You are on page 1of 56

Evaluation of Challenge Response Protocols

in Cross Blockchains

Student Name:

Student ID:

1
Abstract

Blockchains are increasingly being used in select areas, including education, artificial
intelligence, healthcare, power chain, and more. the main motive of success is ensured
sequestration and immutability of records. Still with the growing quantum of particular
information, the paradigm of allocated system literacy gains importance, where the model is
recognized on neighboring guests rather interpretive literacy with complete information about
the important garçon.

After the turbulent cases of blockchain development, a large number of different blockchains
emerged with extraordinary features that could be suitable for exact usage situations. due to the
isolation of blockchains and the extreme scale between chains, the transition fees and records of
discussions between modern blockchains are extremely exhausting, and the unstable island
wonder keeps growing. The era of the circulate chain blockchain is unique-letter method to
achieve blockchain coupling and improve blockchain interoperability and scalability. This essay
explores the development and caution of blockchain generation, defines the history and
significance of the move-chain generation, explains the research method of gore-chain
technology, introduces the current generation of move-chain and move-chain systems, analyzes
and compares the above move-chain technology and pass-chain commercial business. Hereafter
Bulletin it further summarizes the problems encountered in the age of access chains and offers
reference answers to discuss the development trends of the web visitor chain era and possibly a
full summary of the contents of a complete manual on the contents and perspectives of visitor
chain generation.

2
Acknowledgment

I would like to thank my instructor XYZ for his remarkable challenge and his help without which
this task might not be feasible now. He constantly encouraged me to do the most fundamental
research, examine a number of articles and provide you with as many ideas as possible. He
usually supported me in all the difficulties I faced throughout the adventure. I express my
deepest gratitude to Mr. XYZ for leading this mission and for providing valuable input and
assistance at a certain stage of this mission.

3
Table of Contents
1. Introduction.........................................................................................................................................6
1.1 Background........................................................................................................................................6
1.2 Problem Statement............................................................................................................................8
1.3 Aim....................................................................................................................................................8
1.4 Objectives..........................................................................................................................................9
1.5 Research Hypothesis/Questions......................................................................................................10
1.6 Potential Impact and Practical Relevance........................................................................................10
1.7 Blockchain Technology Challenges..................................................................................................10
Scalability...........................................................................................................................................10
Loss of Privacy...................................................................................................................................10
Selfish Mining Block chain.................................................................................................................11
2. Literature Review..................................................................................................................................12
2.1 Introduction to Blockchain and Cross-Blockchain Platforms............................................................12
2.2 Challenge Response Protocols: Understanding and Applications....................................................13
2.3 Authentication and Authorization in Cross-Blockchain Platforms...................................................13
2.4 Project Aim and Objectives..............................................................................................................14
Overall Aim........................................................................................................................................14
Specific Objectives.............................................................................................................................14
2.5 Gap Identification in Existing Literature...........................................................................................14
3. Block Chain Technology.....................................................................................................................16
3.1 Smart contract.................................................................................................................................17
3.2 Cryptography for blockchain............................................................................................................17
3.3 Hash Functions................................................................................................................................19
3.4 Blockchain Applications...................................................................................................................21
4. Research Methodology..........................................................................................................................23
4.1 Research Design and Rationale........................................................................................................23
4.2 Data Collection Methods and Sources.............................................................................................24
4.3 Information and Data Sources.........................................................................................................24
5. Data Analysis Procedures......................................................................................................................25

4
5.1 Application Use Case.......................................................................................................................25
5.2 Discussion on Consolidated Paper...................................................................................................29
5.3 Gadget model..................................................................................................................................34
Blockchain..........................................................................................................................................34
Cryptocurrency..................................................................................................................................35
System model....................................................................................................................................35
Draft protocol....................................................................................................................................38
Registration section...........................................................................................................................39
5.4 Moral issues.....................................................................................................................................39
6. Project Schedule: Gantt Chart...............................................................................................................42
Development of Gantt Chart.................................................................................................................42
Scalability...............................................................................................................................................42
Loss of Privacy.......................................................................................................................................42
Selfish Mining........................................................................................................................................43
Description of Key Activities and Time Frames......................................................................................43
6. Implications and Conclusions................................................................................................................45
6.1 Research Contribution.....................................................................................................................45
6.2 Conclusion.......................................................................................................................................45
6.3 Limitations.......................................................................................................................................46
6.4 Future Recommendations...............................................................................................................46
References.................................................................................................................................................47

5
1. Introduction
Blockchain technology is a cutting-edge computing invention. it is a distributed database (or
record) that is stored in multiple locations (using the pall period), generally according to the
specific reality in the community (Michael Crosby, 2016). According to (hood, 2015), the
primary purpose of distributed checks is to store information, the rationale for trades, which
include power rights and data on all movements and events. Blockchain makes it possible to
replace (old) traditional sales methods. For example, the traditional transnational model requires
registries to be stored in an unconnected significant position (Bitcoin, 2019). This "regular" sale
is primarily based on compliance with an authoritative conciliation body. but the generation of
the blockchain allows the "middle man" to be thrown out. the use of a "conciliator" to review,
access and disclose information could actually cause irregular record flows and reduced sales
transparency. information can also end up under the threat of cruel movements (e.g., hacking) or
destructive conditioning (e.g., herbal disasters) (Anwaar Ali, 2019). As a result, this traditional
model is crippled because the use of interposers requires longer processing times and increased
costs (Fraga-Lamas., 2018). Blockchain makes it possible to remake and change previous
fashions and structures.

1.1 Background
Due to its features and capabilities, blockchain technology is currently used in special industries.
the key to blockchain technology is a decentralized structure designed to offer tamper proof,
timestamping and immutable record management. Blockchain is a distributed and decentralized
database that ensures the integrity of information and cannot be changed once registered. the
different technologies used within the blockchain are defined in the same way. In addition it
raised several issues related to the multiple uses of blockchains and the penetration of
blockchains into specialized industries (Monfared, 2016).

Blockchain or go-chain conversation has been proposed as an approach to scalability problems.


In simple phrases, go-chain exchange of words can be described as the transfer of information
between or more comparable or specific types of blockchain. in particular, pass-chain
communication is supported by desires not unusual in batch systems: to access records and to
access capabilities available in exceptional systems. go-chain verbal exchange protocols ensure

6
the success of cross-chain consensus and it exceptionally agrees with assumptions based
normally on the shape of blockchains. cross-chain consensus refers to people's enjoyment of the
blockchain with the state of the remote blockchain. It describes how events associated with the
issuer blockchain balance and communicate with the holiday blockchain to rely on statistics from
the supplier blockchain. security, energy, and atomicity are vital characteristics of the pass-chain
conversation of the communique protocol, and the usability of the pass-chain communique is a
place in need of similar research (Mettler, 2016).

Improvements in blockchain technology have created decentralized structures that enabled the
emergence of several objective blockchain networks. Since each of these networks operates
autonomously, cross-blockchain structures or interoperability are necessary to enable seamless
conversation and interaction between different blockchains (Muhamed Turkanovi´c, 2018).
Exploring the use of design-response protocols in these blockchain transition options makes it so
important. These protocols are necessary to establish the identity of the client or device and to
engage in certain secure transactions. Using these protocols in the go blockchain localization can
significantly improve protection and authentication across exceptional blockchain systems.
Those photos are great because they offer a framework for information about blockchain
interoperability and use employer response protocols there, contributing to the fast-evolving tech
landscape (Christian Gorenflo, 2019).

Due to the complexity, security, and middlemen that have existed within parcel shipping for over
fifty years, blockchain has proven to be a revolutionary technology. A paid ledger current in real-
time across multiple customer servers is viable thanks to the blockchain generation, peer-to-peer
engine. Without the need for government, transactions are completed and authorized through
majority community voting. Are the block stores of the displayed transactions linked using a
cryptographic hash?

Since it appeared in 2008, blockchain structures and consensus procedures have grown in
popularity because of the rise of collaborative programmed in smart cities, such as those dealing
with healthcare and government as a result, it is difficult for software developers to choose the
right platform. moreover, cutting-edge blockchain architectures and consensus protocols did not
match the dreams of a green collaborative decentralized and agile ecosystem. as a result, it
becomes an increasingly important issue to deal with this problem and create new frameworks to

7
align blockchain with those dreams. Our main intention in this document is to help developers
choose the right platform structure and consensus protocol for their applications. subsequently,
we classify system architectures into categories based on the nature of packages in phrases of
different ledgers and interoperability wishes. We talk about the benefits of each class and the
problems associated with them, and begin to provide answers towards a scalable, cost-friendly,
and inexperienced blockchain framework (Brendan McMahan, 2017).

Initially developed to transition to virtual forex, Block chain has developed to support
decentralized applications without the need for intermediaries. With increasing pressure from
collaborative ecosystems for better client offerings and significant amounts of electricity
consumed by the underlying blockchain structure and consensus protocol, blockchain usage will
become more difficult to predict.

Other challenges have been built on distributed packages using the increasing growth of the
commercial market to serve a huge number of clients. A growing commercial enterprise requires
consent and transparency between customers and commercial enterprise carriers. Clients need to
defer to intermediaries to reduce the value of the transaction. The issue of facts communicates
overhead with the growing number of community members additionally makes it impossible to
enjoy the pleasant offer of developed programs. Addressing these power consumption and
scalability issues is regularly offset by security and privacy (Keith Bonawitz, 2019).

1.2 Problem Statement


The security concerns persist to be major concerns despite the rapidly expanding use of
blockchain technology and the growing need for cross-blockchain platforms. The difficulty of
verifying and authorizing transactions across several blockchain networks is one such problem
(Shmatikov, 2015). Although challenge response protocols could provide a solution, not much
study has been done on how to use them in a cross-blockchain setting. The acceptance and
continued development of cross-blockchain platforms may be hampered by this knowledge gap.
Therefore, it is essential to comprehend how challenge response protocols might be used in
cross-blockchain situations to support safe transactions. This study aims to go further into this
topic.

8
1.3 Aim
In the context of cross-blockchain platforms, the main objective of this research is to evaluate the
applicability and efficacy of challenge response protocols. The goals that direct the pursuit of
this aim are to:

1. Examine the state of challenge response protocols and their uses;


2. Examine the necessity of and the function of authentication and authorization in cross-
blockchain platforms;
3. Analyze the potential advantages and disadvantages of implementing challenge response
protocols in cross-blockchain settings;
4. Develop recommendations on how challenge response protocols could be optimized for
use in cross-blockchain environments.
5. Discuss the historical development of the structures and consensus protocols used by
blockchain platforms.
6. Various current and future block chain applications are discussed, and the platforms and
consensus methods are categorized under overarching architectural frameworks.
7. 7 Assist programmers in making informed decisions about platform architecture.
8. Apply thorough taxonomies to the present literature on blockchain architecture and
consensus protocols, and discuss the problems and solutions that have been proposed.
9. 9 Make use of the taxonomies to direct ongoing and future studies in the area.
1.4 Objectives
1. First, we provide an overview of the various block chain layers and how they carry out
transactions and gather information, which are features shared by all block chain designs.
2. We provide documentation detailing the scalability of each design and contracted
security measure.
3. We develop a classification scheme for the sole consensus protocols found in block chain
literature, and we rate these schemes.
4. We discuss the current and future uses of block chain technology in a wide range of
industries, including the sciences, finance, education, manufacturing and retail, media,
real estate, transportation, government, authorship, and digital content ownership and
administration.

9
5. We analyze the block chain’s specific difficulties and the suggested solutions to those
problems from a critical perspective.
6. We offer principles for the creation of a block chain that is both scalable and energy
efficient, filling the gap between the current block chain architecture and consensus
procedures and the supply of developing packages.
1.5 Research Hypothesis/Questions
The following inquiries will serve as the basis for this study:

1. What are the essential components of challenge response protocols, and how are they
now used?
2. How can cross-blockchain platforms address the need for authentication and
authorization?
3. What possible effects may challenge response methods in cross-blockchain contexts?
In answer to these inquiries, the study postulates that, despite possible difficulties, the efficient
implementation of challenge response protocols inside cross-blockchain platforms might
considerably increase the security and effectiveness of these platforms.

1.6 Potential Impact and Practical Relevance


The results of this study may have a big influence on how cross-blockchain platforms are used
and developed in the future. The research may provide helpful information for blockchain
technology developers, decision-makers, and stakeholders by illuminating how challenge
response protocols may be used in certain circumstances. Furthermore, improving blockchain
system security controls, minimizing fraud, and allowing a more effective and resilient digital
economy are all practical applications of the study. In essence, the study's findings may add to
the body of information required to promote innovation in blockchain technology and the
creation of cross-blockchain platforms.

Challenges of Blockchain

10
Even though Blockchain Technology
has numerous potential in it there are
certain
challenges that limit the application of
blockchain on a wider range. Few
major
challenges can be as follows.
Challenges of Blockchain
Even though Blockchain Technology
has numerous potential in it there are
certain
challenges that limit the application of
blockchain on a wider range. Few
major
challenges can be as follows.
Challenges of BlockchainEven though Blockchain Technology has numerous potential in it there are
certainchallenges that limit the application of blockchain on a wider range. Few majorchallenges can be as follows.
1.7 Blockchain Technology Challenges

Scalability
Since the number of transactions is constantly growing, the size and volume of the lock chain are
also constantly growing. Each node is responsible for aggregating block chain activity and

11
verifying that it is legitimate. In addition, block chain limits the rate of transactions to 7 per
second due to its restrictions on block size and the time it takes to publish blocks.

Loss of Privacy
To protect users' anonymity, block chain relies on a public-key cryptography method embedded
within transactional data. However, block chain cannot guarantee transactional anonymity due to
the public nature of transaction IDs and cryptographic key balances. This means that the user can
be identified by looking at their purchase history.

Selfish Mining Block chain


In "Selfish Mining," an overly ambitious miner hoards his blocks instead than sharing them with
the network. It would only be made public under certain circumstances. All other miners would
agree that these privately mined chains are longer than the publicly available chain. Thus, sincere
miners would have squandered their resources on a useless chain. This could lead to increased
incentives for egocentric miners.

12
2. Literature Review
2.1 Introduction to Blockchain and Cross-Blockchain Platforms
Blockchain technology has sparked a revolution in a variety of industries since it was initially
introduced with the creation of Bitcoin in 2008 (Briland Hitaj, 2017). Blockchain's impact has
gone well beyond its original use in cryptocurrencies since it offers a safe, open, and
decentralized way to carry out transactions and store data. Its disruptive influence is apparent in
the many sectors that have adopted it, from supply chain management to healthcare and finance
(T. Ahram, 2017).

Blockchain's reliable and tamper-resistant architecture is its primary selling point. Blockchain
functions as a distributed ledger in which transactions are categorized into blocks, each of which
is linked to the block before it in a chronological chain. This framework assures data integrity
and traceability, resulting in a trustworthy digital environment, when combined with
cryptographic methods. Additionally, since it is decentralized, there is no need for middlemen,
creating previously unimaginable opportunities for peer-to-peer connections (V. Buterin, 2016).

As the usage of blockchain grew, other unique blockchains were developed, each suited to
certain use cases. For instance, whereas Ripple concentrated on streamlining international
payments, Ethereum introduced the idea of smart contracts. However, the emergence of these
many, separate blockchains resulted in the development of isolated ecosystems that were unable
to connect or interact with one another. The potential advantages that blockchain technology may
bring about were severely constrained by this lack of interoperability (Cosmos, 2022).

The idea of cross-blockchain platforms was developed to solve this. These platforms strive to
create communication links across multiple blockchains, making it easier for data and
transactions to move between networks with ease. In essence, cross-blockchain platforms seek to

13
provide a unified blockchain ecosystem in which several blockchains may survive and
communicate with one another (Delice, 2010).

Cross-blockchain platforms have a lot of promise for solving problems with the blockchain
ecosystem's scalability, effectiveness, and adaptability. However, they also bring along other
difficulties and worries, particularly in terms of security. The authentication and authorization of
transactions is one of the key areas. It is challenging to protect these operations in a cross-
blockchain setting, thus creative solutions are required. This emphasizes the need of researching
methods like challenge-response protocols, which may be able to provide reliable answers to
these security issues. In order to provide fresh perspectives on the developing topic of cross-
blockchain platforms, this research will look into these areas (L. Deng, 2018).

2.2 Challenge Response Protocols: Understanding and Applications


Digital systems often use challenge response protocols, which authenticate users or devices
depending on their capacity to offer the right answer to a challenge (P. T. Duy, 2020). These
procedures provide an additional degree of security by confirming that the party on the other end
is indeed who it claims to be. These protocols are used in a wide range of digital contexts,
including secure ATM transactions and password verification on computers (Goes, 2020). They
may play a big part in the world of blockchain and cross-blockchain platforms.

These systems may validate and authenticate transactions across many blockchains by using
challenge response protocols, preserving the accuracy and dependability of the data and
transactions. Despite the potential advantages, the use of these protocols in cross-blockchain
situations has not been fully investigated, needing further study to determine their practicality
and efficiency in such circumstances.

2.3 Authentication and Authorization in Cross-Blockchain Platforms


Authentication and permission on cross-blockchain systems are essential to maintaining the
security and integrity of transactions. The identities of the entities taking part in transactions are
verified by authentication (Romanovs, 2018). Cryptographic keys act as distinctive identities for
authentication purposes in the blockchain ecosystem (Peruma, 2021). Authorization, on the other
hand, has to do with providing access permissions to verified organizations (D. Khan, 2021). For
instance, a blockchain network may provide permission to an authenticated user to start
transactions or edit certain records in the ledger.

14
Notably, using these ideas in cross-blockchain systems presents particular difficulties. For
instance, because to the variety in their architecture, security protocols, and consensus methods,
the interoperability across various blockchains may make the process of authentication and
authorization more difficult (S. Lin, 2021). A challenge to guaranteeing efficient and reliable
transaction authorization is the interoperability of security mechanisms across different
blockchains.

2.4 Project Aim and Objectives

Overall Aim
This project's main goal is to assess the function and performance of challenge-response
protocols in the context of authentication and authorization across blockchain platforms. By
filling in the gaps in the current literature, this study seeks to provide more in-depth insights into
the application of these protocols in the developing area of cross-blockchain technology while
also looking into prospective strategies for boosting security precautions in cross-blockchain
transactions.

Specific Objectives
2 Discover the basis, benefits, and possible drawbacks of challenge-response protocols as they
relate to authentication and authorization. This will include going through the current
literature and examples of how these protocols have been used in different contexts, with an
emphasis on blockchain technology.
3 Determine how authentication and permission are presently handled across various
blockchains, as well as the difficulty of cross-blockchain interoperability, by analyzing
existing cross-blockchain platform practices.
4 Evaluate the viability and possibility for implementation of challenge-response protocols in
cross-blockchain platforms by comparing the needs of cross-blockchain operations with the
capabilities of these protocols.
5 Enhance current security measures in cross-blockchain platforms: The study will try to
provide a framework or changes to present practices that integrate challenge-response
protocols for better authentication and authorization based on the evaluation.

15
6 Determine the larger significance of this study's results for the blockchain technology
ecosystem, particularly with relation to security, effectiveness, and confidence in cross-
blockchain transactions.
2.5 Gap Identification in Existing Literature
The convergence of these topics is yet unexplored despite substantial study on cross-blockchain
platforms and challenge response protocols. Few researches have looked at how challenge
response protocols may be utilized to improve authentication and authorization in cross-
blockchain systems, even though several studies have emphasized the significance of these
features (D. S. D. D. P. A. Merlinda, 2019). Due to the vacuum in the current literature created
by this paucity of study, in-depth investigations on the use and efficacy of challenge response
methods for authentication and authorization across blockchain systems are required.

To overcome these barriers, this study defines the features of the components involved in cross-
blockchain integration and suggests a new paradigm for making design decisions that takes into
account the security implications of every particular integration scenario. Following is a synopsis
of the paper's most significant findings:

 To offer a general integration system model, it is necessary to first identify and outline
the characteristics and problems of cross-blockchain integration.
 Construct a decision framework for cross-block chain integration design that accurately
detects the features of various use cases.
 Formulate and examine a number of use-cases for integrating block chains from different
networks using the suggested architecture.
 Examine and contrast the numerous cross-block chain integration scenarios with respect
to their underlying security assumptions.
New lines of inquiry into the safe integration of block chain networks will be made possible by
the findings of this study.

16
3. Block Chain Technology
In the 1980s and early 1990s, simple blockchain ideas began to take shape. In 2008, the
pseudonymous writer Satoshi Nakamoto, in an article titled Bitcoin: A Peer-to-Peer Digital Fee
System, defined how these cutting-edge ideas could be transferred to the realm of digital foreign
money. The ideas outlined by Nakamoto in his paper were implemented later in 2009 and the
Bitcoin blockchain network for the currency was released. The blockchain era turned into the
first used for Bitcoin. Bitcoin turned out to be

Times more popular than other e-cash systems in a particularly short period of time. The
numerous blessings of blockchain and the burgeoning reputation of Bitcoin have led to its
adoption through many exclusive companies. Blockchain is a decentralized accounting device.
Blockchain at its most efficient is a distributed and decentralized database that ensures the
integrity and correctness of information. because blockchains are decentralized and operate on a
peer-to-peer basis, there is no need for a trusted 1/3 party and the associated security risks.
Blockchain is thus referred to as because it organizes records by grouping them into blocks, each
block containing a connection to the previous one. In a blockchain, assets are regularly recorded
in a public ledger that anyone can gain access to. Information loss is prevented and immutability
is ended because the ledger and blocks are duplicated on all nodes inside the P2P network. facts
are confirmed, put into blocks, and the integrity of nodes is maintained through the use of many
consensus techniques in blockchain technology. Blockchains use smart contracts to streamline
transactions and delay the need for a trusted 1/3 party.

Cryptography, arithmetic, networking and the concept of the "sharing economy"; these are just a
few of the various tools that underlie this jargon. Below we briefly review some of the key

17
elements of blockchain generation (B. N. Musungate, 2019). Block shape the block type, block
arrival time, hash of the previous block, Merkle Root (the root hash of the Merkle tree calculated
from the hashes of all transactions inside the block block) and the nonce (specific to each block)
are inside the block header, even if the body contains the actual transactions. information or
transactions are stored inside the framework as a Merkle tree that uses a binary hash tree to
organize statistics or transactions over the years. The block hash is calculated using a
cryptographic encryption technique that takes as input the hash of the previous block and the
facts of the modern block. Since changing one block requires changing all subsequent blocks for
consistency, blockchains are immutable (Nyirenda, 2008). Merkle bushes, in which information
is stored, allow for convenient verification of records or the correctness of transactions. The
block immediately before a particular block in this series is called a distinguishing block. A
genesis block, in contrast, is the first block and does not descend from any other blocks.

3.1 Smart contract


Aside from providing a decentralized, immutable record of all the various events that have
occurred, block chain also permits the creation of very objective computer code that specifies
how a process will be managed and the actions that will be taken in the event in question—a
feature known as the smart contract. The Ethereum smart contract was designed in part to
overcome Bitcoin's restrictions. The concept of a "smart contract" refers to a piece of computer
code designed to react to predetermined events. It is not necessary for there to be two or more
parties involved for the smart contract to be binding (W. Ou, 2022).

Chain code, or smart contracts, let users to include 

 Logic and choice nodes into their block chain-based exchanges and operations.
 Use technology to streamline financial dealings and check that everyone is on the same
page.
 Utilize a distributed ledger.
Enterprise block chain applications hinge on the smart contract, which will radically alter the
way business is conducted. Smart contracts can be made by anybody, eliminating the need for
middlemen. Smart contracts offer flexibility, independence, precision, and savings.

18
3.2 Cryptography for blockchain
Block chain facilitates secure and trusted records and transactions by establishing a layer of trust
between previously distrustful parties. A trusted third-party intermediary is required when block
chain technology is not used to create records and transactions. Since block chain uses
encryption and collaborative effort to create trust, it eliminates the need for an intermediary.
Block chain uses cryptography to secure the data it stores on its distributed ledger (I. A. Qasse,
2019).

The following are some of the cryptographic building blocks utilized by block chain:

1. Digital signatures and encryption using a public key cryptosystem.


2. Second, a zero-knowledge proof shows that you know something without actually saying
what it is.
3. Third, hash functions are unidirectional pseudo-random mathematical operations. The
hash function is now used as part of the block header in Merkle trees.
4. Public key cryptography is used to verify the identity of the individual who initiated a
transaction. In block chain, the private key is stored in a digital wallet, which can be a
dedicated hardware device for storing private keys or any number of software wallets
designed for different platforms. Digital signatures include a user using their private key
to sign a message before sending it to the block chain, and their public key to verify that
the message originated from that user.

Figure 1:  Digital signature and hash used in blockchain transactions.

19
A virtual signature verifies the authenticity of a transaction on an account, which most
effectively requires the owner to have a private key. Primarily based on each consumer's private
key, this approach enables digital signatures for all transactions. A combination of public key
and private key paperwork is the foundation of blockchain and is used to signal and verify user-
generated transactions.

Transaction and block virtual signatures are used by each Ethereum and Hyper Ledger material
to verify the authenticity of the signer and the integrity of the signed records. The Elliptic Curve
Digital Signature Algorithm (ECDSA) is generally used to generate strong public and private
keys.

Since the verification of digital signatures requires know-how of the person's public key, it is
possible to use the public key to identify the user. it's far a blockchain tool for dealing with
people's ID without revealing their non-public facts (Robinson, 2021).

Evidence that does not require additional information to detain. Below is one of the most
common cases that uses zero information proofs in blockchain technology. Before executing a
transaction in which one consumer sends funds to another, the blockchain wants to confirm that
the sending user has access to the requested funds. However, the blockchain has no hobbies in
this, nor does it want to recognize who is buying or how much money the buyer really has. in
this scenario, the blockchain absolutely ignores the sender and recipient.

Some blockchains use the cryptographic idea of zero-information proof to protect user
anonymity. at the same time that 0-knowledge proofs are not yet supported on Ethereum, snarks,
a special type of zero-knowledge proofs, have been added to the Ethereum roadmap.

3.3 Hash Functions


The block chain system relies heavily on hash functions. In cryptography, a hash function is a
mathematical equation that possesses five useful features.

1. Fixed size:
 Hash functions can generate a fixed-size output from any input. This allows for any topic to be
reduced to a fixed-size data item. Therefore, hash functions are used in block chains to compress
messages for use as digital signatures.

2. Preimage resistance:

20
 It's simple to determine a hash value from a given input. It is technically impossible to
reconstruct the original input from the hash value alone. In fact, the only method to do so is to
feed the data into the hash function randomly and repeat the process until identical results are
obtained.

3. 2nd preimage resistance:
Given one input and its corresponding hash value, it is computationally infeasible to determine
the second input that yields the identical hash value.

4. Collision resistance:
It is computationally impossible to find two inputs that will provide the same hash value.

5. Big change:
The hash value will change drastically if even a single bit of the input is altered.

The cryptographic hash function (shown in Figure) allows for the linking of all blocks on the
blockchain. Block i-1 contains the hash of Block i-2's header, Block i contains the hash of Block
i-1's header, Block i contains the hash of Block i, Block i+1 contains the hash of Block i, and so
on.

21
Figure 2: Block chain connection structure and a Merkle tree with hash function.

Multiple deals can be made within a single block. Each transaction in a block chain is hashed
using a Merkle Root, which is recorded in the block header, and a Merkle Tee, which is shown at
the bottom of the picture. An immutable, secure, and highly reliable distributed ledger is what
block chain technology produces in this fashion. Regardless of the extent to which a change was
made to a given block, the change would be promptly detected, and the block's connection to
succeeding blocks would be severed (E. Scheid, 2019).

Location: P2PKH. Bit coin pay to public key hash (P2PKH) addresses make use of
cryptographic hash functions in addition to the block chain connection structure, Merkle Tree,
and Pow mining algorithm discussed in the previous session. The P2PKH address used by
Bitcoin users to transmit and receive funds is generated using hash functions and public key
cryptography. The one-way function makes it difficult to derive the public key and private key
from an address.

22
Figure 3:  Public key cryptography and hash function for Bitcoin address.

A key's length remains constant. A private key takes up 32 bytes, while a public key takes up 65
bytes (or 33 bytes compressed) of storage space. P2PKH addresses are 20 bytes in length.

3.4 Blockchain Applications


Crypto currency, finance (stock exchange, investment services, P2P financial market, crowd
funding, etc.), IoT (safety and privacy, e-business, etc.), reputation system (web community,
academics, etc.), safety and confidentiality (security enhancement, management of risks, privacy
protection, etc.), healthcare, insurance, protection of copyright, energy, society applications
(block chain music, block chain government), and so on are all listed as possible uses for block
chain technology. The exponential growth of block chain’s potential uses is depicted in this
figure. More and more applications for block chain technology are likely to appear in the near
future

Figure 4: Block chain applications.

23
Subsequent workshops will focus on crypto currencies as an early use case, the supply chain as a
common example, and Smart Dubai Office as the first comprehensive government service
application.

24
4. Research Methodology
4.1 Research Design and Rationale
The study will use a mixed-methodologies approach, which combines the advantages of
qualitative and quantitative research methods to provide a thorough grasp of the subject. The
complexity of the research topic is the justification for using a mixed-methods design, as
quantitative data may provide insights on prevalence, correlations, or patterns, while qualitative
data can deepen our understanding of contextual nuances.

In order to provide a thorough grasp of blockchain technology, cross-blockchain platforms,


challenge-response protocols, and their existing implementations in authentication and
authorization, the study will first apply a systematic literature review. The study in this area will
consult a variety of sources, including academic publications, case studies, and business reports.

The possibility for using challenge-response protocols inside cross-blockchain platforms will
next be examined via comparative analysis, and a framework or adjustments to present
procedures will be designed.

To verify the suggested solution and assess its efficacy, scenario analysis or simulation testing
will also be used in the study. The balance of theoretical and practical viewpoints on the research
subject is made possible by the tripartite structure.

25
4.2 Data Collection Methods and Sources
The process of gathering data will include both primary and secondary sources. The suggested
solution will be tested and validated in a controlled setting or on a simulated cross-blockchain
platform to gather primary data.

The research's background and theoretical underpinnings will be provided through secondary
data drawn from a systematic study of academic literature, business reports, white papers, and
internet databases. In order to ensure the reliability and academic value of the cited sources, this
evaluation will be undertaken utilizing academic databases including Google Scholar, IEEE
Xplore, and ScienceDirect.

Quantitative information will be gathered from these sources for the comparison study, such as
success rates of various authentication and authorization techniques, transaction timings, and
security breach occurrences.

To better understand the context, advantages, and constraints of challenge-response protocols


and their potential use in cross-blockchain platforms, qualitative data, including expert
perspectives, case studies, and theoretical discourses, will be analyzed.

The study attempts to guarantee the robustness and validity of the results via the use of various
data gathering techniques, addressing the goals from all angles.

4.3 Information and Data Sources


After extensive deliberation amongst the study team members based on the literature studied, the
relevant information and data sources were chosen. Since the key problem of scalability in public
block chains is being investigated here, we have drawn heavily from scholarly publications and
conference papers in the field of computer science to conduct our SLR analysis. Major and
specialized databases in computer science and other fields are among those queried. The
following websites provided the articles used in this study. These databases, which include the
ISI and Scopus indexes, provide comprehensive coverage of high-quality articles in our field.

 Research Direct
 IEEE Xplore
 Scholar
 Academic Research Network

26
5. Data Analysis Procedures
The data acquired for this study will be analyzed using both quantitative and qualitative
approaches. Quantitative data will be evaluated using statistical tools like SPSS and Python's
Pandas libraries in order to compare different challenge-response protocols in cross-blockchain
situations (Staf, 2021). Further statistical analysis may also be performed using Python's SciPy
and NumPy packages. various analyses will provide information on the effectiveness, efficiency,
and possible benefits or drawbacks of various methods.

On the other hand, theme analysis using NVivo software will be used to examine qualitative
data. To better comprehend the contextual concerns and complexity involved in the
implementation of challenge-response protocols in cross-blockchain platforms, this technique
calls for classifying the data and recognizing patterns or themes within it (H. Tam Vo, 2018).
This will make it easier to see how the suggested remedy would really affect and have effects in
the real world.

Data from the testing and validation stages will also be analyzed using performance metrics
including response times, authentication success rates, and failure rates. We want to employ
certain testing hardware and software for these jobs, such as Selenium for automated testing and
JMeter for load testing. Depending on the kind of data being handled, solutions like MySQL or
MongoDB might be used for database administration and querying.

Tools for data visualization in Python, such as Matplotlib and Seaborn, can help the analysis
even more. We may utilize Jupiter notebooks, which offer a collaborative platform for managing
the entire data analysis process through the creation and sharing of documents that incorporate
live code, mathematics, visualizations, and narrative prose.

All of these approaches and tools will provide a thorough framework for comprehending and
assessing the value and practicality of the suggested solution.

5.1 Application Use Case


The use cases for challenge-response protocols are vast. In this piece, we present and create a
group chat application. Only those people who have added their public key to the block chain
can use the chat application. Anyone with access to the chat programmed can contribute to the
group conversation by sending messages through the interface. All of the subscribers to the

27
group chat will receive the messages. The user is free to send as many or as few messages as
they like and log out of the conversation at any moment. However, their conversations in the
group chat will remain there. Therefore, the user will be able to view the messages that were
posted in the previous session if he or she logs back in a short while after logging out. A page
with an error message will be shown to the user if the authentication attempt fails.

Implementation

Figure 1 depicts a possible processing flow diagram for the application. We built it such that
users may interact with the Ballerina service via a web browser and the Ethereum block chain.
There is a web server component to Ballerina service. The user is taken to the Ballerina chat
application's user login page (Figure 1) whenever he tries to do so.

Figure 5: The signup screen for the blockchain-based messaging service

When the User Login page loads, the user enters their email address and private key into the
appropriate fields, and the browser communicates with the Ballerina service on their behalf.
Figure 2 depicts the process's sequence diagram.

28
Figure 6: the challenge-response protocol of the messaging app works

It is important to keep in mind that the user's private key is never transmitted outside the browser
and is solely used by the browser's native JavaScript-based encryption methods.

29
When a user enters their email address, the Ballerina service retrieves the public key from the
block chain using the email address as a hash. The Listing 1 Smart Contract is used to
permanently record the user's public key hash in the distributed ledger.

The pragma solidity 0.4.22 user public key hash storage and retrieval smart contract;

contract registry {string private miyurudatwso2dotcomHash;

string private isurupatwso2dotcomHash;

string private nadheeshatwso2dotcomHash;

function setmiyurudatwso2dotcom (string x) {

public {miyurudatwso2dotcomHash = x;

function getmiyurudatwso2dotcom () public view returns (string) {

return miyurudatwso2dotcomHash;

function

set get isurupatwso2dotcom (string x) public {

isurupatwso2dotcomHash = x;

function getisurupatwso2dotcom () public view returns (string) {

return isurupatwso2dotcomHash;

function setnadheeshatwso2dotcom (string x) public {

nadheeshatwso2dotcomHash = x;

30
function getnadheeshatwso2dotcom () public view returns (string) {

return nadheeshatwso2dotcomHash;

We took the IDE-compiled smart contract and the resulting JavaScript app and put them both
into production on the Ethereum block chain. Next, we use the smart contract's setter operations
to permanently record the public keys' SHA-1 hashes in the block chain. The getter operations
allow access to these hash values. For the sake of argument, let's say that SHA-1 is just like a
"random oracle" that gives out random numbers with the stipulation that if it gives out output A
for input B once, it must always give out output A for input B going forward.

After the user enters their email address and hits the login pages submit button, the Ballerina
service utilizes that information to retrieve the public key's hash values via the matching getter
action.

5.2 Discussion on Consolidated Paper


Here, we'll talk about how those 121 papers, published between 2011 and 2019, were analyzed.
It sheds light on the current state of knowledge about the scalability problem in public block
chains and the methods that have been developed to address it. Topics that will be covered
include

a. Time series analysis of the publishing frequency of articles on the scalability of block
chain-based systems.
b. The breakdown of block chain-published content kinds.
c. The breakdown of where books are sold.
d. A map of where block chain is most useful.
The demographic data for the aforementioned publishing years was properly compiled, and the
data gathered throughout the data extraction process was properly collated, so that the research
questions could be answered.

31
The figure depicts an evaluation of the chosen papers by year. Over time, we have seen a rise in
the amount of scholarly articles exploring the topic of public block chain scalability. It is worth
noting that the vast bulk of scalability-related studies on public block chains were conducted in
2019 and 2020.

Figure 7:  Illustrates the year wise distribution of published paper in the blockchain
domain.

Something was done in the way of block chain research until 2015, likely because the technology
needed some time to acquire traction following bitcoin's 2008 debut. In 2016, study on the
scalability of block chains, particularly public block chains, emerged.

In 2016, there were just 10 articles published about scalability; this number has increased to
nearly 60 by the end of 2019. Over the course of several years, block chain started to disrupt
more and more widespread applications. Therefore, it is only natural for researchers to begin
working on the urgent scalability problem in public block chains.

This SLR's chosen articles' publication information is displayed in Figure below. The following
categories of scholarly works were considered (and catalogued) for this investigation.

32
Figure 8:  shows how to analyses specific types of papers in the blockchain space.

Journals;

 Conference proceedings;
 Book chapters;
 Workshops;
 Symposiums.
According to the results, the majority of articles on the topic of public block chain scalability can
be found in journals and conference proceedings (54 papers out of 121 articles). Twenty more
pieces were found in book chapters, eight more in a symposium, and six more in workshops.

The figure below presents data on the dispersion of the chosen papers across the world. The
United States ranks second with 13 papers (published in academia or industries), behind China's
24 articles. In addition, India ranks fourth overall with eight papers, behind only the United
Kingdom (8), Switzerland (7), and Australia (7). Only seven nations have published more than
five books. All the remainder have a score of five or lower. The global nature of the research
community's interest in block chain scalability is reflected in this research.

33
Figure 9: Illustrate the analysis of geographic distribution of selected paper in the
blockchain domain.

Bitcoin popularized block chain technology in 2008, and it has since found applications in a
variety of fields. Block chain is being heralded as the technology that will shake up the IT
industry. However, aside from the crypto currency industry, it has not yet experienced significant
growth or disruption. Public block chain applications outside of crypto currency are depicted in
the figure. Our SLR identifies Bitcoin and Ethereum as the most cutting-edge use cases for
public block chain technology. There have been 17 articles published on the topic of block
chain's potential uses outside of crypto currencies. Our research also showed that despite block
chain's apparent usefulness for Internet of Things applications, it has not yet achieved the desired
objectives due to scalability problems. Many other sectors, including banking, resource
management, healthcare, education, and agriculture, appeared to be affected by and disrupted by
block chain.

34
Figure 10: Block chain application domain per selected papers.

Every single one of these papers highlights the importance of scalability in public block chains.
These articles illustrated the reality that block chain technology, whether used for crypto
currencies or some other purposes, has not yet achieved "scale-up" on par with the centralized
infrastructure. The inability to scale publicly available block chains is widely acknowledged as a
major bottleneck for block chain-related applications.

Using the collected evidence from the analyzed literature, the scalability problem will be
discussed below. This is to explain why scalability matters for the three most popular public
block chain-related applications (Bitcoin, Ethereum, and the Internet of Things).

35
5.3 Gadget model
In satellite television, computer conversation is an essential part of communication between
terrestrial customers and satellites. With the constant movement of satellites, it is necessary to
frequently switch connections between customers and unique satellites. Before the satellite can
serve the user, the identification of the user should be tested. the speed and accuracy of user
identity verification will affect the user experience and satellite TV to protect the computer. in
this document, we deal with the location of the route, how correctly and how the user
identification verification of the use of satellites should take place. in this segment, we introduce
the historical past and system model of our blockchain-based authentication scheme in LEO
Satellite TV for PC networks.

Blockchain
Blockchain is a distributed database device with multiple peer nodes. It is also a paid ledger
maintained through all friends in the network, with each node maintaining a complete replica of
the chain. Its main advantages are setting a consensus between nodes, stopping the manipulation
or falsification of information and ensuring the reliability of statistics. During system operation,
all transactions are open, obvious and traceable. In blockchain, records are encapsulated in
blocks each block has a block header containing the hash of the previous block and a block
frame containing the facts of the transaction, and all blocks are connected in a row structure.
Blockchain technology has many advantages. For example, when inserting information, the
block should bypass node approval before connecting. All community contributors can confirm
the correctness of the information using specific calculations. Each collaborator's account is
constant across the network. Any node can report statistics about the chain through agreed rules.
User facts can be stored under the name apart from your actual call. Suciu et al. compared
blockchain to IOTA, which is an allocated database. Blockchain makes it possible to create a
system as a sequence of facts that cannot be changed. In entanglement, each new transaction
should enable two larger transactions. In our protocol, satellite TV for PC nodes are alternately
considered, and the blockchain will now not be forked. So, it is miles preferable to store
information in the form of a single string. these capabilities are more applicable to the garage
basics of cryptocurrency transactions. We use blockchain era to run BAPC. The kind of
blockchain we use is a consortium blockchain. A blockchain consortium specifies some pre-
selected nodes as accountants. Compared to the public blockchain, the consortium blockchain
36
has lower complexity, a simpler set of consensus rules, and less aid receipt. Additionally, in a
satellite network shared by several different authorities, blockchain generation enables pleasant
cooperation between several authorities (R.-V. Tkachuk, 2022).

Cryptocurrency
Cryptocurrency is a medium of exchange that uses cryptography to secure transactions.
Cryptocurrencies are a form of virtual currency. In addition, the cryptocurrency is based on the
blockchain era, which is a blockchain tool. Cryptocurrencies can be a limitless way to provide
people with monetary products and also bodily purchasing power. In other words,
cryptocurrency is finance for the internet, a programmable currency that anyone can easily send
and receive on the network. Bitcoin, historically the most famous cryptocurrency, became the
first decentralized cryptocurrency in 2009. Cryptocurrencies are primarily based on decentralized
consensus mechanisms, not like banking and currency structures that depend on centralized
regulatory systems. at the same time, cryptocurrency emerged as a brand new completely virtual
economic system based on blockchain.

System model
We use a blockchain network that is jointly maintained and seeded across each node on the
satellite network machine, and each satellite node has an identical record. The type of blockchain
we are using is a blockchain institute and we are introducing cryptocurrency to the network. We
assume that there is no conflict of interest between all satellites and that the satellites offer the
same services to guests. As shown in Figure, the boundary satellite bumps on the same route are
divided into the same area within the network topology. While it acquires a personal sale, the
satellite node briefly stores it in the neighborhood cache to broadcast it directly down. While the
mining group benefits from being suitable to keep sums, the bumps within the group form a
block. Inside the block generation method, each node verifies the sale in a nearby cache pool and
also the bumps at each end of the area shoot data to the master node in the middle of the position,
which includes the effectively confirmed sale and calculated root hash (N. Wu, 2018).

Later, the grab node integrates all bids and publishes the block. The account is set up later in the
contract. All mining pools spawn blocks and broadcast them sequentially. It is analogous to the
way the leaders in the RAFT deal algorithm take turns dealing with the indebted plutocrat. The

37
RAFT ruleset has three lands: Leader, Seeker, and Follower. Followers nominate leaders through
an electoral system. The leader is responsible for delivering all messages to shared followers
within the community. The order of the block products in each part of the sphere is arbitrary. We
no longer use the incentivizing medium and the humps no longer want to consume new
computing power to fight for the right to the account. Each new block can be generated
sequentially so that the e-book can be accompanied.

Figure 11: System model

To increase the speed and security of authentication, we propose a full authentication system
based on cryptocurrencies. As shown in parent 2, the authentication procedure is divided into 3
situations. At the registration position, the consumer requests the verification center to purchase

38
cryptocurrency. After confirming the stoner's identification records and predicting that the stoner
will pay correctly, the authentication center will transfer the corresponding amount of
cryptocurrency from the authenticator to the person's coffers. Also, the authentication center will
send the sale to the satellite node and the satellite TV PC node will store the sale in the
blockchain. in the pre-verification section, a person requests a computer satellite tv node to buy
offers. The satellite reveals the consumer's gesture on the blockchain in accordance with the
statistics of the person's request. However, a sale entered through a person is stored in the
blockchain after which the delivery person can be delivered if there is sufficient stability inside
the agreement with the brick-and-mortar merchant. inside the authentication switch member, one
has to go to any other satellite tv for pc and ask for identification verification from the satellite tv
for pc. Satellite examines the sale entered through the consumer when it covers the carrier on the
blockchain. However, the satellite continues to provide offers as long as the sale is legal. through
below 3 step authentication system using crypto currency generation we can get fast
authentication with conversion.

Figure 12

39
Draft protocol
At this stage we can introduce our authentication protocol based primarily on blockchain using
cryptocurrency technology (BAPC). In BAPC, we support three authentication situations:
enrollment phase, pre-authentication member, and authentication switching member. as the
initial generation of cryptocurrency, blockchain is essentially responsible for storing usable
cryptocurrency statistics. stoner authentication depends on the help of cryptocurrency period. In
BAPC, the character of a person is divided into 3 types of unrecorded, registered and remaining
to be replaced. in accordance with these exceptions, guests should witness three distinct phases:
the registration phase, the original authentication member, and the authentication switching
member. The first situation only needs to be completed once as practice. While the stoner leaves
the insurance area of modern satellite TV for PC, he must incontinently connect to any other
satellite. At this point, the stonemason in the country is ready to transfer and most wants to
complete the verification section of the switch. the general method of the 3-step protocol is given
in parent.

Figure 13: Draft protocol

40
Registration section
As part of the sign-up phase, guests purchase the corresponding cryptocurrency from the full
authenticator at the bottom position as a prerequisite for operating the satellite services. The
authenticator will transfer some amount of cryptocurrency from the authenticator store to the
stone store, which is used to verify the facts, as shown in stipulation 4, which is divided into four
ways.

Figure 14: Registration Section

5.4 Moral issues


Maintaining moral integrity is key to this. he will try to respect the moral norms and principles of
research throughout his studies. The information line is one of the initial points of knowledge.
statistics from secondary sources will be treated with utmost care. to preserve the educational
integrity and admire the unique images of the authors, it requires the correct criterion of all
sources. Great interest can be devoted to avoiding plagiarism, which today is not the easiest
violation of moral conditions, but can also lead to ambiguous conclusions and unreliable results.

41
Similarly, stint will consistently stick to vital licenses and confess during the testing phase of the
simulation. Use of any platform, software or data in this testing must be in accordance with
applicable operating agreements. respecting the high rights of software inventors and
experimenters is essential because it encourages invention, honesty and collaboration among
experimenters.

The way goods are mentioned has an important ethical counter-charge. studies will present their
findings in an honest and open manner, resisting the urge to exaggerate or gloss over conclusions
for sensationalism or idiosyncratic bias. it is important to make sure that the research really
contributes to the appearance of the problem and no longer lies to other experimenters or
interpreters inside the fortune.

Moreover, from this point of view, greater socially profitable and ecological consequences can
be considered. The survey will seek to address these issues so that the impact of the study
extends beyond the field of education. Blockchain generation, while disruptive and
transformative, also presents enormous difficulties and limits. In conclusion, on the basis that
honesty, openness and respect for high-ranking property are the cornerstones that maintain the
integrity of any medical enterprise, every part of this observation could be made and presented
with these generalities in mind (J. Xie, 2019).

The nature of cash in a virtual society turned out to be a more important issue than how cash is
traded. The blockchain era raised new questions about the nature of cash by giving rise to
Bitcoin and colorful cryptocurrencies. recently, cryptocurrencies have simply been used as a will
to issue plutocrats in many sphere names, pushing blockchain beyond Fintech. Key programs
correspond to cashless accounts, micropayments, cross-border cash transfers, fully-based
cryptocurrency trading and investment trading. despite the loose opposition between
cryptocurrencies and their innocently nebulous part in currency denationalization, bitcoin still
dominates cryptocurrency applications. Plate two shows the important distinctions between gold,
bare cash, and cryptocurrencies, in any case due to the great enthusiasm in the business,
cryptocurrencies continue to be belted by serious businesses. in addition to a number of recent
defamations and dangerous openings, there are businesses claiming that cryptocurrencies are
Ponzi schemes, questions about whether they qualify as perfect currencies, and controversies
about the fairness of their mechanisms. While cryptocurrencies are immorally unbiased as means

42
of payment, their good for parsimony and society kindly outweighs their countercharge for
number-crunching persistence. With the huge counter-charges of cryptocurrencies each
discovered and predicted, it is vital to fully symbolize their ethical nature. compared to the
abundance of studies on specialized aspects of cryptocurrency, the study of cryptocurrency ethics
is so rare that only a handful of participants live survey are particularly important. In the first
part, (A. Xiong, 2022) present a three-digit evaluation matrix for examining the commercial
ethics of cryptocurrencies. The matrix classifies moral problems according to the volume of their
impact on society into three special registers. Micro-problems concern people, macro-problems
concern mixing clothes, and meso-problems are indispensable goals. For each stage, moral
factors are classified as right, terrible, or ambiguous. The benefits of cryptocurrencies on
accounts, business operations and alternately to traditional cash are right. At the same time, the
disadvantages related to capacity abuse, volatility and evasion are certified as dire.

Security questions of sequestration, competition among cryptocurrencies, and executive


regulation of profitable autonomy are certified ambiguous. in the alternative study room, Angel
and McCabe discuss the ethics of accounts. Bitcoin is immersed as a payment medium along
with paper cash and plastic cards. The authors also look at the war between Bitcoin and fiscal
cover from the perspective of critical banks. When he agitates coin mining, he claims that profit-
motivated miners are not extra focused on tone than the main contributors in the fiscal enterprise.
This raises the tantalizing question of whether the device or platform is ethical as members
pursue their own goals. but blockchain-based cryptocurrencies are neutral, although miners are
motivated by prizes as opposed to humanitarian dreams. on this issue, Angel and McCabe
conclude that bitcoin as a piece of data is neither immorally right nor immorally wrong,
regardless of its use.

Decentralization is the main advantage of blockchain operations. therefore, the ethics of


blockchain operations can be better understood in a mild debate about the ethics of centralization
associated with pall computing. To reduce prices, individuals, groups, and governments have
signed up to pall computing and become dependent on pall service providers. This trend of
centralization has net social benefits, but it also brings moral challenges, as it involves the
transfer of statistics to the hall, thus accumulating electricity in the hands of transmission service
providers. This has fueled a debate on the ethics of computing centralization, which should now

43
be extended to blockchain-enabled decentralization. but conversations about the moral
countercharges of blockchain decentralization must consider blockchain-specific information (D.
Yaga, 2019).

6. Project Schedule: Gantt Chart


Development of Gantt Chart

Figure 15: Development of Gantt Chart

Scalability
Due to the increase in the number of transactions every now and then, the size and volume of
lock chain also getting large day by day. Every node has to collect all the transactions and
validate them on the blockchain. Besides this, blockchain has a restriction on block size and the
amount of time taken to publish the blocks only seven transactions per second can take place.
This may not suffice the requirement of processing a large amount of data in real-time. And

44
moreover, since the size of the block is small miners tend to prefer validating transaction with
higher fee due to which smaller transactions gets delayed. Some developments to resolve these
issues are storage optimization and redesigning of blockchain (D. Yang, 2020).

Loss of Privacy
In blockchain a considerable amount of privacy is maintained by using public key cryptography
mechanism in transactions to keep the user identity anonymous. However, the transactional
anonymity cannot be assured by blockchain because the identities of all transactions and
balances for each cryptographic key are publicly accessible. Thus, it is possible to recognize the
user by keeping track of the transactions.

Selfish Mining
Blockchain is more prone to attacks like this. Selfish Mining is a strategy where an over
ambitious miner secretly keeps his blocks without publishing it. It would be revealed to the
public only if some conditions are satisfied. This secretly mined private chains which are longer
than the current openly available chain, all other miners would agree to it. As a result, honest
miners would have wasted their resources on a chain that is going to be abandoned. In this way
selfish miners may be rewarded with higher incentives. Likewise, blockchain is susceptible for
many attacks like Sybil attacks, Double spending, 51% attacks and so on. Nevertheless,
Blockchain has been transforming both the industry and the academia with its distinct properties
like decentralization, anonymity, integrity and transparency. The applications of blockchain have
gone beyond cryptocurrencies and transactions. The decentralization nature of blockchain over
the already existing internet is very interesting in terms of data redundancy and survivability. Out
of some solutions blockchain is the perfect solution for problems where trust is of key concern.

Description of Key Activities and Time Frames


The preface of the study objects, the proposal of the methodology, the collection and evaluation
of statistics and the medication of the final report are a number of important duties of the
assignment. depending on the problem of each proposal, the estimated age will vary from several
weeks to several months, interspersed with joint charge review conferences. Blockchain
Modification Assignment Control Blockchain includes many points at which the multiple
individuals that businesses have in business can talk to others (C. P. S. Yli-Huumo, 2016). All
shipments and exchanges are logged for complete transparency. In addition, the budget is better
handled because contributors can see all purchases or transfers. It creates a framework for

45
insurance administrators that allows inputs but also provides oversight, which is more efficient
compared to traditional PM systems (G. Yu, 2022). Basically, this control framework can look
like a different way of managing tasks. Yet, formerly vital people are assigned, wards are given
predestined dreams, and further all external variables are taken care of (Jiasi Weng, 2019). it's
also a long-haul decentralized device, so there's more than one input factor. These 36 means that
the challenge operation itself is not a slice-edge system, but rather a system that attracts the
involvement of all events with full transparency (Xiaofeng Lu, 2020).

The difference is that all verbal exchange flows through the input of assigned workers and no
bone otherwise. all shipments are also secured by a minimum number of mortals with access to
records and other sensitive data. based on how the information is dispersed in the system, the
transfer of records is accessible due to the problems faced by outsiders in penetrating the
operating system. It consists of pallet storage structures that can be extremely efficient and safe.
It reduces the pitfalls because the director of the challenge is incontinently concerned. In
addition, blockchain generation allows the leader of the task to keep effects on the docket. it also
corrects errors and keeps the business focused. It is also effective because it also limits
conversations to topics that must be transmitted through the blockchain. likewise, the sales
director can have access to all the data and can precisely regulate it when a cover needs to be
created. Blockchain alone will drive all trades to be redundant green. There are several real-
world use cases for blockchain in construction tasks. to illustrate, the Briq blockchain venture
works by storing venture capital statistics on record (Forrest N Iandola, 2016). Briq is a product
fintech pot that brings operations and account together in a single ultra-modern platform on a
building data dashboard.

46
6. Implications and Conclusions
6.1 Research Contribution
The area of cross-blockchain technology is expected to benefit greatly from this study,
particularly in understanding challenge-response protocols and authentication and authorization
procedures. It paves the path for a safer and more effective blockchain technology ecosystem by
filling in the gaps in the existing literature. One of the biggest obstacles in this field is
interoperability, and the study results are expected to provide insights into how various
blockchain systems may be integrated. These findings will help the blockchain community's
practitioners and researchers alike, enabling them to develop and create stronger cross-
blockchain platforms and applications. Additionally, the study benefits academics by laying a
strong platform for future research and presenting fresh viewpoints on the possibilities of
blockchain technology.

6.2 Conclusion
In the field of protection, the pall computing system differs from centralized information
distortion. while the palette has several advantages over conventional data centers, it also has
several downsides, including consumer traffic (along with CSP traffic) and utility traffic
(multiple CSPs). Pall computing security can use a summary of blockchain technologies and pall
computing ideas. Scalability and intensity evaluation are enhanced by the pall platform.
Blockchain generation could make the pall computing paradigm cozier and more honest. pall
computing has the computing power and warehouse capacity to handle blockchain demands.

This textbook provides an overview of blockchain technology and the approach to calculating
palls. We looked at current studies exploring the blessings and challenges of integrating pall
computing with the blockchain era. we performed a furious assessment of pall computing based
on the most modern and applicable courses in the literature.

47
The following are counter-accusations of the check as a whole, which set the stage by providing
an overview of the designs and ways of integrating blockchain and pall computing, in addition to
demonstrating the responsibility the shadows play in blockchain. distinctive blockchain
protection services in the pall computing concept are classified and mentioned. We'll take a
stylish look at how pall computing can improve blockchain. The fourth part of the supplementary
accessories presents the current position of the main pall providers in the incorporation of pall
and blockchain. Blockchain and pall computing can work together to overcome the most unusual
obstacles. We advise how blockchain and pall systems can be incorporated for unborn vision and
development.

6.3 Limitations
A view of can have several boundaries. The proposed system can be explored and tested in a
simulated field, but real situations may also offer other goods. The onlooker will not cover all the
main features due to the rapid development of blockchain generation. Finally, the success of the
proposed result may also be affected by problems that are outside the scope of the survey, which
include network slowness or the specific setup of the go-blockchain platform.

These correspond to drastic electricity consumption and precious utensils. Also, sales take a lot
of time. that is the basic charge that wants to be addressed. Mining difficulty can benefit from
less account subscription with increased profitability, but it could also contribute to the massive
abandonment of blockchain generation. Integrating blockchain generation into all aspects of
profitable life may want to reduce the carbon footprint of many groups.

6.4 Future Recommendations


Happiness research may want to delve deeper into the security exceptions that might be rampant
in the go-blockchain platform's authentication and authorization structures. Important empirical
research can also be conducted to assess the effectiveness of these styles in single-species
settings and occasions. In addition, studies should allow for the creation of standardized
structures and protocols to increase the committee of various blockchain structures. Technology
goods exploration including quantity calculations to secure movement blockchain platforms can
also be one of them. Also, an interesting content of the study, which could offer smaller mileage
familiar impacts and aid policymaking in this suddenly developing content, is the socio-financial
foundations of go-blockchain platform relinquishment and cross-sector adequacy.

48
References
A. Xiong, G. L. (2022). A notary group-based cross-chain mechanism.

Anwaar Ali, S. L. (2019). Blockchain and the future of the internet: .

B. N. Musungate, B. C. (2019).

Bitcoin, S. N. (2019). A peer-to-peer electronic cash system.

Brendan McMahan, E. M. (2017). Communication-efficient learning of deep networks from


decentralized data.

Briland Hitaj, G. A.-C. (2017). Deep models under the gan: information leakage from collaborative deep
learning. 603–618.

C. P. S. Yli-Huumo, K. (2016). Where is current research on blockchain techonlogy.

Christian Gorenflo, S. L. (2019). International Conference on Blockchain and Cryptocurrency. 455–463.

Cosmos, J. (2022). Inter-blockchain communication protoc0l.

D. Khan, L. T. (2021). “Systematic literature review of challenges in blockchain scalability.

D. S. D. D. P. A. Merlinda, V. (2019). Blockchain technology in the energy sector: A systematic review of


challenges and opportunities. 143–174.

D. Yaga, P. M. (2019). Blockchain technology overview.

D. Yang, C. L. (2020). A review on scalability of blockchain,.

Delice, A. (2010). The sampling issues in quantitative research. 2001–2018.

E. Scheid, B. R. (2019). Toward a policy-based blockchain agnostic framework. 609–613.

Forrest N Iandola, S. H. (2016). Alexnet-level accuracy with 50x fewer parameters and¡ 0.5 mb model
size.

Fraga-Lamas., T. M.-C. (2018). A review on the use of blockchain for the internet of things. 32979–
33001.

G. Yu, X. W. (2022). “Cross-chain between a parent chain and multiple side chains.

Goes, C. (2020). The interblockchain communication protocol.

H. Tam Vo, Z. W. (2018). Internet of blockchains: Techniques and challenges ahead. 1574–1581.

hood, A. Z. (2015). Communications of the ACM.

I. A. Qasse, M. A. (2019). Inter blockchain communication:.

J. Xie, H. T. (2019). A survey of blockchain technology applied to smart cities. 2794–2830.

49
Jiasi Weng, J. W. (2019). Auditable and privacy-preserving deep learning with blockchain-based
incentive.

Keith Bonawitz, H. E. (2019). Towards federated learning at scale: System design.

L. Deng, H. C.-J. (2018). Research on cross-chain technology based on sidechain and hash-locking. 144–
151.

Mettler, M. (2016). Blockchain technology in healthcare: The revolution starts here. 1-3.

Michael Crosby, P. P. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, (6-10).

Monfared, S. A. (2016). Blockchain ready manufacturing supply chain using distributed ledger.
International Journal of Research in Engineering and Technology,, 1–10.

Muhamed Turkanovi´c, M. H. (2018). A blockchain-based higher education credit platform.

N. Wu, J. T. (2018). Application of blockchain technology in sustainable energy system.

Nyirenda, J. M. (2008). Performance evaluation of routing protocols in mobile ad hoc networks.

P. T. Duy, D. T.-H. (2020). A survey on blockchain-based applications for reforming data protection,
privacy and security.

Peruma, R. J. (2021). Workload characterization and performance evaluation of a blockchain


implementation for managing federated cloud resources.

R.-V. Tkachuk, D. I. (2022). A survey on blockchain based telecommunication services marketplaces.

Robinson, P. (2021). Survey of crosschain communications protocols.

Romanovs, J. G. (2018). The advantages and disadvantages of the blockchain technology. 1–6.

S. Lin, Y. K. (2021). Research on cross-chain technology of blockchain. 405-408.

Shmatikov, R. S. (2015). Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC
conference on computer and communications security. 1310–1321.

Staf, C. (2021). Cross-chain interoperability.

T. Ahram, A. S. (2017). T. Ahram, A. Sargolzaei, S. Sargolzaei, J. Daniels, and B. Amaba. 137–141.

V. Buterin. (2016). Chain interoperability,” R3 Research Paper.

W. Ou, S. H. (2022). An overview on cross-chain: Mechanism, platforms, challenges and advances,.

Xiaofeng Lu, Y. L. (2020). Privacy-preserving asynchronous federated learning mechanism for edge
network computing.

50
1 Blockchain Technology: Introduction,
Applications, Challenges 9
1.4.1 Scalability
Due to the increase in the number of
transaction every now and then, the
size and
volume of lockchain also getting large
day by day. Every node has to collect
all
the transactions and validate them on
the blockchain. Besides this,
blockchain has

51
a restriction on block size and the
amount of time taken to publish the
blocks only
7 transactions per second can take
place. This may not suffice the
requirement of
processing a large amount of data in
real-time. And moreover since the size
of the
block is small miners tend to prefer
validating transaction with higher fee
due to
which smaller transactions gets
delayed. Some developments to
resolve these issues
are storage optimization and
redesigning of blockchain.
1.4.2 Loss of Privacy
52
In blockchain a considerable amount
of privacy is maintained by using
public
key cryptography mechanism in
transactions to keep the user identity
anonymous.
However, the transactional anonymity
cannot be assured by blockchain
because the
identities of all transactions and
balances for each cryptographic key
are publicly
accessible. Thus it is possible to
recognize the user by keeping track of
the
transactions.
1.4.3 Selfish Mining

53
Blockchain is more prone to attacks
like this. Selfish Mining is a strategy
where
an over ambitious miner secretly
keeps his blocks without publishing it.
It would
be revealed to the public only if some
conditions are satisfied. This secretly
mined
private chains which are longer than
the current openly available chain, all
other
miners would agree to it. As a result
honest miners would have wasted their
resources
on a chain that is going to be
abandoned. In this way selfish miners
may be rewarded
54
with higher incentives. Likewise
blockchain is susceptible for many
attacks like Sybil
attacks, Double spending [27, 20],
51% attacks and so on.
Nevertheless, Blockchain has been
transforming both the industry and the
academia with its distinct properties
like decentralization, anonymity,
integrity and
transparency. The applications of
blockchain have gone beyond
cryptocurrencies
and transactions. The decentralization
nature of blockchain over the already
existing

55
internet is very interesting in terms of
data redundancy and survivability. Out
of
some solutions blockchain is the
perfect solution for problems where
trust is of key
concern. Even though blockchain has
not reached its maturity it still
continues to
suit applications of different domains
glob

56

You might also like