wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Blockchain

profile
Ronak Gala
Nov 13, 2021
0 Likes
0 Discussions
67 Reads

Blockchain is a chain of blocks that contain information. Each block contains 3 elements, viz, transaction data, a hash of the block and a hash of the previous block [5]. A data can be any raw data that is stored inside the block, it can be details of a transaction stating the sender, the receiver and the amount transferred, it can also be any medical records of patient along with patient’s name and basic information in it, etc. Every blockchain has a hash, hash is a cryptographic code. We can say that a hash is a fingerprint for a block, which means every block has a unique hash. If the data of the block has been changed it will cause in a change in the hash of the block. Thus making it more secure to know that if any block has been manipulated. A block also has a hash of its previous block, which makes it a chain of blocks as every block will show the connection to a previous block and making it a chain of blocks. If the data of any block is manipulated the hash of that particular block changes resulting in disruption in chain as the next block will not be linked to any block, because it holds the hash of the unchanged block.

The first block will always have the previous hash value as zero because it is not linked to any previous block and it is also called as the genesis block. These interconnected blocks supports the decentralization of systems and ensures that the data is securely distributed and publicly visible. People also say that blockchain is a public distributed ledger.

Blockchain uses a P2P network, Peer to Peer network, where everyone is allowed to join. In this, every user or node gets a full copy of the blockchain. If someone creates a new block, it is sent to everyone in the network. Each node verifies the block to check if it is tampered or not and then if everything goes right they will add the block to their chain of blocks. If a node changes or tampers any block then the whole copy is sent to all the nodes to verify if the transaction or change was valid then every node will accept the new blockchain or else will reject it. This gives security in data, if any hacker tries to change a block then he has to hack all the nodes to accept the change or change every block. This is quite difficult and thus makes the data more secure. In any centralized database system only the admin can alter the data, i.e. to add, remove and edit any row or column of the data, but in blockchain there is no centralised system, many transactions occur at the same time, so the one doing the transaction makes a new block which consists the details of the transaction. The node that created the block has to prove that the work done qualifies them to get the right to add a new transaction, i.e. a block. This method is a type of consensus method known as Proof-Of-Work.


Comments ()


Sign in

Read Next

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Virtual machine

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Multicore CPUs

Blog banner

HR Automation : Need of the hour

Blog banner

INSTAGRAM

Blog banner

Virtual Memory

Blog banner

Direct Memory Access

Blog banner

Understanding - Proof of Work!

Blog banner

Sagar Parikrama

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Deadlock Prevention

Blog banner

Privacy LAWs in IT

Blog banner

Texting is actually better than talking in person

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Compromising Mobile Platforms

Blog banner

Broken Authentication Attacks

Blog banner

Modern Operating system

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

About myself

Blog banner

TEAMWORK

Blog banner

How Men and Women Process Pain Differently

Blog banner

Privacy in Social Media and Online Services

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Virtual Machine

Blog banner

Importance of self defence for girls

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Introduction my self

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Art and Culture of Rajasthan

Blog banner

Computer Security

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Uniprocessor Scheduling

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Landslide Hazard

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner