Abstract
In recent years, the emergence of blockchain technology (blockchain) has become a singular, most tumultuous, and trending technology. The decentralized info in blockchain underscores information security and confidentiality. Also, the agreement mechanism in it makes positive that information is secured and legit. Throughout this paper, we have got coated the analysis on combining blockchain and machine learning technologies and demonstrate that they are attending to collaborate with efficiency and effectiveness. Machine learning might even be a general language that comes with a spread of methods, machine learning, deep learning, and reinforcement learning. These ways square measure the core technology for big information analysis. As a distributed and append-only ledger system, a blockchain can be a natural tool for sharing and handling massive information from varied sources through the incorporation of good contracts. Additional expressly, blockchain will shield information security and promote information sharing. It also permits various countries to utilize distributed computing powers, for instance, IoT, for developing on-time prediction models with varied sources of knowledge. Blockchain systems can also generate large amounts of useful data from completely different sources, and the knowledge domain analysis on combining the two technologies is of nice potential and the combination of machine learning and blockchain will give extremely precise results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Manubot
Lamport L, Robert S, Marshall P (2019) The Byzantine generals problem. In: Concurrency: the works of Leslie Lamport, pp 203–226
Osipkov I, Eugene YV, Nicholas H, Yongdae K (2007) Combating double-spending using cooperative P2P systems. In: 27th international conference on distributed computing systems (ICDCS'07), pp 41–41. IEEE
Hoepman J (2007) Distributed double spending prevention. In: International workshop on security protocols, pp 152–165. Springer, Berlin, Heidelberg
Gilbert H, Helena H (2003) Security analysis of SHA-256 and sisters. In: International workshop on selected areas in cryptography, pp 175–193. Springer, Berlin, Heidelberg
Hodges A (2012) Alan Turing: the enigma. Random House
Tanwar S, Qasim B, Pruthvi P, Aparna K, Pradeep KS, Wei-Chiang H (2019) Machine learning adoption in blockchain-based smart applications: the challenges, and a way forward. IEEE Access8, 474–488.
Hardjono T, Alex P (2019) Verifiable anonymous identities and access control in permissioned blockchains.: arXiv preprint arXiv:1903.04584
Liu Y, Zheng Z, Guibing G, Xingwei W, Zhenhua T, Shuang W (2017) An identity management system based on blockchain. In: 2017 15th annual conference on privacy, security, and trust (PST), pp. 44–4409. IEEE
Gervais A, Ghassan OK, Karl W, Vasileios G, Hubert R, Srdjan C (2016) On the security and performance of proof of work blockchains. In: Proceedings of 2016 ACM SIGSAC conference on computer and communications security, pp 3–16
Lu Y, Qiang T, Guiling W (2018) On enabling machine learning tasks atop public blockchains: A crowdsourcing approach. In: 2018 IEEE international conference on data mining workshops (ICDMW), pp 81–88. IEEE
Dinh TT, Ji W, Gang C, Rui L, Beng CO, Kian-LT (2017) Blockbench: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM international conference on management of data, pp 1085–1100
Luu L, Jason T, Raghav K, Prateek S (2015) Demystifying incentives in the consensus computer. In: Proceedings of 22nd ACM SIGSAC conference on computer and communications security, pp 706–719
LeCun Y, Yoshua B, Geoffrey H (2015) Deep learning. Nature 521(7553): 436–444
Namanya AP, Andrea C, Irfan UA, Jules PD (2018) The world of malware: an overview. In: 2018 IEEE 6th international conference on future internet of things and cloud (FiCloud), pp 420–427
Krit S, Elbachir H (2017) Overview of firewalls: types and policies: managing windows embedded firewall programmatically. In: 2017 international conference on engineering & MIS (ICEMIS), pp 1–7
Betarte G, Eduardo G, Rodrigo M, Alvaro P (2018) Improving web application firewalls through anomaly detection. In: 17th IEEE international conference on machine learning and applications (ICMLA), pp 779–784. IEEE
Kuzmin A, Evgeny Z (2018) Blockchain-base structures for a secure and operate network of semi-autonomous unmanned aerial vehicles. In: 2018 IEEE international conference on service operations and logistics, and informatics (SOLI), pp. 32–37. IEEE
Pop C, Tudor C, Marcel A, Ionut A, Ioan S, Massimo B (2018) Blockchain based decentralized management of demand response programs in smart energy grids. Sensors 18(1):162
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Diwan, P., Khandelwal, B., Dewangan, B.K. (2023). Ensuring Data Protection Using Machine Learning Integrating with Blockchain Technology. In: Saini, H.S., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. ICICSE 2022. Lecture Notes in Networks and Systems, vol 565. Springer, Singapore. https://doi.org/10.1007/978-981-19-7455-7_27
Download citation
DOI: https://doi.org/10.1007/978-981-19-7455-7_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7454-0
Online ISBN: 978-981-19-7455-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)