Blockchain Structure Chapter
Blockchain Structure Chapter
net/publication/353888135
CITATION READS
1 1,053
4 authors:
18 PUBLICATIONS 38 CITATIONS
School of ICT
176 PUBLICATIONS 2,829 CITATIONS
SEE PROFILE
SEE PROFILE
All content following this page was uploaded by Mamoon Rashid on 25 December 2021.
Shanu Khare, Azher Ashraf, Mir Mohammad Yousuf, and Mamoon Rashid
1 Introduction
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 131
K. M. Baalamurugan et al. (eds.), Blockchain Security in Cloud Computing,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-030-70501-5_6
132 S. Khare et al.
without altering all corresponding blocks, which involves system network main-
stream collaboration.
Blockchain is safe by nature and exemplifies a high-performance computing
framework with huge appetite to medieval faults [3]. This enables blockchain theo-
retically ideal to store incidents, health records, and other information processing
practices, such as unified communications, payment dispensation, authenticity
tracking, food regulatory compliance, or polling [4]. The formation of blockchain is
shown in Fig. 1. The central sequence (black) contains the maximum sequence of
chains from the (green) inception frame to the present frame. Orphan frames (yel-
low) exist outside of the central sequence.
The Internet of Things (IoT) is an evaluating standard that has altered the methods
in our everyday livelihood and operative. The Internet of Things (IoT) is an
Blockchain: Structure, Uses, and Applications in IoT 133
2 History of Blockchain
Throughout the early 1980s and at the beginning of the 1990s, the key concepts
underlying distributed ledger future tech came out. The paper “The Part-Time
Parliament” [21] was presented by Leslie Lamport to ACM Operations on
Communications Platforms in 1989; eventually, the manuscript was issued in a
1998 matter. This article identifies a paradigm of convergence for finding a set-
tlement in a central server that cannot be accurate for the machines or system
either. As an automated pioneer for the electronic authentication of agreements
in 1991, a registered documentation string had been first established to readily
demonstrate any absence of any of the certificates which were validated through-
out the collection [21]. Table 1 shows the chronology of distributed ledger
advancements.
3 Working of Blockchain
Table 1 Summary of the current methodologies to the safety of published research observations
Reference Permutations Description
Taylor First Bitcoin, a cryptocurrency development, became an initial big
[22] permutation blockchain exploration. Bitcoin’s daily volume now stands at about
$10–$20 billion, including in dozens of users including a rapid-
growing content delivery sector
Böhme Second Blockchain became a second development. Almost every large
et al. [23] permutation corporate institution in the world is actively carrying out
cryptocurrency operation, and about 15 percent of businesses have
expected and said that in 2017
Kosba Third The third innovation was called “smart contract,” something which
et al. [24] permutation was embodied in a decentralized system of the early 1990s, called
Ltc, which specifically created techniques via IoT systems that
permit transactions like government stocks or shares to be
interpreted regardless of money-like Bitcoins’ monies. AMD’s
intelligent contracts are estimated at almost 1 billion dollars and
tens of thousands of businesses related to this market
Kiayias Fourth The latest big development, the modern reimagining of IoT systems,
et al. [25] permutation is called “risk confirmation.” Advanced sensing blockchains are
secured by “work documentation,” under which decisions are taken
by the group with the highest total computing ability. Such entities
are called “traders,” and, in exchange for Ethereum purchases,
consumers operate massive data centers to provide this security.
Such energy sources are substituted by modern mechanisms,
replacing structural growth mechanisms for a corresponding and
better set of meanings
Eyal et al. Fifth Blockchain scaling is considered the fifth big innovation. In the
[26] permutation cryptocurrency setting, almost any appropriate device is carried out
with each transaction in the network. It’s a tricky task. A
decentralized blockchain aggravates the issue by computing how
computers have to track each payment and then split the job
efficiently, despite undermining security. That’s a tough question
and no obstructionist problem to handle something except
compromising blockchain’s respectable security or durability. The
customizable blockchain should propel artificial intelligence quickly
and adequately and then take on the two massive economic
counterparty mediators in the world economy.
transaction between the sender and receiver is validated and completed. The Bitcoin
blockchain information exists solely in relation to Bitcoin transactions under
financial information. This is a huge record of success of all the financial transac-
tions, all the way to the first Bitcoin transaction.
2. Chaining the Blocks After the transaction request data establishment, there is a
connection through peer-to-peer network between nodes. This will be chaining the
blocks together and connecting them to each other. In Fig. 2, there are four blocks
which are chained together, and all contain the transaction data.
Blockchain: Structure, Uses, and Applications in IoT 135
4. Digital Signature and Hashing In this step, all blocks call for cryptocurrency
contacts record where every block needs digital signature and hashing. Hashing is a
kind of way of everyone in blockchain to agree for the current world state, while
digital signatures ensure that transactions are meant only for rightful owners. These
are important parameters in blockchain that ensure that it will not get compromised
or corrupted.
5. Integration Operations In integration, all blocks combine and attach with the
logs. Upon checking the payment as correct, it receives the perfect excuse. The dol-
lar sum of the purchase, user digital signature, and a digital signature from Amazon
are mostly contained inside a file. Here, the payment is likely to contain tens to mil-
lions of such entities.
Blockchain processes contain five phases for its working as shown in Fig. 3.
These phases are as follows:
Phase 1 – P2P network
Phase 2 – Communication
Phase 3 – Validation
Phase 4 – Verification
Phase 5 – Confirmation
4 Applications of Blockchain
The whole digital web is about stuff, the most precious imminent things user could
access and really wants to secure. All such resources are maintained in encrypted
format on a channel-to-channel string, named the blockchain or registry, whereby
each individual determines with whom users are doing company. Based on these
resources, there are some applications which belong to the blockchain and are
given below:
Blockchain: Structure, Uses, and Applications in IoT 137
• Blockchain finance
• Blockchain business
• Blockchain smart contracts
• Blockchain IoT
Cryptocurrencies, or virtual tokens at its finest, are tokens which are transmitted
across an online web. Purchases can be made through checking, transferring, or
money. User could also use a kind of digital goods, perhaps commonly Bitcoin, but
also Litecoin, Peercoin, or Dogecoin, and many others, in which user utilizes an
electronically encrypted domain to render the payment. And more important, the
payment is more secure as the user wants it to be. In order to assure confidence,
conventional structures employ a negotiator, including a lender or a payment
processing corporation.
Blockchain and IoT are crucial technologies that will have a major impact on pro-
duction firms over the next few decades. These two technologies boost productivity,
generate incentives for new companies, resolve legal requirements, and improve
efficiency and visibility. The IoT makes it simple to analyze real-time sensor data
relevant data. As the expense of detectors and sensors continues to decrease, by
accepting IoT frameworks, manufacturing sectors will overcome financial barriers.
The collective use of the distributed, open, generic ledger available to investors
in the organizational network would enable blockchain to share critical information
gathered from the IoT.
Information security and IoT privacy are immense possible due to the vast and
pervasive nature of IoT networks. For the remainder of resource-controlled IoT
devices, deconcentration and security of blockchain technologies often need
substantial resources, setbacks, and task processing that is not suitable.
The Internet of Things (IoT) has been sufficiently formed from its inception and
is indicative of the Internet’s growth in the coming time frame. One of the technical
challenges is the need to handle millions of machines worldwide. While usability
structures and procedures for IoT perform, they rely on structured constructs that
place a fresh set of functional limitations on international administration. As the
transfer moves from source to destination, the blockchain will contain relevant
records from smart applications connected to products or materials.
5 Uses of Blockchain
5. Asset Tracking Another potential utilization case for blockchain is with an asset
monitoring method toward proving possession or authenticity of a given asset. The
involvement in the global supply chain of illegal merchandise and so-called conflict
diamonds is a concern that needs to be addressed. A device of publicity must be
visible, unchanged, and verified property documents which can be investigated at a
certain moment in time to evaluate how a specific event is produced. Blockchain
precisely gives this number of characteristics and therefore suits this rule. It will
find things simpler for everybody to decide about who controls what and make runs
in all exchanges surrounding every single item because it has changed ownership in
the global marketplace.
6. Payment System Blockchain can be used for the implementation of payment
systems in fiat currency. This is a logical outgrowth of its capacity to control cryp-
tocurrencies’ payments and transactions.
7. Digital Identity Just as blockchain is used to monitor the purchase of assets and
their authenticity, it can be used to purchase people’s identity. Assume that some-
one’s citizenship is held on a blockchain and it will permit users to send documents
as blockchain payments. This ensures the track of exchange within or outside coun-
tries. That ensures they’re unchangeable, verified by the society, and centrally
planned. By introducing payment systems to the scheme, it may also be feasible to
transmit regulations to refuse access to only certain individuals besides punitive
measures toward places of destination, security purposes, or indeed any purpose but
to have others to enforce immediately on the blockchain. Everything should be
transparent and standardized to allow mechanical failure to meet a process. The
requirements should be clear.
8. Global Trade and Commerce Many corporations and consortia are encouraged
to modify everyone’s outdated technology because of the influence of blockchain
technologies on global trade finance services. The impactful effect of Ethereum
blockchain is recognized in the operation of global supply chains by massive trad-
ing businesses around the world, the management of financial transactions, and the
opening of new business models. Further, from the time of digitalization, the frame-
work allows current records, bank guarantees, and further digital signatures.
9. Real Estate Real estate makes use of blockchain to activate electronic real estate
possibilities. The job with ConsenSys develops new business opportunities,
improves the underlying property operational activities, reduces prices, eliminates
information silos, and improves the market.
10. Capital Market In a time of higher results, the innovation of the blockchain
changed the capital market technique to understand trade. In modern times, there
have been tough restrictions, institutions, and obligations in the share market
architectural style. The associated risk involves high administrative expenses and
prompts industry by undermining the financial position and potential customers by
raising the degree of entry. The methodology of blockchain can enhance operating
expenses downwards through the available, implemented, unavoidable, and grow-
ing factual sources between such banks and financial institutions.
Blockchain: Structure, Uses, and Applications in IoT 141
Apache blockchain is generally used for maintaining conformity with laws, boost-
ing inventory monitoring and enhancing identity security, only to mention a few
instances. Blockchain performs differently with several conventional centralized
networks and holds log files of all activities indefinitely. In addition, several small
firms, businesses, state agencies, and individuals can also use this platform. In
several industries and confidence, this combination of blockchain with IoT can
establish greater accountability and deter manipulation as most of the industries
prosper and adopt this innovation. A collection of why the human race adopts the
whole innovation and the adjustments we can see is presented below:
142 S. Khare et al.
Higher Consumer Acceptance We might see a massive requirement for IoT in the
next 20 years when everyone needs anonymity, protection, and above all time-
saving capability. Blockchain is needed to boost this IoT requirement and to func-
tion reliably. Therefore, as consumption rises, production growth improves, and
businesses embrace the modern ideology of technological breakthroughs. The IoT
infrastructure will be built, and travel, protection, and farming problems will dra-
matically decrease.
Market Rise in Home Automation Everyone needs luxury, and it can be done by
intelligent houses. Think you get home on a warm weather afternoon and would like
to have your AC unit on and space pretty chilly, what if you just hit and press the
button on your smartphone? Such trends are going on and might grow rapidly.
Presently blockchain can do it by clicking on the button by transmitting and receiv-
ing the information for both you and your air conditioner; it appears natural, but we
don’t really want full access, and we never want to exploit or exchange our informa-
tion. That’s the area in which blockchain steps in, and we will monitor the opera-
tion, i.e., who did it if it happens. This is a prime demonstration and is always
challenging to protect information at excessive densities.
Need in Public Well-Being Services Followed by the community services, this
innovation will grow significantly. It’s still been assessed all around the global econ-
omy. There are a range of monitoring technologies, and the customer’s full surgical
records and photographs and pre-diagnostic symptoms may be saved in the data-
base. Their daily well-being could be registered, and they might be utilized across
situations.
Distributed Ledger Incorporation and Advanced Analytics IoT In the near
future, when the future IOT models in their functionality start to be implemented by
various industries, AI is in force. Typically businesses such as Sentrian, Manna, Veros
Networks, Neura, etc. use IoT AI and will eventually implement blockchain, and the
applications will be much improved. Blockchain owns and operates on regular
machines, and an immense quantity of energy is necessary to perform the job. And
both of this can be combined with a great deal of time and storage, and slowly grow-
ing as technology is the key challenge here. However, if this innovation flourishes
correctly, analysis issues, AI coding, protection, and several others may be generated.
Blockchain Organizations on IoT As competition for blockchain specialists and,
in particular, for citizens with awareness of IoT is growing, it is also essential. Since
separate schools aim to solve both, still a distance remains, and we sense as we
learners are interested in different industries. That’s why various companies have
their own systems where they freshen up their talents to get their industry ready, but
this entire phase is too grueling for the business, and they’ll continue to pay the costs.
Electricity and Capital Control Blockchain and IoT Regulation In order to
handle the money we have and the electricity properly, use of IoT equipment with
blockchain technologies would become an important commodity. In our houses and
workplaces, to hold the humidity, sprayers, etc., we can have IoT gadgets. Active
Blockchain: Structure, Uses, and Applications in IoT 143
7 Conclusion
In this chapter, the authors provided an outline and structure of blockchain and its
various applications in IoT. As blockchain technology helps in building trustless
and efficient secure environment in IoT, the authors discussed this technology in
this chapter and explained its use and applications in IoT in a concise and
comprehensive way. The use of this technology has given new dimension in the
Internet of Things systems. Moreover, the future trends of blockchain technology in
IoT are included in this chapter. The authors believe that this chapter will provide a
basic idea to users in understanding blockchain technology in IoT applications.
References
9. A. Banotra, S. Gupta, S.K. Gupta, M. Rashid, Asset security in data of Internet of Things using
blockchain technology, in Multimedia Security, (Springer, Singapore, 2021), pp. 269–281
10. F. Syed, S.K. Gupta, S. Hamood Alsamhi, M. Rashid, X. Liu, A survey on recent optimal
techniques for securing unmanned aerial vehicles applications. Trans. Emerg. Telecommun.
Technol., e4133 (2020)
11. P.P. Ray, A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci.
30(3), 291–319 (2018)
12. M. Rashid, I. Nazeer, S.K. Gupta, Z. Khanam, Internet of Things: Architecture, challenges,
and future directions, in Emerging Trends and Impacts of the Internet of Things in Libraries,
(IGI Global, Hershey, 2020), pp. 87–104
13. P. Singh, E. Rashid, Smart home automation deployment on third party cloud using Internet of
Things. J. Bioinf. Intell. Control 4(1), 31–34 (2015)
14. H.N. Dai, Z. Zheng, Y. Zhang, Blockchain for Internet of Things: A survey. IEEE Internet
Things J. 6(5), 8076–8094 (2019)
15. M. Rashid, S.A. Parah, A.R. Wani, S.K. Gupta, Securing E-health IoT data on cloud systems
using novel extended role based access control model, in Internet of Things (IoT), (Springer,
Cham, 2020), pp. 473–489
16. E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, Industrial internet of things:
Challenges, opportunities, and directions. IEEE Trans. Ind. Inf. 14(11), 4724–4734 (2018)
17. P. Sethi, S.R. Sarangi, Internet of things: Architectures, protocols, and applications. J. Elect.
Comput. Eng. 2017, 1–25 (2017)
18. M. Rashid, H. Singh, V. Goyal, N. Ahmad, N. Mogla, Efficient big data-based storage and
processing model in Internet of Things for improving accuracy fault detection in industrial
processes, in Security and Privacy Issues in Sensor Networks and IoT, (IGI Global, Hershey,
2020), pp. 215–230
19. D.E. Kouicem, A. Bouabdallah, H. Lakhlef, Internet of things security: A top-down survey.
Comput. Netw. 141, 199–221 (2018)
20. S. Al-Sarawi, M. Anbar, K. Alieyan, M. Alzubaidi, Internet of Things (IoT) communication
protocols, in 2017 8th International conference on information technology (ICIT), (IEEE,
2017, May), pp. 685–690
21. G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain–or–rewriting history in
bitcoin and friends, in 2017 IEEE European Symposium on Security and Privacy (EuroS&P),
(IEEE, 2017, April), pp. 111–126
22. M.B. Taylor, Bitcoin and the age of bespoke silicon, in 2013 International Conference on
Compilers, Architecture and Synthesis for Embedded Systems (CASES), (IEEE, 2013,
September), pp. 1–10
23. R. Böhme, N. Christin, B. Edelman, T. Moore, Bitcoin: Economics, technology, and gover-
nance. J. Econ. Perspect. 29(2), 213–238 (2015)
24. A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: The blockchain model of cryp-
tography and privacy-preserving smart contracts, in 2016 IEEE Symposium on Security and
Privacy (SP), (IEEE, 2016, May), pp. 839–858
25. A. Kiayias, A. Russell, B. David, R. Oliynykov, Ouroboros: A provably secure proof-of-stake
blockchain protocol, in Annual International Cryptology Conference, (Springer, Cham, 2017,
August), pp. 357–388
26. I. Eyal, A.E. Gencer, E.G. Sirer, R. Van Renesse, Bitcoin-ng: A scalable blockchain protocol,
in 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI}
16), (2016), pp. 45–59