Overview of Blockchain Security

Overview of Blockchain Security

Overview of Blockchain Security 150 150 Peter

Overview of Blockchain Security

This week’s reading introduced an overview of blockchain security. Create a new thread, and describe how you would go about ensuring the security of data stored on a public blockchain. Assume that your blockchain app is one that manages prescription drugs for individual patients. Considering each of the elements of the CIA triad, describe how you might protect the blockchain data security. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread, and describe how you would go about ensuring the security of data stored on a public blockchain. Assume that your blockchain app is one that manages prescription drugs for individual patients. Considering each of the elements of the CIA triad, describe how you might protect the blockchain data security. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Sample Paper

Introduction

Block chain is a popular decentralized technology with extensive power to resolve business issues through sustaining digital transactions. The technology employs its unique constituents like transparent transaction processing, decentralized consensus-based governance, open autonomy participations and immutable data recording to the security approach (Manya, 2019). Public block chains are distinct from private block chains because they are permission-less based platforms where information is made publicly available to everyone wishing to engage in the network unlike private one whose data are only accessible by users like consortia and properly authenticated individuals. Block chain security consists of many tiers, each with its own strengths and safety issues. Data layer, network layer, consensus layer, incentive layer, smart contract layer and application layer are separate division of the new block chain structure (Wang, Wang, Cao, Li, & Xiong, 2019). To grasp the function of the system entirely, recognizing how each tier functions and its security assumptions is critical.

Block chain technology comprises of cryptographic algorithms and data structures at the base level. The “blocks” which shape a block chain are intended to store records, which include transactions and other metadata. The block chain’s “chains” uses cryptographic hashes to bind together blocks, to make it even harder to alter or distort the public data, for our case prescription drug information (Wang, Wang, Cao, Li, & Xiong, 2019). During that point, the block chain security is restricted to cryptographic algorithms. Block chain rely primarily on public key cryptography and thus the base level of the block chain is stable if such algorithms are safe and appropriately utilized.

Infringed storage data can harm the credibility of the organization whose records was
breached. In a program including physicians, patients and all other third parties, it is more
important to enforce a security mechanism. Passwords in this framework are not necessarily
enough as the hacker could quickly crack them down. Cryptography is the cornerstone to
maintaining block chain security and interference resistance as well as assurance for the integrity
of the records, authentication as well as block chain’s non-repudiation. The technologies of
blockchain security could benefit from cryptography which utilizes public and private keys
for data encryption. It secures data within a publicly accessible repository which is automatically
and decentrally managed. Following this phase when both private and public keys are
authenticated, the information can be unclicked. In the block chaining, it is always possible to
ensure that the attacker / thief finds all the encrypted files and information on the prescription
drugs useless.

According to the Piscini, Dalton, & Kehoe (2017), based on the CIA triad, full block
chain data encryption seeks to ensure that data is not easily accessible to unauthorized entities
during transit especially through unauthorized networks. Block chain could provide advanced
safety controls, in accordance with such criteria by utilizing the PKI (public key infrastructure)
to authenticate, authorize entities and encrypt communications between the medical care, drug
prescription and patients. Data encryption, data digestion, or digital signature are instances of
how system owners can guarantee the prescription drugs’ data integrity regardless its
stage. Block chain’s functionality, immutability and traceability now give companies a way to
ensure the integrity of records. Decentralization and peer-to – peer features of the block
chain technology make it difficult to compromise drug information than traditional centralized
network architectures like client servers.

Conclusion

At this early stage of growth, the Block chain technology remains persistent. From the fundamental infrastructure to the top, there are several problems with security of technology either because of its weaknesses or potential attacks of every layer of the block chain. Interestingly, integrity, confidentiality and scalability are critical aspects in block chain protection and security. This discussion covers some of the ways to ensuring data security on a public block chain.