Ensuring Data Integrity: Towards a Blockchain-Based Platform to Share the Datasets

Takia Islam, D. K. Tonoy Kumar, Sheikh Shah Mohammad Motiur Rahman, Md. Ismail Jabiullah, Mamoun Alazab, A. S. M. Kayes

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)

    Abstract

    In the case of sharing the datasets, the central authority-based storage has depended solely on extensive capacity of suppliers, who actually act as trusted third parties to exchange and store information. This model represents various issues, including information accessibility and data security. The blockchain is able to maintain transaction without central authority. It is an imaginative innovation that opened ways to new applications for tackling various issues in distributed environment. The primary objective of this chapter is to ensure the data integrity of publicly shared datasets for researchers. To achieve this goal, a decentralized blockchain-based architecture has been proposed in this study. A theoretical foundation has been broadly discussed and debated to establish the effectiveness of the proposed architecture. To ensure data security and integrity, the SHA256 hash function and asymmetric encryption algorithm are used. Also, a combination of consortium and public blockchain technology is utilized. This study leads to the base of developing a secure data sharing platform.
    Original languageEnglish
    Title of host publicationBlockchain for Cybersecurity and Privacy
    Subtitle of host publicationArchitectures, Challenges, and Applications
    EditorsYassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
    Place of PublicationBoca Raton
    PublisherCRC Press
    Chapter14
    Pages323-338
    Number of pages16
    Edition1
    ISBN (Electronic)9780429324932
    ISBN (Print)9780367343101
    DOIs
    Publication statusPublished - Aug 2020

    Fingerprint

    Dive into the research topics of 'Ensuring Data Integrity: Towards a Blockchain-Based Platform to Share the Datasets'. Together they form a unique fingerprint.

    Cite this