Now 63 visitors
Today:387 Yesterday:464
Total: 28575 1S 0P 0R
2024-06-30, Week 27
Welcome Message
Statistics & History
ICACT Committee
Call For Paper
ICACT-TACT Journal
Paper Archives
Outstanding Papers
Author HomePage
Paper Procedure
Paper Submission
Conference Proceedings
Registration
Presentation Assistant
Travel Information
Photo Gallery
FAQ
Member Login
Scheduler Login
Archives Login
Sponsors
/>

















Paper Number Author:
Paper Title
Keyword
Q&A Number **Select your question number !!
Questioner eMail:
Question
Answer
by
Author
Save Q&A

* Edit or answer any Q&A by selecting Q&A number Hyper Link below + Write button (Save)
ICACT20230046 Question.1
Questioner: fialle@g.skku.edu    2023-02-21 ¿ÀÈÄ 7:48:57
ICACT20230046 Answer.1
Answer by Auhor nanduris@cdac.in   2023-02-21 ¿ÀÈÄ 7:48:57
Chrome Click!!
In the proposed model, sensitive data are stored in the blockchain. The integrity of these data is guaranteed by the blockchain. How can it guarantee the confidentiality of these sensitive data stored in the blockchain? The data that is stored in the Blockchain network can be accessed only by authorized users only as Hyperledger Fabric is a permissioned network. Its not only the user authorization even the application that is used to fetch data from Blockchain also needs to be registered with the system then only authorized users communicating through already registered applications only will be allowed to access the data.
ICACT20230046 Question.2
Questioner: fialle@g.skku.edu    2023-02-21 ¿ÀÈÄ 7:48:41
ICACT20230046 Answer.2
Answer by Auhor nanduris@cdac.in   2023-02-21 ¿ÀÈÄ 7:48:41
Chrome Click!!
How can your model prevent the sensitive data stored in the blockchain (Fabric) from information leakage by internal malicious nodes? Only authenticated users will be allowed to access the data as Fabric supports permissioned Blockchain network. The fabric uses Raft as a consensus algorithm which is nothing but a crash fault tolerant algorithm. If we want to take additional precautions even in permissioned network where only authorized users or nodes can take part, then we can use BFT variant consensus algorithms in Fabric which ensure that the data integrity will never be compromised in the event of malicious nodes. Further, the channel concept of Hyperledger Fabric does not leak the data to all authorized participants until and unless they are all connected through a shared channel. We can create any number of such channels to separate out users, nodes being monitored in to specific groups.