ANN Based Block Chain Security Threat Mechanism
Pranab Kumar Bharimalla1, Souratendu Praharaj2, Satya Ranjan Dash3
1Pranab Kumar Bharimalla, School of Computer Science and Engineering, KIIT, Deemed to be University, Bhubaneswar, India.
2Souratendu Praharaj, Infosys Limited, Bhubaneswar, India.
3Satya Ranjan Dash, School of Computer Applications, KIIT, Deemed to be University, Bhubaneswar, India.
Manuscript received on 05 August 2019 | Revised Manuscript received on 10 August 2019 | Manuscript published on 30 August 2019 | PP: 2672-2679 | Volume-8 Issue-10, August 2019 | Retrieval Number: J94420881019/19©BEIESP | DOI: 10.35940/ijitee.J9442.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: IBlockchain was first introduced to the world in a form of crypto currency. Since then it’s grabbing popularity day by day and has already started changing lifestyle and business process in some areas. The Blockchain is a data structure, and consists of time-stamped list of blocks, used to create a digitally secured, transactional ledger that, facilitates the process of recording transactions and tracking assets in a distributed business network instead of resting with a single provider. It brings a paradigm shift from the conventional way of storing transactional data, exchanging value, assets decentralizing and sharing data across a large network of untrusted participants without intervention of any centralized trusted agency, but still building a trusted system without compromising data integrity, security and reliability. This paper is based on survey of different consensus mechanisms already available so far and an introduce our own approach to tack one of the security threats by introducing a Neural Network to the consensus mechanism of Blockchain.
Index Terms: Block Chain, Cryptocurrency, Security Threats, Double Spending, Deep Learning
Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy