the same copy of the ledger. Thus, a distributed ledger cannot be tampered with as all nodes must approve of any changes to the content. Figure 14.1 represents the difference between a centralized system, where all participants rely on the central authority, and a decentralized system where all participants communicate to cross-validate the data. The changes are checked and verified by the rest of the network and written to the ledger using a consensus mechanism [17] All changes to the database content, called transactions, are recorded chronologically, and grouped into blocks of data chained together. Understood in this way, a blockchain is an ever-expanding historical record of the evolution of the data contents. By accessing this historical record, any network user can reconstruct and verify the current status of the database. Because all users have the same historical record, it is impossible for any single user to manipulate the data.
Blockchain Databases 2
Published in Neeraj Kumar, N. Gayathri, Md. Arafatur Rahman, B. Balamurugan, Blockchain, Big Data and Machine Learning, 2020
Anurag Pandey, Abhishek Kumar, Achintya Singha, N. Gayathri, S. Rakesh Kumar
In a centralized database, the input information from the users is stored at a fixed position such that different users from different locations can access it. This type of database helps the users to access the database from remote areas.
Block-A-City: An Agricultural Application Framework Using Blockchain for Next-Generation Smart Cities
Published in IETE Journal of Research, 2023
Puja Das, Moutushi Singh, Dimitrios A. Karras, Deepsubhra Guha Roy
Reform of the present agriculture sector necessitates new approaches and innovations to make the agriculture industry more transparent and responsible. Blockchain technology is one of the unique distributed tools. Unlike traditional integrated and anticompetitive agriculture supervision schemes, the distributed network uses a dispersed data construction to accumulate and reclaim data from numerous trustworthy sources. As a result, it may be able to fix several severe issues in present systems, which are caused by the following factors: An attacker can easily compromise data integrity by attacking the centralized system.Insider manipulation of the centralized database may affect the integrity of data.A supply-chain network is overly reliant on the centralized database (Single-point data malfunction is problematic)Encompassing a foreign entity to authenticate and monitor transactions incurs high costs.