Explore chapters and articles related to this topic
Security
Published in Haishi Bai, Zen of Cloud, 2019
An effective way of ensuring data integrity is to use a digital signature. A digital signature is a digest of the original data encrypted using the sender's private key. The data receiver decrypts the signature using the sender's public key, hence validating that the signature and the digest were created by the sender. Then the receiver calculates the digest herself and compare the digest with the decrypted digest. Any discrepancies indicate data tampering has occurred. Applying a one way transformation algorithm to the original data creates the digest. Such an algorithm, such as SHA-256, generates a hash of the original data that is unlikely to collide with other hashes. Any slight changes to the data will lead to a completely different hash.
Blockchain Use Cases in Big Data
Published in Neeraj Kumar, N. Gayathri, Md. Arafatur Rahman, B. Balamurugan, Blockchain, Big Data and Machine Learning, 2020
Harsh Kumar, Khushbu Agrawal, M. R. Manu, R. Indrakumari, B. Balamurugan
A digital signature is a technique used to validate the authentication and integrity of a message, software, and digital document by using certain algorithms like Diffie–Hellman key exchange algorithm, etc. Similar to the digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures also provide the assurance, by validating the sender. In many countries, digital signatures are considered legally binding in the same way as traditional document signatures.
Blockchain Risk, Governance Compliance, Assessment and Mitigation
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Bikramjit Pandher, Manoj Kumar Nagavamshi, Poojaben Prajapati, Vijay Kundru
In any payment card transaction, the most crucial step involves the identification of the cardholder. The identification and authorization of the cardholder entail a multi-step procedure that involves multiple third-party entities. Therefore, a default digital identity verification technology is used in private blockchain and is known as public-key cryptography. Digital signatures are used in public-key cryptography to validate a person, indicating whether an individual has the right key to sign the digital assets and to prove authenticity.
Digitization of Land Record Through Blockchain-based Consensus Algorithm
Published in IETE Technical Review, 2022
Amrendra Singh Yadav, Dharmender Singh Kushwaha
The DLT for land registration records will reduce the role of intermediaries, decrease the time, save cost, strengthen the process, and build trust between the transacting parties. It reduces the bureaucracy and corruption that are connected with the real estate industry. Recording rights of property through blockchain will help in annual cost savings and provide a tamper-proof ledger with other benefit such as: Transparency: Every registry office has an entire blockchain of transaction and holds a history of the transactions that can be accessed anytime from anywhere.Reliability: Any relevant change in records is possible only if there is no consensus process, which is not true.Cost reduction: Blockchain technology decreases the cost. Normally file keeping/printing incurs a huge cost, where everything is digitized in the proposed approach.Reduced processing time: Traditional process takes 1 - 2 weeks whereas proposed approach requires max 1–2 h.Digital signatures provide a higher level of security than manual document filling (risk of errors and fraud decreases).
Blockchain and the related issues: a review of current research topics
Published in Journal of Management Analytics, 2018
A digital signature is technique used to verify the integrity and the origin of a file or of data. It ensures that the file or the data is not modified. Each slot constructs a hash tree, root hash values are recorded in the blockchain, and multiple file signatures are made. Public key infrastructure (PKI) is one popular technique (Buldas, Laanoja, & Truu, 2017). In PKI systems, users use public-private keys to sign and verify files. PKI requires a trusted CA (certificate authority) for key management. Keyless Signature Infrastructure (KSI) is a blockchain-based keyless signature verification system (Buldas, Laanoja, & Truu, 2014). KSI is a multi-signature system (Aitzhan & Svetinovic, 2016) that allows multiple documents to be signed at a time. The blockchain-based KSI architecture is used for file signing without trusted CAs for key management, making it difficult for attackers to change files and signatures. Hence, KSI can guarantee the integrity and security of files or of data.
Ensemble-based cryptography for soldiers’ health monitoring using mobile ad hoc networks
Published in Automatika, 2023
B. V. V. Siva Prasad, Sridhar Mandapati, Lakshmana Kumar Ramasamy, Rajasekhar Boddu, Pranayanath Reddy, B. Suresh Kumar
A digital signature is a mathematical method used to generate digital codes used to set up the legitimacy of digital messages and documents. These codes are produced and validated through the HmacSHA1 algorithm. The data also the sender’s specifications are checked by affixing the signature to the automatically dispersed document.