BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES

[ 31 Mar 2020 | vol. 14 | no. 1 | pp. 1-14 ]

About Authors:

Bosubabu Sambana1*, Yegireddi Ramesh2, Molli Srinivasa Rao3, T. Chalapathi Rao4 and N P Patnaik M5
-1*Assistant Professor, Department of Computer Science and Engineering, Viswanadha Institute of Technology and Management, Visakhapatnam, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India
-2Associate Professor, Department of Computer Science and Engineering, Aditya Institute of Technology and Management, Tekkali, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India
-3Professor and Head of the Department, Department of Computer Science and Engineering, Viswanadha Institute of Technology and Management, Visakhapatnam, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India
-4Sr. Assistant Professor, Department of Computer Science and Engineering, Aditya Institute of Technology and Management, Tekkali, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India
-5Assistant Professor, Department of Computer Science and Engineering, Viswanadha Institute of Technology and Management, Visakhapatnam, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India

Abstract:

Blockchain Technology has pulled in apparent consideration because of its enormous determination of potential applications. It at first showed up as cryptographic money, alluded to as Bitcoin, in any case, it has since been utilized in a few unique organizations and non-business applications, rather than most existing frameworks that are upheld concentrated structures, this new innovation uses peer‐to‐peer arranges and circulated system that join blockchain registers to store exchanges. Its structure is expected as an advanced log record and hangs on as a progression of coupled groups, alluded to as squares, each individual square is locked cryptographically with the past square. When a square has been another, it can't be modified.
A few security authorities conjecture that the intrinsic cryptographically nature of the blockchain framework is agreeable to oppose consistent hacking and security dangers. In any case, past examinations on the assurance and protection of blockchain Technology have indicated that few applications have succumbed to flourishing digital assaults. Because of the expanding interest for digital money and its present security challenges, past investigations haven't fixated on blockchain technology cybersecurity vulnerabilities broadly. Here, our examination stretches out upon the past investigations on vulnerabilities and explores the classifications of potential assaults. Our investigation at that point gives extra course to highlight potential attacks against blockchain innovation defenselessness to cybersecurity.

Keywords:

Blockchain, vulnerabilities, Cloud Computing, Cyber security, Ledger, Smart Contracts, Cryptocurrency, Attacks

 

About this Article: