Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain)

Dr. M. R. Arun, Prof. M. R. Sheeba, Prof. F. Shabina Fred Rishma, ,
Affiliations
Associate Professor, ECE, PBR Visvodaya Institute of Technology and Science , Nellore, India , 2. Assistant Professor& RS, CSE, Manonmaniam Sundaranar University, Tirunelveli, India, 3. Assistant Professor, CSE, Cape Institute of Technology, Levinjipuram, India
:10.22362/ijcert/2020/v7/i05/v7i0403


Abstract
With the rapid advancement in technological innovation, block Chain has become one of the hottest transformative techniques in the internet domain in recent times. As considered to be a decentralized, distributed and highly encrypted technology in data transfer, the blockchain has restored the trust for secured business transactions by the sophisticated cryptographic algorithm. Here the protocol validates that all nodes are merely synchronized with one another, thus providing security, anonymity, and data integrity without the requirement of any other third party intrusion. Block chain technology which is also known as DLT (Distributed Ledger Technology) that is a great platform for non-physical money transaction such as bitcoin and other online crypto currencies. It is seen as emerging foundational security-based technology having enormous potential across different sectors. Blockchain as a decentralized mode useful for a peer-to-peer network without the essential of any central or controlling authority server. This will, in general, reduce transaction costs, improved security, and execute the financial transaction in real-time. Block chain is significant and not the same as of now existing techniques. Since it empowers disseminated, independent decreases grating in business exchanges with safety and shares decentralized records, this paper gives a discussion on the comparative analysis of block chain technology with other existing technologies.


Citation
Dr. M. R. Arun,Prof. M. R. Sheeba,Prof. F. Shabina Fred Rishma."Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain)". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 04,pp.13-19, April- 2020, URL :http://ijcert.org/ems/ijcert_papers/V7I403.pdf,


Keywords : Block Chain, Peer-to-peer, Bitcoin, Hashgraph, DAG, Holochain, Cryptography, Cyber security, DLT, Cryptocurrency

References
[1] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies”, IEEE Communications Survey Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
 [4] https://www.ibm.com/blogs/blockchain/2018/01/digitizing-global-
trade-maersk-ibm/ last accessed on Sept 15, 2018
[2] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem”, ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982
[3] D. Kraft, “Dif?culty control for block chain-based consensus systems”, Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016 
[4] Yuee, X., Wang, H., Jin, D., Li, M., & Jiang, W., “Healthcare data gateways: found healthcare intelligence on block chain with novel privacy risk control”, Journal of medical systems, vol. 40, no. 10, pp. 218, 2016.
[5] P. K. Sharma, S. Singh, Y.-S. Jeong, and J. H. Park, “Dist Block Net: A Distributed Block chains-Based Secure SDN Architecture for IoT Networks,” IEEE Communication Magazine, vol. 55, no. 9, pp. 78–85, 2017.
[6] K. Fan, Y. Ren, Y.Wang, H. Li, and Y. Yang, “Block chain-based efficient privacy preserving and data sharing scheme of content-centric networking 5G,” IET Communication, vol. 12, no. 5, pp. 527–532, Mar. 2018.
[7] G. Karame, S. Capkun, "Block chain security and privacy", IEEE Security Privacy, vol. 16, no. 4, pp. 11-12, Jul. 2018.
[8] B. Wang, M. Dabbaghjamanesh, A. Kavousi-Fard, S. Mehraeen, " Cyber security enhancement of power trading within the networked micro grids based on block chain and directed acyclic graph approach", IEEE Transaction Industrial Application, vol. 55, no. 6, pp. 7300-7309, Nov. 2019.
[9] F. M. Beni, I. Podnar Arko, "Distributed Ledger Technology: Block chain Compared to Directed Acyclic Graph", 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1569-1570, 2018
[10] T. T. Kuo, H. E. Kim, L. Ohno-Machado, "Block chain distributed ledger technologies for biomedical and health care applications", Journal of the American Medical Informatics Association, vol. 24, no. 6, pp. 1211-1220, 2017.
[11] C. Fan, H. Khazaei, Y. Chen, P. Musilek, "Towards a scalable DAG-based distributed ledger for smart communities", Proc. IEEE 5th World Forum Internet Things (WF-IoT), pp. 177-182, Apr. 2019.
[12] B. Lee and J.-H. Lee, “Block chain-based secure firmware update for embedded devices in an Internet of Things environment,” Journal Supercomputing, vol. 73, no. 3, pp. 1152–1167, Mar 2017.
[13] O. Novo, “Block chain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE Internet Things Journal, vol. 5, no. 2, pp. 1184– 1195, Apr. 2018.
[14] C. Yang, X. Chen, and Y. Xiang, “Block chain-based publicly verifiable data deletion scheme for cloud storage,” Journal Network Computing Application, vol. 103, pp. 185–193, Feb 2018.
[15] N. Kshetri, “Block chain’s roles in strengthening cyber security and protecting privacy,” Telecommunications Policy, vol. 41, no. 10, pp. 1027–1038, Nov. 2017.
[16] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Block chain Based Privacy-Preserving Incentive Mechanism in Crowd sensing Applications,” IEEE Access, vol. 6, pp. 17 545–17 556, 2018.
[17] A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, “Block chain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems,” IEEE Internet Things Journal, vol. 4, no. 6, pp. 1832–1843, Dec 2017.
[18] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, “BlockChain: A Distributed Solution to Automotive Security and Privacy,” IEEE Communication Magazine, vol. 55, no. 12, pp. 119–125, Dec 2017.
 [19] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything you wanted to know about the block chain: Its promise, components, processes, and problems,” IEEE Consumer Electronics Magazine, vol. 7, no. 4, pp. 6–14, July 2018.


DOI Link : https://doi.org/10.22362/ijcert/2020/v7/i05/v7i0403

Download :
  V7I403.pdf


Refbacks : Currently there are no Refbacks

Support Us


We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to editorijcert@gmail.com