0% found this document useful (0 votes)
12 views4 pages

Vijji Tables

Uploaded by

yunusbasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Vijji Tables

Uploaded by

yunusbasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

LIST OF CONTENTS

NAME OF THE CONTENT PAGE NO


Abstract i
List of Figures iv
List of Tables v
1.Introduction
1.1.Contributions 2
1.2.Organisation 2
1.3.Blockchain Technology 3
2. Existing System
2.1.Data Protection vs Data Privacy 8
3. Proposed System
3.1. Blockchain Elements 9
3.1.1. Client 9
3.1.2.Anchor Peers 10
3.1.3.Peers 10
3.1.4.Channel 13
3.1.5. Ledger 14
3.2.Identity Management 14
3.2.1. Certificate Authority 15
3.2.2. Membership Service Provider 16
3.2.3.Authentication FIS 16
3.2.4. Trust Evaluation FIS 18
3.2.5.Access Control FIS 20
4. Security Framework
4.1.Transaction Flow in Blockchain 22
4.2. Transaction Logic 22
5. Security Analysis 24
5.1. Security Analysis 24
5.1.1. Attackers 25
5.1.2.Assests 25
5.1.3.Threats 25

ii
5.1.4.Mitigation Strategies 28
5.2. Fuzzy Logic 28
5.3.Architecture of FIS 28
5.3.1. Fuzzification 29
5.3.2. Defuzzification 29
5.3.3. Inference System 30
5.3.4. Knowledge Base 30
5.4. The Workimg Of Proposed System 30
5.5. IoT in Healthcare : Interoperability 31
5.5.1.Insights of this application 31
6. Comparitive Analysis
6.1. Usability and comparisons with other blockchain 34
6.1.1. Latency 35
6.1.2.Throughput 35
7. Comparision and Future work 38
8. References 39

iii
LIST OF FIGURES

Fig.no Name of the Figure Page.no


1.1 Internet of things 3
2.1 AAA Services in Legacy System 5
2.2 Network Security 6
2.3 Data and Security 7
3.1 Client 7
3.2 Anchor peers 10
3.3 Peers 10
3.4 Endorser 11
3.5 Committing peer 11
3.6 Ordering Services 12
3.7 Channel 12
3.8 Ledger 13
3.9 CA Hierarchy 14
3.10 Authentication FIS 15
3.11 Membership functions of each device, each parameter is along 17
the Y-axis and Threshold value of each linguistic variable is
along X-axis
3.12 FIS rules viewer 18
3.13 Membership functions of Authentication output 19
3.14 Membership functions of REESP 19
3.15 Membership functions of REKSP 19
3.16 Membership functions of RRE 20
3.17 Membership functions of Output ‘trust’ 20
3.18 Access control FIS 21
3.19 Membership functions of output access right 21
3.20 Rule viewer- access rights 21
4.1 Bird Eye view of Medical department 22
4.2 Hyperledger Transaction Flow 23

iv
LIST OF TABLES

TABLE.NO NAME OF THE TABLE PAGE.NO


6.1 Mitigation Strategies 36
6.2 Comparison of proposed framework with 37
existing solutions

You might also like