2019 3rd Cyber Security in Networking Conference (CSNet) 2019
DOI: 10.1109/csnet47905.2019.9108966
|View full text |Cite
|
Sign up to set email alerts
|

Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?

Abstract: Blockchain technology is today proposed as a new technical infrastructure for several types of IT applications. This interest is due to its unique property that allows two entities to perform transactions, in a very secure manner, without going through a TTP. However, a blockchain comes along a number of other intrinsic properties, which may not be suitable or beneficial in all the envisaged application cases. Consequently, we propose in this paper a decision tree to identify when a blockchain may be the appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…− The ledger L constitutes a chain of several blocks interconnected with each other and with the addition of new blocks, this chain increases more and more. Each block contains the history of one or more exchanges as well as other important information [16]. In addition, each user has a copy of L and there is a consensus algorithm ensuring that each user owns the same copy of L as the other users (see section 3.2).…”
Section: Characteristicsmentioning
confidence: 99%
See 4 more Smart Citations
“…− The ledger L constitutes a chain of several blocks interconnected with each other and with the addition of new blocks, this chain increases more and more. Each block contains the history of one or more exchanges as well as other important information [16]. In addition, each user has a copy of L and there is a consensus algorithm ensuring that each user owns the same copy of L as the other users (see section 3.2).…”
Section: Characteristicsmentioning
confidence: 99%
“…In addition, the attacker needs to repeat all these changing operations for all the other users. So, the information stored in the blocks are indeed reserved forever and cannot be changed unless an attacker can gather of more than 51% of the computational power network [16]. 3.…”
Section: Characteristicsmentioning
confidence: 99%
See 3 more Smart Citations