Blockchain: Empowering Secure Data Sharing

Blockchain: Empowering Secure Data Sharing

English | ISBN: 9811559384 | 2020 | 142 Pages | EPUB, PDF | 15 MB

With the development of big data, data sharing has become increasingly popular and important in optimizing resource allocation and improving information utilization. However, the expansion of data sharing means there is an urgent need to address the issue of the privacy protection - an area where the emerging blockchain technology offers considerable advantages. Although there are a large number of research papers on data sharing modeling and analysis of network security, there are few books dedicated to blockchain-based secure data sharing.
Filing this gap in the literature, the book proposes a new data-sharing model based on the blockchain system, which is being increasingly used in medical and credit reporting contexts. It describes in detail various aspects of the model, including its role, transaction structure design, secure multi-party computing and homomorphic encryption services, and incentive mechanisms, and presents corresponding case studies.
The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, allowing readers to understand the importance of data sharing security based on the blockchain framework, as well as the threats to security and privacy. Further, by presenting specific data sharing case studies, it offers insights into solving data security sharing problems in more practical fields. The book is intended for readers with a basic understanding of the blockchain infrastructure, consensus mechanisms, smart contracts, secure multiparty computing, homomorphic encryption and image retrieval technologies.


[Fast Download] Blockchain: Empowering Secure Data Sharing

Related eBooks:
America's Most Haunted
What Every Body Is Saying
HCI for Cybersecurity, Privacy and Trust
Handbook of Research on Globalized Agricultural Trade and New Challenges for Food Security
Transforming Information Security
Cyber Arms: Security in Cyberspace
Immigration and Migration
Kali Linux: Assuring Security by Penetration Testing
The Art of Software Security Assessment: Identifying and Preventing Software Vul
Personal Defense for Women
CISSP: Certified Information Systems Security Professional Study Guide
Security Studies: An Introduction by Paul D. Williams
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.