Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

You should start with an Introduction In the introduction you should state your research question that was recorded for you by the academics in your consultation meetings. Discuss the importance of...

1 answer below »
  • You should start with an Introduction
  • In the introduction you should state your research question that was recorded for you by the academics in your consultation meetings.
  • Discuss the importance of the research question and its associated problems and what benefits might possibly be gained if the research proved to be successful
  • Provide a summary of theliterature reviewand the boundary of knowledge you found in reviewing the literature
  • Discuss youmethodology, and data collection techniques, and how it relates to the research question, experimental design etc...
  • There will not be any results.... but discuss how you would analyse the results
  • present any conclusions or initial summary of what you have learned
  • Future directions of any possible research
  • References
GUYS THIS PPT IS VERY IMPORTANT AND CRUCIAL. WE ARE SUPPOSE TO PRESENT IN THE MIDST OF 4 LECTURERES. MAKE SURE THE PPT IS PREPARED IN PROFESSIONAL MANNER AND INCLUDE THE PICTURES, KEY POINTS, GRAPGHS OR ANY USEFUL MATERIAL TO SATISFY THEM.
RESEARCH REPORT IS WITH TOPIC OR TITLE IS ATTACHED BELOW MAKE SURE AGAIN THE PPT IS WELL PREPARED APPROPRIATELY TO THE TOPIC
Answered Same Day Jun 08, 2021

Solution

Deepti answered on Jun 08 2021
165 Votes
PowerPoint Presentation
lockchain and related security issues
Research report presentation
Introduction
Research Question
How can Blockchain technique address challenges in cloud computing strategy and how they can be eliminated?
Importance of the research
The concept of Blockchain technology can secure financial transaction channels for financial institutions. The technology is based on scalable and robust techniques for financial systems. Security is enhanced since the robustness renders complexity to information thus making it difficult to be
eached.
Problems associated with the research
Research gap was recognized with polynomial time algorithm which is a vulnerable cryptographic protocol.
Cloud computing alone in financial transaction is at substantial security risk of information leakage.
Blockchain can be mutable due to soft/ hard fork problem.
Benefits of the research
The confidentiality, protection and transparency against security incidents are better managed with blockchain technology in cloud computing.
RSA-asymmetric key exchange technique ensures security of sensitive information since it is complex to factor integer [1].
Security of encrypted data of users is strengthened with apt authentication.
Blockchain seeks authentication and verification from financial institution before allowing transaction.
Blockchain uses cryptographic technique to transfer data into Blocks [2,3]
Literature Review
Security issues in blockchain systems were studied [4].
Risks were sectioned two categories- Risks to blockchain 1.0 and 2.0, Specific risks to blockchain 2.0
Six attacks- selfish mining, DAO, border gateway protocol (BGP) hijacking, eclipse, liveness, balance attacks
Mechanisms to deal with those attacks were proposed- SmartPool [5], Quantitative framework [6], Oyente [7, 8], Hawk [9], and Town crier [10].
Literature review
Security issues were studied in [11]
majority attacks [12, 13], double-spending attacks [14, 15], stop mining of blocks available, or prevent verification of transaction by a block
Soft Fork, Hard Fork- Cause blockchains to be mutable.
Vulnerabilities and root causes of blockchain identified in [16-18]
Defences and attacks were studied in [19], security concerns on blockchain data [20]
Cryptocu
ency aspect studied- Security issues around bitcoin and cryptocu
ency[21-23, 24]
Research methodology
Comprehensive...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here