You are on page 1of 4

2018 International Conference on Information, Communication, Engineering and Technology (ICICET)

Zeal College of Engineering and Research, Narhe, Pune, India. Aug 29-31, 2018

Review Paper on Untwist Blockchain: A Data


Handling Process of Blockchain Systems
Sachin M. Kolekar Rahul P. More
Department of Computer Engineering, Department of Computer Engineering,
Zeal College of Engineering And Research, Zeal College of Engineering And Research,
Savitribai Phule Pune University, Pune Savitribai Phule Pune University, Pune
sachin.kolekar@zealeducation.com more.rahul@zealeducation.com

Smita S. Bachal Anuradha V. Yenkikar


Department of Computer Engineering, Department of Computer Engineering,
Zeal College of Engineering And Research, Zeal College of Engineering And Research,
Savitribai Phule Pune University, Pune Savitribai Phule Pune University, Pune
smita.bachal@zealeducation.com anuradha.yenkikar@zealeducation.com

Abstract - Blockchain technologies are secure massive II. LITERATURE SURVEY


power in the last few years. Block chains are distributed
ledgers that facilitate parties who do not steady trust each Blockchain has changed many business man, investors
other to maintain a set of ecumenical states. The parties concur life. In this paper authors have precisely described that how
on the easiness, standards and histories of the states. As the bitcoin and blockchains are inter connected with each other.
technology backdrop is enlarge swiftly, it is mutually What actually blockchain is, key technologies, how it works
consequential and arduous to have a rigid grasp of what the using hash values also components of data. Drawback of
foundation technologies have to offer, particularly with current paper is lack of detail data structure[1]. It is
difference to their data dealing out capabilities. In this paper, overcome in paper which mainly focuses on suspicious
we first survey the state of the art, fixating on secretive block activities detected in android phones while transferring the
chains. We analyze both in-engenderment and research bitcoins [2].
systems in four dimensions: disseminated ledger, intrusion
detection, consortium Blockchain, consensus protocol and Consortium blockchain is nothing but association of
perspicacious agreement. We then present BLOCKBENCH, a various blockchain organizations which describes the block
criterion skeleton for understanding performance of private in deep manner. Also, it designed algorithms to detect it and
block chains and public Blockchain. In this chapter we have practical structure of malware detection model. They have
discussed the circumscriptions of Blockchain. also given graph structure survey regarding various malware
families and there false positive and false negative rate,
Keywords- Intrusion, block chain, consortium block chain, Comparison between various malware detection engine.
distributed ledger They created a framework called CB-MDEE to detect
malicious activities going in transactions of bitcoins in
I. INTRODUCTION android[2].Other than these, Blockchain is an algorithm
Blockchain are nothing but a system / technology used which is used in different applications and used for
for secured, inexpensive and fast transaction. Before transaction between two different peers who do not trust
understanding Blockchain, lets discuss about Bitcoin. each[1]. It completely eliminates the third-party intermediary
Bitcoin is a digital currency who allows exchanging some which is normally needed for transaction. Main concept of
value between the peers without any intermediate agent. It blockchain is peer to peer transaction. As for all digital
enables peer to peer transactions by removing trusted applications, it may be possible that the applications using
intermediary. In this type of transaction, it can take place block chain algorithm may get hacked or some intruder
even if the peers do not trust each other. Bitcoin is not a hacks into the application[3]. But due to the intrusion
physical currency instead it is a virtual currency. Bitcoin is detection algorithms created with the blockchain algorithm,
an open source i.e. any end user can access it without hacking this algorithm is much more difficult. Till today, no
knowing the actual technical details of it. It has interactive one has hacked blockchain though many have tried to do so.
and user friendly design. Nobody can own the Bitcoin, also
nobody can controls the Bitcoin. It has many exciting III. TYPES OF BLOCK CHAIN
features that other transactions system does not have .It A. Public Blockchain
works on peer to peer transactions techniques. Bitcoin is a
secure technology. Block chain is a emerging trend in which A public block chain is an open network and anyone can
the chain is formed by dividing chain into different blocks .It join / participate in the network. Also called as permission
is continuously increasing list of records, called blocks. less network .Bitcoin is the largest public block chain
These numbers of distributed blocks is linked and are network today.
secured with the help of the concept known as cryptography. B. Private Blockchain
The chain which is divided into dissimilar blocks, this blocks A private blockchain is a closed network and invitation is
contains a cryptographic mix up with the preceding block required in order to join the network. Also called as
(the block which is connected before current block), also a permission network. Ripple is the best example of the private
timestamp and data transaction between them . block chain network today.

978-1-5386-5510-8/18/$31.00 ©2018 IEEE 1


IV. KEY CONCEPTS VI. PARTS OF BLOCKCHAIN
A. Distributed Ledger A. Block
It is a database apprehended and modernized by every A Block is a group of the data available into a ledger
contestant in a bulky association. It represents how entered into a Blockchain. Data is assembled into a block for
information is stored and gathered. Every single node on a period of time and after a specific period of time; it is
network process every transaction and concludes it with added into the Blockchain. For Example:
some final conclusion. Then, voting is done on those
conclusions to make a mainstream agree with the conclusion. Let’s consider 2 different crypto currencies. Let them be
The disseminated Ledger has been modernized, and all Currency A and Currency B. Now, consider that Currency A
nodes preserve their own indistinguishable copy of the is more popular and expensive and more profitable than
ledger. Currency B for people who are buying them. So, in case of
Currency A, each block may get inserted or may get added in
B. Consensus: 10 seconds time while in other case, that is, in case of
Consensus judgment making is a cluster resolution Currency B, each block may get inserted or may get added in
making process in which group members build up and 10 minutes time.
consent to a final decision which will profit the whole group. All that differs is nothing but number of peers or people
It is a dynamic way of success a decision in a group. involved in the specific cryptocurrency, whether it is
C. Proof of Work Currency A or Currency B.
Miners solve cryptographic puzzles to “pit” a block in B. Chain
order to add to the block chain. Process requires large A chain is a group of blocks that are related together
amount of energy and crunching usage. When a miner solves referencing hashes from the prior block. The hash is a unique
a puzzle, they show their block on network for verification. digital signature created using cryptography, which creates a
D. Proof of Stake link between two subsequent blocks to form a chain.
Hashing is used to ensure a common feature of
Proof of Work is highly inefficient and hugely expensive. cryptocurrency, that is, Security. Hashing is needed to ensure
High amount of energy is consumed in Proof of Work. that the data and transaction is secured. Hashes are useful
Because of this, cost of removal is very high. Proof of Stake because they are a one way function that cannot be
is projected to decrease the expenditure of removal. decrypted. For example: Consider recreation of a human
E. Mining being. It is impossible to recreate a human being same as the
original. It is because that recreation of same fingerprint and
Mining is the process by which communication are
data is not possible. It is similar to Hash. Decryption of Hash
verified and added to the civic ledger. Anyone with
Function is almost impossible. Hence, Blockchain
admittance to the internet and appropriate hardware can take
technology is highly secured.
part in mining. The mining method involves compiling
modern dealings into blocks and trying to solve a Network
computationally tricky problem. The applicant who earliest
solves the puzzle gets to place the subsequent block on the The last part of Blockchain Technology is Network. The
blockchain and claim the prize. Best example for this is the Network consists of the computers or nodes that hosts the
Bitcoin Mining. information entered into the blockchain via transactions.
Afore an ingression is made aeonian in the blockchain, all
V. WORKING OF BLOCKCHAIN nodes verify the transaction. Nodes are computers or systems
operating on a more astronomically immense network.
Blockchain’s decentralized, open & cryptographic
Contrivances such as a personal computer or cell phones can
environment sanction public to belief each other and perform
act as nodes. When defining nodes in the cyber world, a
peer to peer, making the desideratum for intermediaries
node is anything that has an IP address. The nodes consist of
obsolete. This as well transports unique security benefits.
the machines and code used to run the network. Node
Hacking attacks that frequently impact enormously colossal
operators participate in the network by keeping track of the
centralized Peace Corps like banks would be practically
transactions and reaching a consensus about those
infeasible to pull off on the blockchain. Let’s see the
transactions’ validity and injuctively authorizing them with
working of Blockchain with an example:
other nodes in the network. Nodes are always awarded for
x The requested operation is broadcast to P2P network running the protocol with a scintilla of the cryptocurrency
consisting of computer, known as nodes.  associated with the protocol. The more sizably voluminous
and more distributed the network, the more secure the
x Validation – The network of nodes validates the blockchain will be. The more decentralized the Blockchain
operation and the user’s status using known becomes, the more preponderant immutability of its records.
algorithms.  As the network grows, it becomes increasingly more arduous
x A confirmed transaction can involve cryptocurrency, to overthrow the network. For example: Consider a
contracts, proceedings, or other information.  Cryptocurrency designated as “Currency”. So, at the initial
stage, if it’s blockchain has about 100 nodes ecumenically
x Cryptocurrency – It is intermediate of trade, formed distributed then, we may verbalize that it is prodigiously
and stored by electronic means in the blockchain, unsecure Blockchain or network. But, similarly consider that
using encryption techniques to manage the it’s blockchain has about 10 thousand nodes ecumenically
construction of financial units and to authenticate the distributed the, we may verbalize that it is prodigiously
transfer of money.  secured.

2
VII. INTRUSION UNCOVERING SYSTEM IN
BLOCKCHAIN
What is Intrusion uncovering System?
In this growing phase and increasing pace of technology,
the attacks like cyber-crimes, hacking or cracking any
system has increased a lot along with the development speed
of the technology. Hence the cyber threats have increased to
a large scale and even more complicated and advance. Such
attacks which are made by any third party is known as
“Intrusions”. This intrusions should be managed timely, this
is the job performed by the Intrusion Detection System
(IDS). Such systems are used to detect the intrusions
occurring in the system before they attack the whole system.
Now comes the part that at which location the Intrusion
Detection Systems (IDS) should be deployed. Intrusion
Fig. 1. Intrusion Detection System
Detection System can be used for detecting intrusions but
they cannot be made used individually for a whole network.
II. Management of Trust: We know that the people
Hence they are used in a collaborative and combination
working in the companies (insiders) canal so put the system
manner. These are deployed in various locations according
into danger, where the intruder (insiders) are having
to their functioning and abilities.
authorized access to the data. If the organizations increases
On the location to be deployed the IDS are divided into in a large scale, the trust management may become a huge
two categories: issue which degrades the formation of chain.
I. Host-based Intrusion Detection System (HIDS) VIII. LIMITATIONS
II. Network – based Intrusion Detection System (NIDS) Intrusion realization still have many issues which are
remained unsettled in our real-world applications, which
Host – Based Intrusion Detection System (HIDS) :-This may be shame the detection performance of our system.
intrusion detection system is deployed at local level . The
Host IDS monitors the local system and the events occurring Updation and Management: Productivity is essential for
within the system .It also monitors any system events create better efficiency to increase the performance of intrusion
any malicious environment within the host system .Network detection system in the system.
– Based Intrusion Detection System (NIDS):- Network –
Capacity: Size of the block chain must be maintained. It
based IDS are used to monitor the whole network in which
must not be huge in size. If the size is beyond the limit , then
many host systems are connected peer – 2 – peer and this
the performance of the system will deteriorate.
host systems have their own Host – Based Intrusion
Detection System .The job of the Network – Based Intrusion Acceptance and alertness: The major issue is adopting
detection system is to avoid the intrusion attack on the entire the virtual currency system. Hence, awareness must be
network , which may degrade the performance of the created among the people .
network. The NIDS is the primary one to observe the
intrusion, it firstly observes the network whether any Inactivity and convolution: As it is in a distributed and
intrusion is getting inside the network, it detects the intrusion decentralized nature, it may take several time to complete the
and avoids it to attack to the system. If the NIDS fails to transactions.
monitor and detect the intrusion, the HIDS comes into Security and Confidentiality: It requires keen
picture. At this time of period, the HIDS play a vital role in transactions to be connected to correct circumstances.
protecting the system against the intrusion. In this way the
network based intrusion detection system and host based Cyber attackers produces various attacks and thus go
intrusion detection system working in a two-way manner to through attacks like denial-of-service (DDoS)
make the system avoided by the intrusion attack. And Energy and expenditure: Bitcoin requires a large energy
challenge faced in the block chain technology because the margin to calculate the intrusion detection system (IDS).
transactions takes place by sharing of data with various
nodes that are available in peer-to-peer network. Sometimes IX. CONSORTIUM BLOCK CHAIN
in some organization they have some private and Grouping blockchain detects the malicious codes in
confidential data which they do not share with anyone i.e. malware and extracting the analogous verification in mobile
another party . Hence this becomes a problem and complex devices, which is composed of a two elements i.e. the
for the Intrusion Detection System to identify the intrusions detecting grouping chain which is shared by the test
occurring due to incomplete data shared. members and a public chain shared by the users This
malware detection technology is used in reducing the phony-
helpful rate and improving the detecting ability of malware
variants. This is android-based system use for detecting and

3
classifying malware. Addition to this , we found a fact-base Bitcoin has been viewed as the best example for Blockchain
of distributed Android malicious codes by blockchain as it is the first cryptocurrency to bring the blockchain
technology. Basis on untried analysis , it shows that given technology to real.
technology can achieve higher detection accuracy in limited
time with lower sham-helpful and false-negative rates. REFERENCES
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
X. CONCLUSION [2] Q. Lin, P. Chang, G. Chen, B. C. Ooi, K. Tan, and Z. Wang,
We have conducted comprehensive survey on “Towards a non-2pc transaction management in distributed database
systems,” in Proceedings of ACM International Conference on
Blockchain Technology. Blockchain Technology is an Management of Data (SIGMOD), San Francisco, CA, USA, 2016, pp.
budding solution for decentralized communication and data 1659– 1674.
management without the need of a trusted third party. It is an [3] A. Thomson, T. Diamond, S. Weng, K. Ren, P. Shao, and D. J.
open and spread ledger, enabling the recording of contact Abadi, “Calvin: fast distributed transactions for partitioned database
among various parties in a provable way. Basic clarity and systems,” in Proceedings of ACM International Conference on
justification of Blockchain is seen and working of the Management of Data (SIGMOD), Scottsdale, AZ, USA, 2012, pp.1–
12.
Blockchain in decentralized network has been understood.
[4] P. Bailis, A. Fekete, M. J. Franklin, A. Ghodsi, J. M. Hellerstein, and
Also, Combination of Blockchain Technology with Internet I. Stoica, “Coordination avoidance in database systems,” PVLDB,vol.
of Things has been studied. Few Advantages and 8, no. 3, pp. 185–196, 2014.
Disadvantages have been seen and various applications of [5] “Ethereum blockchain app platform,” https://www.ethereum.org/.
Blockchain Technology are stated. Most Importantly, Future [6] Ripple, “Ripple,” https://ripple.com.
of the Blockchain has been predicted if few of the [7] Melonport, “Blockchain software for asset management,”
assumptions comes true, then what are the possible http://melonport.com.
technologies which can be created by blockchain technology. [8] J. Morgan and O. Wyman, “Unlocking economic
Concepts like consensus, distributed ledger, proof of labor, advantage with blockchain. a guide for asset managers.”
proof of stake, etc. have been explained in short. Other than 2016.
the Blockchain concepts, working and future predictions, [9] G. S. Group, “Blockchain: putting theory into practice,” 2016.

You might also like