<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Archiving and Interchange DTD v2.3 20070202//EN" "archivearticle.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="methods-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Bohr. Scit.</journal-id>
<journal-title>BOHR International Journal of Smart Computing and Information Technology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Bohr. Scit.</abbrev-journal-title>
<issn pub-type="epub">2583-2026</issn>
<publisher>
<publisher-name>BOHR</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.54646/bijscit.2023.36</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Methods</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>An improvement in the safety of big data using blockchain technology</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Archana</surname></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Aggarwal</surname> <given-names>Gaurav</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c002"><sup>&#x002A;</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Department of Computer Science, Govt. PG College for Women</institution>, <addr-line>Rohtak</addr-line>, <country>India</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Computer Science, Jagannath University</institution>, <addr-line>Jhajjar</addr-line>, <country>India</country></aff>
<author-notes>
<corresp id="c001">&#x002A;Correspondence: Archana, <email>archana300030@gmail.com</email></corresp>
<corresp id="c002">Gaurav Aggarwal, <email>gauravaggarw@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>24</day>
<month>08</month>
<year>2023</year>
</pub-date>
<volume>4</volume>
<issue>1</issue>
<fpage>50</fpage>
<lpage>54</lpage>
<history>
<date date-type="received">
<day>25</day>
<month>07</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>12</day>
<month>08</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2023 Archana and Aggarwal.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Archana and Aggarwal</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>The development of big data in the information technology sector has made data management and analysis far more challenging. It is necessary to take into account everything, including volume, variety, speed, value, and complexity. Clustering makes the processing of vast volumes of data simpler. This is especially helpful when working with unstructured data. By the usage of cloud computing, which makes use of the internet as its delivery channel, it is possible to provide a variety of computer services, including servers, storage, databases, and networking, in addition to analytics and intelligence, at a lower cost. The main problem is the security of such big amounts of data. One way to enforce strong security is blockchain technology which is also the backbone of cryptocurrency. The distributed, incontrovertible, and publicly verifiable record of every transaction activity that may be provided by blockchain technology has the potential to revolutionize security in a big way for different industries.</p>
</abstract>
<kwd-group>
<kwd>big data</kwd>
<kwd>security</kwd>
<kwd>block chain</kwd>
<kwd>clustering</kwd>
<kwd>inconsistency</kwd>
</kwd-group>
<counts>
<fig-count count="1"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="25"/>
<page-count count="5"/>
<word-count count="3328"/>
</counts>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>Introduction</title>
<p>Big data is a reference to the ever-increasing amount of data that cannot be processed by traditional database techniques. Due to its huge size, unstructured as well as structured data, and complexity, standard data management technologies are unable to effectively store or process the information. Some examples of big data include the following: New York Stock Exchange, which generates around one terabyte worth of fresh trading data every single day. The estimates provided by Facebook indicate that more than 500 gigabytes of fresh data are being uploaded to the site&#x2019;s databases on a daily basis. The key ways in which these data are collected include users uploading photographs and videos, engaging in discussions with one another, posting comments, and so on.</p>
</sec>
<sec id="S2">
<title>Characteristics of big data</title>
<p>Big data can be described by the following characteristics:</p>
<list list-type="simple">
<list-item>
<label>a)</label>
<p>Volume: The phrase &#x201C;big data&#x201D; refers to an extremely large quantity of data. When you have access to a vast amount of information, it is essential to make the most of its potential applications. The quantity of information that is required to categorize anything is one major aspect that determines whether or not it is considered &#x201C;big data.&#x201D; The volume of data is particularly high in banking and other financial institutions, social media, and entertainment industries.</p>
</list-item>
<list-item>
<label>b)</label>
<p>Variety: The second facet of big data that has to be taken into consideration is its level of diversity. The concepts of structured and unstructured data are both included under the umbrella word &#x201C;variety.&#x201D; In the past, the majority of applications did little more than save data in spreadsheets and databases and then retrieve it when necessary. At the moment, analytical applications make use of a broad variety of data sources with structured, semi-structured, as well as unstructured data; some examples of which include emails, photographs, videos, documents in PDF format, monitoring devices, and audio recordings. Data storage, data mining, and data analysis are all made more challenging by the presence of unstructured data.</p>
</list-item>
<list-item>
<label>c)</label>
<p>Velocity: In the context of big data, the word &#x201C;velocity&#x201D; refers to the pace at which new data are generated. The speed at which new data are generated and processed will influence how much of the data&#x2019;s potential can be realized. What is known as &#x201C;Big Data Velocity&#x201D; is a concept that was developed as a result of the contributions made by business processes, log files, networks, social media, sensors, and mobile devices. There is a rapid flow of information that involves a significant volume of data. The velocity of data is particularly high for the banking, healthcare, and manufacturing sectors.</p>
</list-item>
<list-item>
<label>d)</label>
<p>Inconsistency: It may be difficult to efficiently manage and analyze the data due to the variability that may arise in the data. This makes it a potential challenge.</p>
</list-item>
</list>
</sec>
<sec id="S3">
<title>Advantages of big data processing</title>
<p>There are several reasons why big data processing is beneficial:</p>
<list list-type="simple">
<list-item>
<label>1.</label>
<p>Businesses have the option of incorporating outside information into decision-making. Due to the availability of social data gleaned from search engines and sites such as Facebook and Twitter, organizations are able to fine-tune their business plans according to user sentiment and changes in choices.</p>
</list-item>
<list-item>
<label>2.</label>
<p>Improved customer service: Conventional means of gathering input from customers are being phased out in favor of big data technology. With these new platforms, the responses received from customers are studied and assessed with the use of big data and natural language processing technologies.</p>
</list-item>
<list-item>
<label>3.</label>
<p>An early evaluation of any possible risks that may be associated with the product or service will lead to preventive actions for the risks.</p>
</list-item>
<list-item>
<label>4.</label>
<p>The big data environment allows for the pre-processing of larger data sets before they are transferred to the warehouse, which improves the operational efficiency of the business. The combination of big data and data warehouses also assists businesses in offloading data that are needed less often.</p>
</list-item>
</list>
</sec>
<sec id="S4">
<title>Cluster</title>
<p>In a computer cluster, two or more individual computers, also known as nodes, collaborate with one another to carry out a specific task. Because of this, it is feasible to distribute huge tasks that can be done in parallel throughout the nodes that make up the cluster. Performance is boosted as a result of the fact that the combined memory and processing capabilities of each machine may benefit a variety of operations. Since each individual node in a computer cluster has to be able to interact with the other nodes in the cluster, the building of a computer cluster requires the use of an internodes network. In order to construct a cluster, the nodes must first be connected via the use of cluster software. A storage device that is shared across the nodes and/or a storage device that is local to each node are both potential solutions. It is common practice to designate at least one of the nodes as a leader node, which then operates as the entry point for the cluster. This node could be in charge of delegating responsibilities to the subordinates and, if that is required, gathering the results before relaying them to an external party. Also, the communication between nodes in a cluster has to be optimized so that latency may be reduced and bottlenecks can be avoided.</p>
</sec>
<sec id="S5">
<title>Blockchain technology</title>
<p>Blockchain technology is the term that describes the technical basis upon which Bitcoin currency is built. Because of this technology, it is possible to carry out any transaction in a way that is not governed by any central authority. The participation of a middleman or broker is not required in order for it to take place. As it creates records of transactions that are decentralized, unchangeable, and publicly verifiable, Blockchain technology has the potential to revolutionize a wide variety of industries.</p>
<p>Blockchains store the data differently from standard databases, which store the data in rows and columns that are hash-linked together, while blockchains store the data in blocks that are cryptographically connected together. Each new piece of information that is received results in the creation of a new block in the database. After a block has been filled with information, the data included inside it are connected to one another in the order that chronological events occurred.</p>
<p>While a blockchain may be used to store a wide range of data types, the use that has proven to be the most successful to this point is that of a ledger for the recording of financial transactions. There is not a single person or group in control of Bitcoin&#x2019;s use of the blockchain; rather, all users collectively hold the reins. Blockchain is used to record transactions related to Bitcoin transactions. With the use of blockchains, digital information may be saved and distributed, but it cannot be changed once it has been recorded. Because of this, a blockchain may be used as the foundation for immutable ledgers, which are essentially recordings of transactions that are incorruptible in any way. Blockchains are often referred to as &#x201C;distributed ledger technology&#x201D; as a direct consequence of this fact.</p>
<sec id="S5.SS1">
<title>Features of blockchain technology</title>
<p>The key points depicting features of blockchain technology are cited ahead:</p>
<list list-type="simple">
<list-item>
<label>a)</label>
<p>Immutability is the state of being incapable of undergoing any kind of change or transformation. This is an essential component of blockchain that assures the long-term survival of the technology as it is a network that cannot be altered and is permanent.</p>
</list-item>
<list-item>
<label>b)</label>
<p>Decentralized: As the network is decentralized, there is not a single person who is in charge of supervising the infrastructure. This means that security and privacy are not compromised. Decentralization of the network is ensured through the use of a dispersed collection of nodes that are responsible for its management. It is able to store anything of value, including Bitcoins, important documents, contracts, and other valuable digital assets. After then, with the assistance of the blockchain, you will be able to have direct control over them by making use of your private key. As a consequence of this, the general public regains both control and ownership of the assets as a result of the decentralized structure.</p>
</list-item>
<list-item>
<label>c)</label>
<p>Improved security: In the blockchain, every piece of data is encrypted and hashed using a new method each time. This provides an additional layer of protection against unauthorized access. To put it another way, the information provided by the network hides the fundamental characteristics of the data. Mathematical techniques may be used to any data as an input to generate various values, but the length of the output always stays the same. A one-of-a-kind identification is assigned to each individual piece of data. In the ledger, each new block is given its own one-of-a-kind hash and also includes the hash of the block that came before it. A fresh set of hash IDs will be generated in the event that the data are altered in any way. And even that is a bit of a stretch, to say the least. The user is going to need both a private key and a public key in order to get access to the data.</p>
</list-item>
<list-item>
<label>d)</label>
<p>Hashing cannot be undone in any case. Hashing is a very complicated process, and it is not feasible to modify or undo it in any way. Nobody will ever be able to take a public key and turn it into a private key.</p>
</list-item>
<list-item>
<label>e)</label>
<p>Distributed ledger: With a public ledger, this information is often accessible to anybody who is a member of the general public. There is nowhere to run since everything is out in the open. There is, however, an exception to this general rule for blockchains that are either private or federated. In spite of this, a significant number of users are able to see the ledger at any one time under these circumstances. As a consequence of this, the ledger that represents the network is continually updated by everyone else who is using the system. This distributed the processing power among the several machines in order to get a more favorable outcome.</p>
</list-item>
<list-item>
<label>f)</label>
<p>Consensus: The techniques used to reach consensus are essential to the operation of any blockchain. The intelligent design of this architecture is based on consensus algorithms, which serve as its foundation. Every blockchain has to have a consensus in order to function properly. The network&#x2019;s ability to reach a consensus is directly responsible for the credibility of the network. The nodes that make up a network may not have much confidence in one another, but they could have faith in the algorithms that drive it. As a consequence of this, the blockchain is improved by every decision that is taken on the network. Using the blockchain provides this as one of its many benefits.</p>
</list-item>
<list-item>
<label>g)</label>
<p>Quicker settlement: The processing of transactions via traditional banking systems may often take a very lengthy period. But, with the assistance of blockchains and other contemporary systems, monetary transactions may be completed in a shorter amount of time, saving the user important time.</p>
</list-item>
</list>
</sec>
<sec id="S5.SS2">
<title>Role of blockchain in big data</title>
<p>The fact that everything that takes place on a blockchain is encrypted makes it capable of providing the greatest possible degree of security. In a similar fashion, the data that are saved on the blockchain cannot be changed. To be on the safe side, the file signatures of all of the nodes in the network may be checked across all of the ledgers in the network to make sure that they have not been altered. If the record is modified in any way, the signature will no longer be valid.</p>
<p>The applications of big data and blockchain are mutually beneficial. Big data technologies can handle any data, regardless of its variety, velocity, or volume. Blockchain applications simplify operations in any industry. The traditional information processing architecture and business transaction processing have been rendered obsolete as big data and blockchain technologies have grown over the last several years. This has made it possible to abandon these processes. It is necessary for big data to have processing power that is capable of handling big data&#x2019;s processing capacity; conversely, big data requires processing power that is capable of handling the complexity of blockchain and its fast growth.</p>
<p>This sheds light on several implementations of blockchain technology in big data among various industries:</p>
<list list-type="simple">
<list-item>
<label>1.</label>
<p>Accelerating the financial services sector, the combination of blockchain technology and large amounts of data held by financial institutions will make it possible to estimate risk and spot suspicious trends in real time. Making use of blockchain technology as a way of conducting transactions would assist to safeguard banks and their clients from fraud, speed up the process of transactions, and minimize the cost of transferring money between accounts. For instance, in the most recent few years, in order to streamline the process of moving money from one bank account to another using technology known as blockchain, an association consisting of 47 Japanese banks joined a blockchain business known as Ripple. The goal here is to carry out real-time transfers while minimizing associated costs. The cost of conventional real-time transactions is high because of the possibility of risk factors such as double spending, which may be avoided with blockchain technology.</p>
</list-item>
<list-item>
<label>2.</label>
<p>Security in businesses other than banking: Businesses in healthcare, public administration, and other areas have begun adopting blockchain technology to manage data and thwart hacking attempts and avoid data breaches.</p>
</list-item>
<list-item>
<label>3.</label>
<p>Monitoring of the supply chain: A blockchain is employed to maintain tabs on the commodities that make up the supply chain, and a mobile app is utilized to monitor the locations of these commodities as they move. Walmart is a wonderful example of this as it uses the technology of blockchains to enhance food safety by allowing for more accurate monitoring of items from the farm to the shop shelf. Users have the ability to get credible information on the provenance of their food while using this strategy (<xref ref-type="fig" rid="F1">Figure 1</xref>).</p>
</list-item>
</list>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>Research methodology.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="bijscit-2023-36-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="S6" sec-type="conclusion">
<title>Conclusion</title>
<p>The proposed research is supposed to be capable to resolve the security issue in big data using blockchain. This research would provide a solution to confirm the impact of blockchain on big data security. The goal of the proposed work is to make use of big data with blockchain applicable in real-life scenario. The proposed work offers a broad range of options and flexibility. Improved precision and efficiency are expected as a result of this investigation. The proposed work provides a wide range of possibilities and adaptability.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1"><label>1.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mechkaroska</surname> <given-names>D</given-names></name> <name><surname>Popovska-mitrovikj</surname> <given-names>A</given-names></name> <name><surname>Dimitrova</surname> <given-names>V</given-names></name></person-group>. <article-title>Secure big data and IoT with implementation of blockchain technology.</article-title> <source><italic>Int Sci J Secur Fut.</italic></source> (<year>2018</year>) <volume>185</volume>:<fpage>183</fpage>&#x2013;<lpage>5</lpage>.</citation></ref>
<ref id="B2"><label>2.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tariq</surname> <given-names>N</given-names></name> <name><surname>Asim</surname> <given-names>M</given-names></name> <name><surname>Al-Obeidat</surname> <given-names>F</given-names></name> <name><surname>Zubair Farooqi</surname> <given-names>M</given-names></name> <name><surname>Baker</surname> <given-names>T</given-names></name> <name><surname>Hammoudeh</surname> <given-names>M</given-names></name><etal/></person-group> <article-title>The security of big data in fog-enabled IoT applications including blockchain: a survey.</article-title> <source><italic>Sensors</italic></source> (<year>2019</year>) <volume>19</volume>:<issue>1788</issue>. <pub-id pub-id-type="doi">10.3390/s19081788</pub-id></citation></ref>
<ref id="B3"><label>3.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ferrag</surname> <given-names>MA</given-names></name> <name><surname>Maglaras</surname> <given-names>L</given-names></name> <name><surname>Janicke</surname> <given-names>H</given-names></name></person-group>. <article-title>Blockchain and its role in the internet of things.</article-title> In: <person-group person-group-type="editor"><name><surname>Kavoura</surname> <given-names>A</given-names></name> <name><surname>Kefallonitis</surname> <given-names>E</given-names></name> <name><surname>Giovanis</surname> <given-names>A</given-names></name></person-group> <role>editors</role>. <source><italic>Strategic innovative marketing and tourism.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2019</year>). p. <fpage>1029</fpage>&#x2013;<lpage>38</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-12453-3_119</pub-id></citation></ref>
<ref id="B4"><label>4.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dujak</surname> <given-names>D</given-names></name> <name><surname>Sajter</surname> <given-names>D.</given-names></name></person-group> <source><italic>Blockchain applications in supply.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name> (<year>2019</year>). <pub-id pub-id-type="doi">10.1007/978-3-319-91668-2_2</pub-id></citation></ref>
<ref id="B5"><label>5.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Valdeolmillos</surname> <given-names>D</given-names></name> <name><surname>Mezquita</surname> <given-names>Y</given-names></name> <name><surname>Gonz&#x00E1;lez-Briones</surname> <given-names>A</given-names></name> <name><surname>Prieto</surname> <given-names>J</given-names></name> <name><surname>Corchado</surname> <given-names>JM</given-names></name></person-group>. <article-title>Blockchain technology: a review of the current challenges of cryptocurrency.</article-title> <source><italic>Proceedings of the blockchain and applications international congress.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2020</year>). p. <fpage>153</fpage>&#x2013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-23813-1_19</pub-id></citation></ref>
<ref id="B6"><label>6.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bertino</surname> <given-names>E</given-names></name> <name><surname>Ferrari</surname> <given-names>E</given-names></name></person-group>. <article-title>Big data security and privacy.</article-title> In: <person-group person-group-type="editor"><name><surname>Flesca</surname> <given-names>S</given-names></name> <name><surname>Greco</surname> <given-names>S</given-names></name> <name><surname>Masciari</surname> <given-names>E</given-names></name> <name><surname>Sacc&#x00E0;</surname> <given-names>D</given-names></name></person-group> <role>editors</role>. <source><italic>A comprehensive guide through the Italian database research over the last 25 years.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2018</year>). p. <fpage>425</fpage>&#x2013;<lpage>39</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-61893-7_25</pub-id></citation></ref>
<ref id="B7"><label>7.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Babar</surname> <given-names>M</given-names></name> <name><surname>Arif</surname> <given-names>F</given-names></name></person-group>. <article-title>Real-time data processing scheme using big data analytics in internet of things based smart transportation environment.</article-title> <source><italic>J Ambient Intell Human Comput.</italic></source> (<year>2018</year>) <volume>10</volume>:<fpage>4167</fpage>&#x2013;<lpage>77</lpage>. <pub-id pub-id-type="doi">10.1007/s12652-018-0820-5</pub-id></citation></ref>
<ref id="B8"><label>8.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dasgupta</surname> <given-names>D</given-names></name> <name><surname>Shrein</surname> <given-names>JM</given-names></name> <name><surname>Datta</surname> <given-names>K</given-names></name></person-group>. <article-title>A survey of blockchain from security perspective.</article-title> <source><italic>J Bank Financ Technol.</italic></source> (<year>2018</year>) <volume>3</volume>:<fpage>1</fpage>&#x2013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1007/s42786-018-00002-6</pub-id></citation></ref>
<ref id="B9"><label>9.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kumar</surname> <given-names>A</given-names></name> <name><surname>Abhishek</surname> <given-names>K</given-names></name> <name><surname>Nerurkar</surname> <given-names>P</given-names></name> <name><surname>Khosravi</surname> <given-names>MR</given-names></name> <name><surname>Rukunuddin</surname> <given-names>M</given-names></name> <name><surname>Shankar</surname> <given-names>A</given-names></name></person-group>. <article-title>Big data analytics to identify illegal activities on bitcoin blockchain for IoMT.</article-title> <source><italic>Pers Ubiquit Comput.</italic></source> (<year>2021</year>) <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1007/s00779-021-01562-z</pub-id></citation></ref>
<ref id="B10"><label>10.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meng</surname> <given-names>Y</given-names></name> <name><surname>Nazir</surname> <given-names>S</given-names></name></person-group>. <article-title>A decision support system for the uses of lightweight blockchain designs for P2P computing.</article-title> <source><italic>Peer Peer Netw Appl.</italic></source> (<year>2021</year>) <volume>14</volume>:<fpage>2708</fpage>&#x2013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1007/s12083-021-01083-9</pub-id></citation></ref>
<ref id="B11"><label>11.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Niranjanamurthy</surname> <given-names>M</given-names></name> <name><surname>Nithya</surname> <given-names>BN</given-names></name> <name><surname>Jagannatha</surname> <given-names>S</given-names></name></person-group>. <article-title>Analysis of blockchain technology: pros, cons and SWOT.</article-title> <source><italic>Cluster Comput.</italic></source> (<year>2018</year>) <volume>22</volume>. <pub-id pub-id-type="doi">10.1007/s10586-018-2387-5</pub-id></citation></ref>
<ref id="B12"><label>12.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Singh</surname> <given-names>SP</given-names></name> <name><surname>Nayyar</surname> <given-names>A</given-names></name> <name><surname>Kumar</surname> <given-names>R</given-names></name> <name><surname>Sharma</surname> <given-names>A</given-names></name></person-group>. <article-title>Fog computing: from architecture to edge computing and big data processing.</article-title> <source><italic>J Supercomput.</italic></source> (<year>2019</year>) <volume>75</volume>:<fpage>2070</fpage>&#x2013;<lpage>105</lpage>. <pub-id pub-id-type="doi">10.1007/s11227-018-2701-2</pub-id></citation></ref>
<ref id="B13"><label>13.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>P</given-names></name> <name><surname>Lu</surname> <given-names>Q</given-names></name> <name><surname>Hu</surname> <given-names>X</given-names></name> <name><surname>Gu</surname> <given-names>S</given-names></name> <name><surname>Yang</surname> <given-names>L</given-names></name> <name><surname>Min</surname> <given-names>M</given-names></name><etal/></person-group> <article-title>Latest progress of the Chinese meteorological satellite program and core data processing technologies.</article-title> <source><italic>Adv Atmos Sci.</italic></source> (<year>2019</year>) <volume>36</volume>:<fpage>1027</fpage>&#x2013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1007/s00376-019-8215-x</pub-id></citation></ref>
<ref id="B14"><label>14.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Azmoodeh</surname> <given-names>A</given-names></name> <name><surname>Dehghantanha</surname> <given-names>A</given-names></name> <name><surname>Choo</surname> <given-names>KR</given-names></name></person-group>. <article-title>Big data and internet of things security and forensics: challenges and opportunities.</article-title> In: <person-group person-group-type="editor"><name><surname>Dehghantanha</surname> <given-names>A</given-names></name> <name><surname>Choo</surname> <given-names>KK</given-names></name></person-group> <role>editors</role>. <source><italic>Handbook of big data and IoT security.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2019</year>). p. <fpage>10</fpage>&#x2013;<lpage>3</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-10543-3</pub-id></citation></ref>
<ref id="B15"><label>15.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ahmadvand</surname> <given-names>H</given-names></name> <name><surname>Goudarzi</surname> <given-names>M</given-names></name> <name><surname>Foroutan</surname> <given-names>F</given-names></name></person-group>. <article-title>Gapprox: using Gallup approach for approximation in big data processing.</article-title> <source><italic>J. Big Data</italic></source> (<year>2019</year>) <volume>6</volume>:<issue>20</issue>. <pub-id pub-id-type="doi">10.1186/s40537-019-0185-4</pub-id></citation></ref>
<ref id="B16"><label>16.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Silva</surname> <given-names>BN</given-names></name> <name><surname>Diyan</surname> <given-names>M</given-names></name> <name><surname>Han</surname> <given-names>K.</given-names></name></person-group> <source><italic>Big data analytics.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2019</year>). <pub-id pub-id-type="doi">10.1007/978-981-13-3459-7_2</pub-id></citation></ref>
<ref id="B17"><label>17.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rathee</surname> <given-names>G</given-names></name> <name><surname>Sharma</surname> <given-names>A</given-names></name></person-group>. <article-title>A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology.</article-title> <source><italic>Multimed Tools Appl.</italic></source> (<year>2019</year>) <volume>79</volume>:<fpage>9711</fpage>&#x2013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-019-07835-3</pub-id></citation></ref>
<ref id="B18"><label>18.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Calvaresi</surname> <given-names>D</given-names></name> <name><surname>Leis</surname> <given-names>M</given-names></name> <name><surname>Dubovitskaya</surname> <given-names>A</given-names></name> <name><surname>Schegg</surname> <given-names>R</given-names></name> <name><surname>Schumacher</surname> <given-names>M.</given-names></name></person-group> <source><italic>Trust in tourism via blockchain technology: results from a systematic review.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name> (<year>2019</year>).</citation></ref>
<ref id="B19"><label>19.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Czachorowski</surname> <given-names>K</given-names></name> <name><surname>Solesvik</surname> <given-names>M</given-names></name> <name><surname>Kondratenko</surname> <given-names>Y.</given-names></name></person-group> <source><italic>The application of blockchain technology in the maritime industry.</italic></source> <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name> (<year>2019</year>). <pub-id pub-id-type="doi">10.1007/978-3-030-00253-4_24</pub-id></citation></ref>
<ref id="B20"><label>20.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khan</surname> <given-names>MM</given-names></name> <name><surname>Ikram</surname> <given-names>M</given-names></name></person-group>. <article-title>Use of blockchain in education: a systematic literature review.</article-title> In: <person-group person-group-type="editor"><name><surname>Nguyen</surname> <given-names>NT</given-names></name> <name><surname>Gaol</surname> <given-names>FL</given-names></name> <name><surname>Hong</surname> <given-names>T-P</given-names></name> <name><surname>Traw&#x0144;ski</surname> <given-names>B</given-names></name></person-group> <role>editors</role>. <source><italic>Intelligent information and database systems.</italic></source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2019</year>). p. <fpage>191</fpage>&#x2013;<lpage>202</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-14802-7_17</pub-id></citation></ref>
<ref id="B21"><label>21.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname> <given-names>M</given-names></name> <name><surname>Chen</surname> <given-names>X</given-names></name> <name><surname>Kou</surname> <given-names>G</given-names></name></person-group>. <article-title>A systematic review of blockchain.</article-title> <source><italic>Financ Innov.</italic></source> (<year>2019</year>) <volume>5</volume>:<issue>27</issue>. <pub-id pub-id-type="doi">10.1186/s40854-019-0147-z</pub-id></citation></ref>
<ref id="B22"><label>22.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Firdaus</surname> <given-names>A</given-names></name> <name><surname>Faizal</surname> <given-names>M</given-names></name> <name><surname>Razak</surname> <given-names>A</given-names></name> <name><surname>Feizollah</surname> <given-names>A</given-names></name></person-group>. <article-title>The rise of &#x201C;blockchain&#x201D;: bibliometric analysis of blockchain study.</article-title> <source><italic>Scientometrics</italic></source> (<year>2019</year>) <volume>120</volume>:<fpage>1289</fpage>&#x2013;<lpage>331</lpage>. <pub-id pub-id-type="doi">10.1007/s11192-019-03170-4</pub-id></citation></ref>
<ref id="B23"><label>23.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>J</given-names></name> <name><surname>Lv</surname> <given-names>Z</given-names></name> <name><surname>Song</surname> <given-names>H</given-names></name></person-group>. <article-title>Design of personnel big data management system based on blockchain.</article-title> <source><italic>Fut Gener Comput Syst.</italic></source> (<year>2019</year>) <volume>101</volume>:<fpage>1122</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2019.07.037</pub-id></citation></ref>
<ref id="B24"><label>24.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nandan</surname> <given-names>S</given-names></name> <name><surname>Ramya</surname> <given-names>KC</given-names></name> <name><surname>Sheeba Rani</surname> <given-names>S</given-names></name> <name><surname>Gupta</surname> <given-names>D</given-names></name> <name><surname>Shankar</surname> <given-names>K</given-names></name> <name><surname>Lakshmanaprabu</surname> <given-names>SK</given-names></name><etal/></person-group> <article-title>An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy.</article-title> <source><italic>Fut Gener Comput Syst.</italic></source> (<year>2020</year>) <volume>102</volume>:<fpage>1027</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2019.09.050</pub-id></citation></ref>
<ref id="B25"><label>25.</label><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deepa</surname> <given-names>N</given-names></name> <name><surname>Pham</surname> <given-names>VQ</given-names></name> <name><surname>Nguyen</surname> <given-names>DC</given-names></name> <name><surname>Bhattacharya</surname> <given-names>S</given-names></name> <name><surname>Prabadevi</surname> <given-names>B</given-names></name> <name><surname>Gadekallu</surname> <given-names>TR</given-names></name><etal/></person-group> <article-title>A survey on blockchain for big data: approaches, opportunities, and future directions.</article-title> <source><italic>Fut Gener Comput Syst.</italic></source> (<year>2022</year>) <volume>131</volume>. <pub-id pub-id-type="doi">10.1016/j.future.2022.01.017</pub-id></citation></ref>
</ref-list>
</back>
</article>
