Skip to main content

Can Blockchain be the Iron Man of Data Security?

 


Recent incident in Cyber Space shown that how vulnerable the data is and how important data security is to the user or an organization. There are various mechanisms out in the market in terms of data protection.

What may be the reason for Data Thefts and Loss of Data Privacy?

Lack of privacy towards the system is becoming more vulnerable to data thefts. For example, using weak passwords and lack of application regarding Cryptography.

Cyber Criminals are finding the vulnerabilities in the system like Thanos finding the Infinity stones.



Blockchain is the Iron Man of the Data Security. Blockchain Architecture will help reduce data theft and data tempering.

What is Blockchain?

Blockchain is growing list of records called blocks which are cryptographically hashed with pervious block. Blockchain follows the Merkle tree Data Structure



Merkle Tree: In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.



How is the Data Security ensured through Blockchain?

Blockchain is mainly classified into two architectures:

1.Permissionless Blockchain

2. Permissioned Blockchain

Permissionless Blockchain

Permissionless blockchains are blockchains that require no permission to join and interact with. They are also known as public blockchains.

Permissioned Blockchain

Permissioned blockchains can be seen as an additional blockchain security system, as they maintain an access control layer to allow certain actions to be performed only by certain identifiable participants.

In order to ensure a safe environment for an user or an organisation we take permissioned Blockchain.

Here, the data is stored in blocks (Data can be login details, User details etc). Once this data is stored in block it is cryptographically hashed with pervious block in the network. Once the data is can be changed or modified. Because it is a permissioned blockchain, it can be accessed only through private key of the user and the access to database is restricted has it permissioned network.

Now, even Thanos cannot delete the data with the snap


Doctor Strange’s time stones cannot modify the data by going into past.


Data stored in Blockchain is has strong secured has Vibranium metal (#Blockchain forever)

So we can call Blockchain has Ironman Data security or Cyber Space


 

Comments

Post a Comment

Popular posts from this blog

Cyberspace awareness during COVID-19

This COVID – 19 pandemic the usage of internet is increased. This pandemic situation became a great opportunity to cybercriminals. To protect our self from the cybercriminals, we need to follow some precautions. Hackers mostly use social engineering techniques to hack your devices.                              Here are some precautions measures to stay secure in this pandemic situations. 1) Banks are not going to ask the customers to pay the loans or bills through emails. As the  government of India cleared order the banks to the postponement of taking bills for three months. Even though if you're paying your debts to please pay the bills by going to the official website of the bank. If you receive any phone call or email stating that they are from the bank and asking to share your card details or PIN or UPI details, please ignore them and report to the bank. 2) Pay the subscription...

Cyber Kurukshetra – An inspiration from the Mahabharata.

  The Mahabharata is an ancient Indian epic where the main story revolves around two branches of a family - the Pandavas and Kauravas - who, in the Kurukshetra War, battle for the throne of Hastinapura. At 100,000 verses, it is the longest epic poem ever written, generally thought to have been composed in the 4th century BCE or earlier. The Mahabharata is written by the Ved Vyas Maharshi. Mahabharata teaches the way of living for a human being. As an inspiration, we can interlink Mahabharata to Cyber Space or Cyber World and take valuable life lessons. We can grab some quick lessons from Mahabharata that will help one in their Cyber Space to stay safe and secured from Cyberattacks. So, this blog will be helping one to stay safe and secure in the Cyberspace. Ashwathama hatha narova kunjarova Explanation: It means  Ashwathama  is dead. And kunjaraha means elephant. But this was used as a ploy to kill  Ashwathama's  father,  Dronacharya . Yudhisthir is kn...