|
Blockchain technologies in e-government
|
bet | 2/6 | Sana | 08.07.2024 | Hajmi | 115,76 Kb. | | #267016 |
Bog'liq BLOCKCHAIN TECHNOLOGIES IN E-GOVERNMENTLITERATURE REVIEW
Bitcoin is a digital currency that brings disruptive innovation to the traditional transaction environment which relies on third parties (Chang and Chen, 2020). Blockchain, as the underlying technology, has recently received much attention from industry and academia (Saberi et al., 2019). The heart of blockchain is the recording of all transaction data into blocks and the linking of those blocks into a chain (Queiroz and Wamba, 2019). Each block has a body with transaction data and a header with the hash value of the block before it, which is customarily called the “parent” block. This lets each block be linked vertically to be found or identified easily (Zheng et al., 2017). Fig. 1 illustrates the architecture of blockchain. The blocks with timestamps are chained by hash values, which are unique, and can prevent fraud because any changes in the block will immediately cause a change of the hash value (Nofer et al., 2017) The three fundamental mechanisms of blockchain that make it unique are the distributed ledger, encryption, and consensus mechanism (Beck et al., 2017). There are two main architectures of software systems: centralised and distributed (Tama et al., 2017). A blockchain-based database can be considered a distributed system with an implementation layer that offers protection for data integrity (Drescher, 2017), because in this distributed system, all the transactions will be consistently recorded in the ledgers of all the participants. Rather than relying on a central server to store and validate data, each node in this network has a duplicate of the ledger, which can be updated independently (Trump et al., 2018). To prevent unauthorised changes, the transaction data will be encrypted using various algorithms and signed with a digital signature (Gorkhali et al., 2020). Chandel et al. (2019) indicated that the Elliptic Curve Cryptography (ECC) algorithm and the Rivest-Shamir-Adleman (RSA) algorithm are the two most common encryption algorithms in blockchain, both of which belong to asymmetric encryption.
|
| |