Data Confidentiality, Integrity, and Authentication

Data Confidentiality, Integrity, and Authentication

Dhanalakshmi Senthilkumar
ISBN13: 9781522592570|ISBN10: 1522592571|EISBN13: 9781522592594
DOI: 10.4018/978-1-5225-9257-0.ch012
Cite Chapter Cite Chapter

MLA

Senthilkumar, Dhanalakshmi. "Data Confidentiality, Integrity, and Authentication." Architectures and Frameworks for Developing and Applying Blockchain Technology, edited by Nansi Shi, IGI Global, 2019, pp. 246-274. https://doi.org/10.4018/978-1-5225-9257-0.ch012

APA

Senthilkumar, D. (2019). Data Confidentiality, Integrity, and Authentication. In N. Shi (Ed.), Architectures and Frameworks for Developing and Applying Blockchain Technology (pp. 246-274). IGI Global. https://doi.org/10.4018/978-1-5225-9257-0.ch012

Chicago

Senthilkumar, Dhanalakshmi. "Data Confidentiality, Integrity, and Authentication." In Architectures and Frameworks for Developing and Applying Blockchain Technology, edited by Nansi Shi, 246-274. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-9257-0.ch012

Export Reference

Mendeley
Favorite

Abstract

Blockchain has been created in the process of development in bitcoin. It's a singly linked list of block, with each block containing a number of transactions and each list in the blocks using with cryptographic functions. The cryptographic hash function contains the hash of the previous block, timestamp, and transaction ID. Blockchain services include the authentication, confidentiality, integrity, data and resource provenance, and privacy and access control lists technologies. The authentication provider authenticates decentralized database with transactions in private-public key pair. This key-pair is used in the transport layer security with the entire network. The network legitimizes the transaction after that and adds the transaction to the blockchain. A sequence of blocks in blockchain holds the complete record of transactions like a public ledger. The integrity data written in the blockchain cannot be altered subsequently. By limiting access to the information in confidentiality, only authorized users can access the information, so that information is also protected.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.