Overview of Applied Data Analytic Mechanisms and Approaches Using Permissioned Blockchains

نویسندگان

چکیده

Blockchain technology deployment has surged in diverse domains to secure and maintain valuable data. Wherever data exists, the motivation of applying analytics emerges. However, this case is slightly different since it deals with a distributed system environment security constraints such as privacy confidentiality. This study aims provide an overview approaches that applied over permissioned blockchains. Moreover, extract key features from these studies report discuss common best practices. contributes determining requirements apply outlines remaining challenges. The research method was conducted four phases. initial phase states goals objectives. Subsequently, analysis examines group papers various studies. These were divided into three categories: general aspects, management, perspective. Afterward, outcomes are classified according findings observations point out aspects Finally, evaluation determines Based on papers. Most focused off-chain assistance third party. Also, most types descriptive diagnostic, whereas fewer proposed predictive analytics. explains lack existing use artificial intelligence real-time analysis. used blockchain platform for Hyperledger fabric multiple reasons mentioned detail research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rethinking Permissioned Blockchains

Current blockchain platforms, especially the recent permissioned systems, have architectural limitations: smart contracts run sequentially, all node executes all smart contracts, consensus protocols are hard-coded, the trust model is static and not flexible, and non-determinism in smart-contract execution poses serious problems. Overcoming these limitations is critical for improving both functi...

متن کامل

Anonymous Identities for Permissioned Blockchains

In this paper we address the issue of retaining user anonymity within a permissioned blockchain. We present the ChainAnchor architecture that adds an identity and privacy-preserving layer above the blockchain, either the private blockchain or the public Blockchain in Bitcoin. ChainAnchor adds an anonymous identity verification step such that anyone can read and verify transactions from the bloc...

متن کامل

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

In this paper we address the issue of identity and access control within shared permissioned blockchains. We propose the ChainAchor system that provides anonymous but verifiable identities for entities on the blockchain. ChainAchor also provides access control to entities seeking to submit transactions to the blockchain to read/verify transactions on the the permissioned blockchain. Consensus n...

متن کامل

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

Fabric is amodular and extensible open-source system for deploying and operating permissioned blockchains and one of theHyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and t...

متن کامل

An Overview of Calcium, Mechanisms and Necessities

Today, promoting quality of life and paying more attention to nutrition and health are among the major issues of international debate and governments' strategies to improve people's quality of life in different societies. There have also been extensive studies to improve nutrition and its relationship with health. The pattern of food consumption is different in most countries, different social ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Advanced Science, Engineering and Information Technology

سال: 2022

ISSN: ['2088-5334', '2460-6952']

DOI: https://doi.org/10.18517/ijaseit.12.1.12827