Now 16 visitors
Today:355 Yesterday:464
Total: 28528 1S 0P 0R
2024-06-30, Week 27
Welcome Message
Statistics & History
ICACT Committee
Call For Paper
ICACT-TACT Journal
Paper Archives
Outstanding Papers
Author HomePage
Paper Procedure
Paper Submission
Conference Proceedings
Registration
Presentation Assistant
Travel Information
Photo Gallery
FAQ
Member Login
Scheduler Login
Archives Login
Sponsors
/>

















IEEE/ICACT20230046 Question.2
Questioner: fialle@g.skku.edu    2023-02-21 ¿ÀÈÄ 7:48:41
IEEE/ICACT20230046 Answer.2
Answer by Auhor nanduris@cdac.in   2023-02-21 ¿ÀÈÄ 7:48:41
How can your model prevent the sensitive data stored in the blockchain (Fabric) from information leakage by internal malicious nodes? Only authenticated users will be allowed to access the data as Fabric supports permissioned Blockchain network. The fabric uses Raft as a consensus algorithm which is nothing but a crash fault tolerant algorithm. If we want to take additional precautions even in permissioned network where only authorized users or nodes can take part, then we can use BFT variant consensus algorithms in Fabric which ensure that the data integrity will never be compromised in the event of malicious nodes. Further, the channel concept of Hyperledger Fabric does not leak the data to all authorized participants until and unless they are all connected through a shared channel. We can create any number of such channels to separate out users, nodes being monitored in to specific groups.

Select Voice