A. Baseera1, Abeer Abdullah Alsadhan2,*
CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538
- 28 July 2022
Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches More >