ISSN :2582-9793

Application of Blockchain in Managing Security Challenges Confronting the Adoption of 4IR in Smart Environments

Original Research (Published On: 27-May-2024 )
Application of Blockchain in Managing Security Challenges Confronting the Adoption of 4IR in Smart Environments

Maneo Ntseliseng Ramahlosi and Adeyinka Ntseliseng Akanbi

Adv. Artif. Intell. Mach. Learn., 4 (2):2276-2289

Maneo Ntseliseng Ramahlosi : Central University of Technology

Adeyinka Ntseliseng Akanbi : Central University of Technology

Download PDF Here

Article History: Received on: 29-Feb-24, Accepted on: 12-May-24, Published on: 27-May-24

Corresponding Author: Maneo Ntseliseng Ramahlosi

Email: ramahlosi@gmail.com

Citation: Maneo Ntseliseng Ramahlosi, Adeyinka Akanbi (2024). Application of Blockchain in Managing Security Challenges Confronting the Adoption of 4IR in Smart Environments. Adv. Artif. Intell. Mach. Learn., 4 (2 ):2276-2289


Abstract

    

Occurrences of hacking intentions and privacy violations make digital trust a major challenge. This is true in the smart environment domain, where captured or recorded datasets serve as inputs for predictions and monitoring systems and must comply with many regulations due to the sensitivity of the predictions. This study explores how the application of Blockchain technology/solution, could be used to manage or mitigate the security challenges comforting smart environments and by extension a multi-hazard early warning system. In this paper, the security concerns from the adoption of smart environments are discussed and the mitigating factors are presented. The proposed model utilizes the inherent security features of Blockchain technology to address the security and privacy concerns that arise in data pipelines. The model is designed to ensure data integrity, confidentiality, and authenticity in a decentralized manner. The model is evaluated in a hybrid environment using a prototype implementation and simulation experiments with outcomes that demonstrate advantages over traditional approaches for a tamper-proof and immutable data pipeline for data authenticity and integrity using a confidential ledger.

Statistics

   Article View: 230
   PDF Downloaded: 3