Capabilities Supported by Blockchain Implementations and the Level Transaction Models
Following the reading of the articles provided the discussion board, answer the following questions:
3a.
Describe in your own words the three main capabilities that are supported by the blockchain implementation
3b.
Explain in your own words the Blockchain Level transaction models, benefits and challenges related to security and privacy.
3c.
Review the security and privacy Requirements of online transactions, list the seven types and outline how can blockchain transactions become vulnerable to various types of attacks (i.e. tampering, denial-of-service (DDoS), double-spending, majority consensus, and pseudonymity)
3d.
Select two types of techniques and describe how they can be leveraged to enhance the security and privacy of existing and future blockchain systems
3e.
Select two of the UN sustainable development goals and express how Blockchain technology will enable realizing these goals.
* Provide academic or industry source to support your answers.
*** Respond to one classmate, provide a substantial comment, and remember to address classmates by their first name.
Blockchain Applications
Your Name
Subject and Section
Professor’s Name
October 25, 2019
Questions:
1 Describe in your own words the three main capabilities that are supported by the block chain implementation
The three main capabilities supported by blockchain implementation are; (1) “hash chained storage”, (2) “digital signature”, and (3) the “consensus” CITATION Zha192 \l 1033 (Zhang, Xue, & Liu, 2019).
First, the hash chained storage is primarily composed of two processes/software that allows for an easier storage and location of the data. Namely, these are (1) hash pointer and the (2) Merkle Tree. On the one hand, the hash pointer allows the blockchain to determine where the data needed is stored within the complex network. Simply said, it is similar to a signpost that allows for an easy determination of the data’s location. On the other hand, the Merkle tree is a series of nodes that are interconnected by different hash pointers. This structure can easily be imagined as similar to an actual ‘tree’ with every leaf being the different hashes of each data block.
Second, the data signature is one of the things that makes the blockchain very secure. It ensures that every data that enters into the network is authentic by creating a unique piece of code that would be verified by the whole network itself.
Lastly, the consensus is another security feature of the blockchain. From the name itself, consensus refers to the capability of every node to accept or reject a transaction or a change in the data, by deciding on whether it would add them to its copy of global ledger. Thus, if one tries to change a data that is located on one block, then the other nodes could prevent that malicious data by not including those changes in its own block.
2 Explain in your own words the Blockchain Level transaction models, benefits and challenges related to security and privacy.
The blockchain transaction models can be categorized into two, namely (1) the UTXO Model and (2) the Account-based Transaction Model. On the one hand, uses the quantity of accounts or coins that are not spent and uses that data in order to use that as an input for the whole system, with regards to the remaining amount of coins or accounts.
On the other hand, the mush simpler account-based transaction model simply disseminates the information for the transaction through the whole system. Despite its increase risks compared to the former, this model increases efficiency throughout the whole system.
3 Review the security and privacy Requirements of online transactions, list the seven types and outline how can blockchain transactions become vulnerable to various types of attacks (i.e. tampering, denial-of-service (DDoS), double-spendi...
👀 Other Visitors are Viewing These APA Essay Samples:
- Nursing Delegation: Safety, Prioritization and Caring1 page/≈275 words | 3 Sources | APA | Health, Medicine, Nursing | Essay |
- Coursework: Behavior Seems Most Appropriate at What Age1 page/≈275 words | No Sources | APA | Health, Medicine, Nursing | Essay |
- Correlational Methods1 page/≈275 words | 3 Sources | APA | Health, Medicine, Nursing | Essay |
- Discussion Topic. Nursing shortage. Health, Medicine, Nursing Essay2 pages/≈550 words | 6 Sources | APA | Health, Medicine, Nursing | Essay |
- Practicum Experience - Journal Entry Research Assignment3 pages/≈825 words | 3 Sources | APA | Health, Medicine, Nursing | Essay |
- Older Adults Patient Education Issues Essay and Interview2 pages/≈550 words | 2 Sources | APA | Health, Medicine, Nursing | Essay |
- Relevancy and Believability of Primary Research1 page/≈275 words | 2 Sources | APA | Health, Medicine, Nursing | Essay |